Facial recognition systems
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a l...
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market ...
As Vice President and General Manager of Computer Vision at RealNetworks, Dan Grimm leads the company’s facial recognition platform, SAFR. Prior to joining RealNetworks, Dan served as General Manager of Kindle Enterprise Publishing at Amazon. Dan also served as Associate Partner at Monitor Deloitte, where he led numerous strategy engagements advising C-suite and cabinet-level leaders in the United States, Europe, the Middle East, and Africa on driving top-line corporate growth, n...
Matrix Comsec, a manufacturer and provider of telecom and security solutions, is participating at PACC 2019, to be held at The Grand Hyatt, Dubai from 26th to 29th September 2019. Matrix will be showcasing its video surveillance and people mobility management solutions at the show. People Mobility Management Matrix access control and time-attendance domain will showcase its newly launched face recognition technology for authentication through IP cameras/tablet/cellphone. The technology en...
As police use of live facial recognition (LFR) is called into question in the United Kingdom, the concerns can overshadow another use of facial recognition by police officers. Facial recognition is incorporated into day-to-day police operations to identify an individual standing in front of them. This more common usage should not be called into question, says Simon Hall, CEO of Coeus Software, which developed PoliceBox, a software that enables police officers to complete the majority of their...
South Wales Police have confirmed their intention to use facial recognition technology – rolling the application out to 50 police officers for an initial three-month trial. This will enable them to take a snapshot and analyze it immediately to answer the pressing question, “Are you really the person we’re looking for?” This introduction comes at a time when the effectiveness of facial recognition technology is still being challenged in court. Despite the positive decision by the Prime Minister and Home Secretary to add a further 20,000 police officers across the country, it is widely understood within senior policing that the benefits to increased quality and efficiency of policing come from a combination of investment in technology and additional new police officers. Senior police executives view the use of biometric technologies as an innovation that can make a transformative step-change in digital policing. Supports on-Demand identity verification The use of biometrics can support identity verification on-demand and at scale"Jason Tooley, board member of techUK and Chief Revenue Officer at Veridium comments: “As police forces recognize that technology innovation for officers can drive improved policing, there is clearly a need to focus on how the technology can be adopted quickly and how public acceptance for this technology can be increased. The use of biometrics can support identity verification on-demand and at scale, as has been proven in many other countries where officers currently use consumerized technology.” “As part of a wider digital policing initiative, it is imperative for police forces to take a strategic approach as they trial biometric technologies, and not prematurely focus on a single biometric approach. This strategy would take advantage of other biometric techniques such as digital fingerprinting which ensures a higher level of public consent due to the maturity of fingerprints as an identity verification technique." Multi-Modal biometric strategy “It’s clear that alleviating privacy concerns need to be prioritized by the police within the overall strategy for using technology in this area. The public need to be able to see the value of the technology innovation through results in order to advance consent and acceptance by citizens." “With the rapid rate of innovation in the field, a multi-modal biometric strategy that allows the police to use the right biometric techniques for the right scenario will accelerate the benefits associated with digital policing.”
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasizing the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official turnstile sponsor of the show. Appropriate entrance solution Security entrances coupled with access technologies provide a complete solution Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with the appropriate entrance solution. Swinging doors do not stop one authorized person from opening the door and then holding it open for a number of others. Security entrances coupled with access technologies provide a complete solution that ensures only one person can enter per valid authorization. The following solutions will be on display in Boon Edam’s booth: Lifeline Speedlane Swing Optical Turnstile: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave™ touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. New! Lifeline Boost Access Control Pedestal: The Boost is a brand new, stylish access control pedestal designed by Boon Edam to complement the popular Lifeline optical turnstile series. The Boost will include the latest version of Essex’s credential card reader, now with optical Bluetooth and OSDP capability, the iRox-T with BLE expands for HID Global’s Mobile Access solutions. Tourlock 180+90 Security Revolving Door: The entrance of choice for the Fortune 500, the Tourlock will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock Mantrap Portal: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, while facial recognition provides instant authentication inside the portal. The secure, edge-based facial recognition access control device by Alcatraz, called the Rock, can also be experienced at their booth (GSX booth #1047). BoonConnect Software: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Upcoming tailgating season Boon Edam is celebrating its position as the market pioneer for security entrances, according to a report by IHS Markit®, with a tailgating-themed prize giveaway. All visitors to GSX are invited to participate by visiting booth #1103 during show hours. Participants will have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg® grill, a YETI® cooler and more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email by Friday, September 27.
Johnson Controls announces the release of the newest version of Tyco victor video management and VideoEdge NVR systems designed to provide users with mission-critical, enterprise-level solutions, while also furthering the solution’s cyber position and evolving the unification between victor/VideoEdge and Tyco Software House C•CURE 9000 security and event management platform. The release of version 5.4 offers dynamic features to flexibly support hundreds of cameras, empower facial biometrics, provide video media encryption, and improve management and organization of live and recorded video, including in C•CURE Unified environments. Strengthens cybersecurity measures “By leveraging the enhanced feature set in the latest version of the victor and VideoEdge solution, users can take an even more proactive approach to security, and easily grow the system as their video, facial biometric and analytics needs increase,” said Jammy DeSousa, senior product manager, American Dynamics, Building Technologies & Solutions, Johnson Controls. v5.4 of victor and VideoEdge strengthens cybersecurity measures to address the issue of file tamperingVersion 5.4 of victor and VideoEdge further strengthens existing cybersecurity measures to address the issue of file tampering and remote and local sabotage by encrypting the media stored on the NVRs. Other new functionalities include enhanced device addition, which adds flexibility and cuts down on time spent adding or editing cameras connected to the NVRs; integrity reports and audits for missing or modified media; and parallel recording of two video streams, providing a lower resolution option for fast download. Streamlines important monitoring functions For victor and C•CURE Unified systems, improved event configuration and robustness, area controls support, and C•CURE event editing help streamline important monitoring functions. Area controls are now unified, adding in the ability for valuable video context for remote visibility of area management. With updated facial biometrics, this release offers better runtime performance, accuracy, and the ability to simplify maintenance and bulk enrollment across the VMS with the addition of victor Identity Manager and the facial biometric engine update. Finally, organizing clips, video, and events across the enterprise has never been easier with video enhancements to master application server capabilities.
PACOM, the provider of integrated security and access control solutions, is getting ready to exhibit at the ASIAL 2019 Security Exhibition & Conference, which takes place between the 24th-26th July at the International Convention Centre in Sydney. Now in its 34th year and firmly established as the premier event for Australasia’s security sector, thousands of industry professionals will gather for an impressive exhibition display, a world class conference program and the chance to network with their peers. The last 12 months have been a period of considerable activity for PACOM, and the ASIAL 2019 Security Exhibition & Conference provides the perfect opportunity to engage with integration partners and end users. Security management platform PACOM will use the event to introduce its sister company, 3xLOGIC, to the Australasian security sector and demonstrate how products from these two innovative brands can be integrated to offer a unique proposition for the entire region. All the information Unison collects is presented in a single graphical user interface Taking prime position on Stand A16 will be PACOM Unison – an open and integrated security management platform that permits the management of access control, intrusion detection, fire detection, intercom and video systems. All the information Unison collects is presented in a single graphical user interface, allowing customers to respond quickly to different types of events. Unison is the solution of choice for organizations within verticals such as healthcare, universities, commercial buildings, public facilities, municipalities, airports, shipping ports and data centers. Video management system PACOM Unison can now intelligently integrate with the 3xLOGIC range of video products for alarm verification, offering customers the opportunity to benefit from a completely integrated single solution. 3xLOGIC’s VIGIL video appliances come pre-configured with enterprise grade video management system software. 3xLOGIC’s VISIX power over Ethernet (PoE) enabled dome, bullet, cube, 360°, thermal imaging, and PTZ cameras are designed to suit any application. As one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has acquired an enviable track record for redefining what’s possible with security technology. For example, its pioneering TRENDS business intelligence software has already been deployed in over 7,000 locations across North America and now Australasian security professionals can take full advantage of its ability to provide a clean, simple visual snapshot of an organization’s operations. Facial recognition technology A fully functional demonstration facility on Stand A16 will highlight how the TRENDS cloud-based solution provides actionable intelligence on data, with intuitive icons, graphs and images that can be configured specifically to meet an end user’s needs. 3xLOGIC’s VISIX VX-FR-01 is a special purpose, low cost dual lens 2MP camera Visitors will also be able to see that easy-to-use facial recognition technology is firmly within the reach of organizations of all sizes. 3xLOGIC’s VISIX VX-FR-01 is a special purpose, low cost dual lens 2MP camera that is designed for instant face detection, identification and notification of persons of interest, as well as access control and people counting. Using camera-based analytics and 3xLOGIC’s exclusive facial recognition software application and mobile app, users can review images and choose individuals to place on a watch list. Cutting-Edge security systems Ahead of the ASIAL 2019 Security Exhibition & Conference, Josh Empson, National Business Development Manager at PACOM, commented, “This is the first time we have exhibited at this event for a number of years and we are keen to show visitors why our level of technological innovation remains second to none.” “With a large number of dedicated PACOM engineers working throughout the region, PACOM continues to lead the way in the design, manufacture and installation of cutting-edge security systems. Visitors therefore have a great opportunity to discover how integrated solutions from PACOM and 3xLOGIC can transform a diverse range of built environments and the many advantages of working with us.”
IDIS announces the launch of its IDIS Dynamic Privacy Masking (IDPM) solution, a quick and efficient privacy tool, provided free of charge to its users. Continuing the company’s tradition of delivering specific solutions responsive to market conditions and concerns, IDPM offers a quick and efficient solution to the previously labor-intensive, and at time prohibitively expensive, problem of obscuring or ‘de-identifying’ persons in surveillance footage who are incidental, irrelevant, or protected by law when footage is to be reviewed by, shared with, or provided to a third party (such as for evidence in a legal proceeding). Video surveillance camera Video surveillance is further regularly reviewed in law enforcement, legal and court proceedings Laws and regulations governing privacy throughout North America increasingly allow for various types and levels of access to surveillance footage, and last year, the European Union’s GDPR provisions granted rights to any person captured by video surveillance camera to access a copy of their personal recorded data. Video surveillance is further regularly reviewed in law enforcement, legal and court proceedings; as part of campus investigations and disciplinary actions; or released to the media and public by public and private entities alike to confirm or explain events. This increases the need—and, at times, legal requirement—to ethically protect the identities of unrelated or protected individuals (such as minors) featured in the recorded video. De-identify faces Meeting these requirements, especially for small to medium businesses, can be cumbersome and involve additional expense, unbudgeted and/or better utilized elsewhere. Solving this problem, IDPM’s anonymization and obscuring features are now available from the IDIS Partners Portal as a direct download without cost. Using the software, authorized system users can blur sensitives areas and dynamically de-identify faces, vehicles, etc. Notably, IDPM does this automatically for the duration of the clip, even as the object or person moves around the scene. Recorded video data Users also have options to set passwords and expiration dates Users can then quickly save masked video as clips or project files via the IDIS Clip Player which, crucially, preserves the integrity of the footage. Importantly, masking can be easily removed later by the authorized user, should that become necessary in the course of an investigation or proceeding. Users also have options to set passwords and expiration dates, and to control who can access and play video files. The integrity of recorded video is assured throughout this process with IDIS Chained Fingerprint technology, which extracts distinctive features of recorded video data to create fingerprints for each frame and then embeds each fingerprint into the data of the next frame, connecting each frame together with the next like a blockchain.
Ping Identity, the provider of Identity Defined Security, announces updates to its multi-factor authentication (MFA) solution, PingID, providing new methods to mitigate risk and strengthen security for enterprises. PingID’s new features include ways to evaluate user and device risk before access is granted, as well as support for Fast Identity Online (FIDO) standards to increase resistance to advanced phishing attacks. With phishing resistant and user-friendly authentication methods—including biometric authenticators, such as facial recognition and fingerprint matching—enterprises are able to create policies to enforce MFA only when warranted by an increased level of risk. Risk-Based security Risk-based security is especially critical to maintain employee productivity Verizon’s 2019 Data Breach Investigations Report found that 32% of breaches involved phishing and 29% of breaches involved the use of stolen credentials. For this reason, enterprises can benefit from an MFA solution that evaluates user and device risk to provide an extra layer of protection against phished and stolen credentials. Risk-based security is especially critical to maintain employee productivity and seamless online customer experiences. As a result, MFA has become more highly recommended by security frameworks like Zero Trust, those promoted by the National Institute of Standards and Technology and the International Organization for Standardization, as well as regulations like the PCI Data Security Standard. Leveraging facial recognition PingID further improves the balance of security and convenience provided to end users through multi-factor authentication as follows: Generally available in the next month, PingID support for Windows Hello and Mac Touch ID will support FIDO-compliant authentication methods. This will help users leveraging facial recognition and fingerprint matching on their devices. These capabilities help to securely access web applications that have implemented the FIDO standard. Additionally, PingID integration with FIDO-compliant security keys, such as Yubikeys, can be leveraged for web authentication and Windows login. Becoming generally available in the same time period, hardware OATH compliant tokens will be able to be used as an authentication factor when users are unable to use a mobile device. Virtual private network PingID will have the ability to support a quick and easy way to implement MFA PingID can now configure the number of attempts consumers logging in to a provider’s website have to enter a one-time passcode (delivered by SMS or Email), as well as set the amount of time they are locked out of their accounts if failing to provide the right one-time passcode. Additionally, generally available in the next month, PingID will have the ability to support a quick and easy way to implement MFA for Virtual Private Network access when users are working remotely, simplifying deployment of MFA for enterprise administrators. Corporate Resources PingID is now offering features in private preview that evaluate the location where a user requests access to corporate resources, and compares it to the location of the previous request. If the distance between the two geographies exceeds the threshold of what is possible by human travel, access can be automatically denied. Also in private preview, PingID assesses the reputation of the IP address from which a user requests access. Organizations can mandate specific MFA methods when the malicious activity-based risk score associated with an IP address exceeds a certain benchmark. Multi-Factor authentication Hackers are evolving their tactics to access accounts and steal data every single day" “Hackers are evolving their tactics to access accounts and steal data every single day, and it’s our responsibility as an enterprise security provider to come up with innovative and reliable ways to assess risk before access is granted, and block access when warranted,” said Steve Shoaff, chief product officer, Ping Identity. “PingID is a core product that enterprises have been using for years, and its new features make it stronger and smarter than ever.” Organizations interested in securing their enterprise with multi-factor authentication can sign up for a free trial of PingID. Also, be sure to check out the blog titled ‘Five Preventable Breaches Make the Case for MFA Everywhere’ to learn more about attacks that can be prevented with multi-factor authentication.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centers (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximize situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernized and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimize human error and optimize resource utilization. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command center through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorized activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioral understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioral understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognized a growing global need for intelligence to make physical and virtual public areas safer – and realized the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioral recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognize behavioral events in a video such as people fighting or a car collision because such behaviors can’t accurately be concluded in large scale from analyzing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognizing a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security“Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behavior inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimized for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviors can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behavior recognition, behavior events many times are not clearly defined, which is very different from object classification. Behaviors can have many variations and they can be very diverse.” An example is a simple behavior like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviors that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations center, which will contact law enforcement in real time when unauthorized intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
From New York to California, city and state governments throughout the United States are second-guessing the use of facial recognition technologies by police departments and other government entities. San Francisco was among the first major cities to issue a ban on ‘secret surveillance’ tools such as facial recognition. Now backlash against public use of facial recognition appears to be gathering steam, and some technology trials have faced additional scrutiny. Oakland, California, has joined San Francisco in banning use of facial recognition. Oakland’s diverse population has led to concerns about facial recognition systems that are prone to misidentify people of color. Limiting the use of facial recognition technology The policy would limit use of live facial recognition to situations of credible terrorism threatsNearby Berkeley, California, is considering its own prohibition of facial recognition systems by city government. Somerville, Massachusetts, has banned city departments from buying or using facial-recognition technology for any purpose. A Detroit civilian oversight board and the Board of Police Commissioners are reviewing a formal policy that would require other evidence to be used along with biometric search results to confirm a suspect’s identity. The policy would also limit use of live facial recognition to situations of credible terrorism threats. At the state level, Massachusetts and Michigan are considering moratoriums on use of facial recognition, and a bill in California would forbid police use of facial recognition in body cameras. There is a law in Illinois that requires companies to get consent from customers before collecting biometric information. Installing cameras and facial recognition system Lockport Schools in western New York state have recently drawn attention to their planned use of facial recognition. The school system plans to install dozens of surveillance cameras and a facial recognition system using $1.4 million of a state grant. The Aegis system (by SN Technologies in Canada) creates an ‘early warning system’ that informs staff if it detects individuals who are not allowed in the schools. The school system plans to install dozens of surveillance cameras and a facial recognition system The system will screen every door and also use object recognition to detect 10 types of guns. An initial implementation of the program this summer is meant to troubleshoot the system, train officials on its use, and discuss procedures with law enforcement in the event of an alert. Full implementation is planned in the fall. Abuse of facial recognition system However, New York State Education Department has asked Lockport Schools to delay use of facial recognition technology on students pending further evaluation, and a bill introduced in the New York State Assembly would halt use of the technology for a year for further study. The city of Orlando and Orlando Police Department are testing facial recognition technology to address public safety Abuse has also been a concern. A report from Georgetown Law’s Center on Privacy and Technology details widespread abuse of the New York Police Department’s facial recognition system, including image alteration and use of non-suspect images. The charges raise questions about the propriety of how expanding technical capabilities of facial recognition systems are implemented. Testing facial recognition for public safety The city of Orlando, Florida, and Orlando Police Department are testing facial recognition technology to address public safety, partnering with Amazon Web Services. One pilot ended in June 2018, and the most recent ended on July 18, 2019. Orlando has no immediate plants regarding future pilots. Light bulb-sized cameras were affixed to traffic signal poles along the city’s palm-tree-lined avenues. If a camera ‘sees’ someone, it sends a live video feed to Amazon’s facial ‘Rekognition’ system, cross-referencing the face against persons of interest. Only images of Orlando police officer volunteers were used for the test. Recently Congress has become attentive to privacy concerns and, now, the Senate is considering a bill that would limit businesses from collecting and tracking facial recognition data without consent.
The first China International Import Expo was held on November 5, 2018 in Shanghai. As the world's first import-themed national exhibition, it attracted more than 3,600 exhibitors from 172 countries, regions and international organizations, making security a top priority during the event. As an essential force in the global security industry, Dahua Technology has performed outstandingly in assuring the security of many international events such as the Rio Olympic Games, G20 Hangzhou Summit and the 9th BRICS Summit. This time, Dahua Technology has shouldered the security responsibility again with its state-of-the-art products and solutions. Event security Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment The Expo expected a total number of 800,000 visitors, as well as tens of thousands of displayed goods, coming from more than 3,000 companies in more than 130 countries, demanding safety as the top priority in the venue. Integrating data from various departments as well as monitoring the venue and command dispatching became a huge challenge for the security and police personnel. Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment in the core locations of the Shanghai National Convention and Exhibition Center and its surrounding areas, using video AR, face recognition, ANPR, video structuring, intelligent analysis and other technologies to improve the venue’s level of security. Artificial Intelligence solutions In order to further enlarge the area security coverage, Dahua Technology set up video surveillance points in key areas of Shanghai National Convention and Exhibition Center including entrance and exit points of the outer ring, interior area, office buildings, as well the surrounding major passages, plazas, commanding points, subway entrances and exits, pedestrian bridges, etc. In addition to the already pre-installed surveillance equipment, new monitoring devices were also added to make sure that there will be no blind spots and interruptions of the video transmission in the whole area. Panoramic cameras Dahua panoramic cameras installed at the commanding point of the Shanghai National Convention and Exhibition Center employs AR technology in order to achieve omni-directional and no blind spot surveillance. Additionally, the panoramic cameras deployed inside the exhibition center monitor the situation inside the exhibition hall and obtain real-time dynamic information that builds a three-dimensional platform that are visual, controllable and schedulable to facilitate an efficient security operation. Intelligent video analysis system Intelligent video analysis system was built in the exhibition area to classify the acquired data Moreover, intelligent video analysis system was built in the exhibition area to classify the acquired data according to the preset rules and application requirements, such as crowd detection, behavior analysis, map search, etc. This system expands and deepens the application of video information in the efficiency of public security. Furthermore, through the Dahua Deep Learning Series video alert camera, people who would illegally climb over the perimeter fence built within the 4-kilometer area of the exhibition hall would be identified and captured. Dahua face recognition system The Dahua face recognition system deployed at the entrance and exit of the exhibition center could recognize the identity of all visitors in real time by comparing their ID card’s recorded information with the face photo captured by the front-end smart camera. This system did not just improve the traffic efficiency of the entrance and exit points, but also guaranteed the safety and accuracy of the identification of people walking in and out of the venue. High-definition smart cameras Dahua high-definition smart cameras were also set up at the entrance and exit around the transportation hub of the Shanghai National Convention and Exhibition Center to monitor and track high-risk vehicles and people in real-time. This effectively improved the road management and traffic control in the area. Fully structured cameras capturing real-time videos of motor vehicles, pedestrians and non-motor vehicles were deployed in the surrounding area, which also support face and body recognition for a more comprehensive security. Video network platform Video network platform automatically connects the video and image data captured within the area Additionally, a video network platform automatically connects the video and image data captured within the area to the public security command center, creating a resource sharing integration of valuable information. China International Import Expo has facilitated countries and regions all over the world in strengthening economic cooperation and trade, and promoting global trade and world economic growth. Dahua AI solutions has greatly enhanced the prevention and control measures within the key areas around the venue, assuring security during the Expo. Cutting-edge security solutions After the event, Dahua Technology received letters from the Shanghai Public Security Bureau, Qingpu Public Security Bureau, Changning Public Security Bureau, Shanghai Hongqiao Integrated Transportation Hub Emergency Response Center, and other offices, thanking Dahua Technology for its strong support and contributions to the success of the security management during the event. From the Rio Olympic Games to the G20 Hangzhou Summit, from the 9th BRICS Summit to the first China International Import Expo, Dahua Technology always accomplishes various security tasks with high quality and efficiency. With its cutting-edge products and solutions, quality operation services and professional technical team, Dahua Technology will continue to assist more major international events in the future.
With 15,000 visitors per day, and a watch list of about 3,000 people, the casino faced an impossible task to recognize persons of interest in real time. Surveillance staff manually detected only 5–7 known persons per week and was looking for an automated face recognition system to support two separate requirements: Detecting voluntarily excluded patrons to promote responsible gambling and to avoid compliance fines associated with allowing these people to play Detecting banned persons or people on the lookout list for loss prevention and security. Fully managed services At peak times, the system sees 20 persons per second in front of all cameras Cognitec offers the Face VACS-VideoScan Enterprise Solution as a fully managed service that allows the casino to benefit from the technology at affordable cost and with low implementation effort. The system for this casino includes the software, installed on three redundant servers, and 29 Cognitec C5 cameras at various entrances and in walkways. Some cameras have been installed to blend into the wall design, and not disrupt the overall casino decorum. At peak times, the system sees 20 persons per second in front of all cameras. The software stores the appearances of all persons for 30 days, collecting an average of 1 million faces. After this time window, all images, videos and biometric templates are deleted. Taking optimal photos with a hand-held camera When the surveillance team receives an alert, they verify the facial match, and send the person details to the database administrator. The security team receives the confirmed alert on a mobile device to discreetly find and approach the person on the floor. For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera. The technology has been optimized to generate a high rate of true alerts while generating the lowest possible count of false alerts. The surveillance team evaluates the image pairs in an alert within seconds, and discards the alerts with questionable match results. face recognition services The system currently generates up to 30 correct alerts per day. Self-excluded problem gamblers are now detected at a much higher rate, resulting in a significant reduction in fine payments compared to the past with traditional detection methods. Observing such reliable system performance has convinced the client to add more cameras to the system and implement the technology at additional locations. The casino also considers to use the technology for underage detection and VIP recognition. Furthermore, the casino has the option to report visitor demographics and statistics that help planning for staff resources and casino capacities. While Cognitec continues to provide reliable, fully-managed face recognition services, the casino continuously reaps the benefits: a secure environment for customers and staff, a profitable business, and support from the community.
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualiszation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfill project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
Allianz Parque has become one of the most modern multi-purpose arenas in Latin America since it was built in 2014 by WTorre Properties. The stadium is located at the same place of the old Palestra Itália Stadium with a capacity of more than forty thousand spectators. The stadium not just meets FIFA standards but was also awarded various prizes including the Master Award in the 11th edition of the Grand Prize for Corporate Architecture, the Accessibility Seal, delivered by the Permanent Accessibility Commission (CPA), and the "Environmental Management of the Surroundings of the Work" award, at the 3rd Health and Safety at Work Seconci Award. Intelligent video surveillance cameras With an eye on the market, the management of Allianz Parque constantly invests in advanced technology and new solutions to keep the project in line with the most current standards of innovation in the world. The latest are the intelligent video surveillance cameras from Dahua Technology, globally renowned video-centric smart IoT solutions and service provider. The cameras with embedded artificial intelligence systems could help the security team of the arena The cameras with embedded artificial intelligence systems could help the security team of the arena work more efficiently and productively, so that the stadium is capable of dealing with different kinds of scenarios, such as large-scale concerts, major celebrations and, especially, football matches at Sociedade Esportiva Palmeiras. Installation The installation of the entire system took around 90 days. According to the General Manager of Allianz Parque, the biggest challenge is to implement the new system with the arena in operation. "We have to carry out the replacement without any impact to the security team. But with the support of the Dahua Technology team, we are able to do the job quietly without any major changes in our initial planning,” explained Rigotto. In the project, devices with latest generation embedded artificial intelligence technologies were used. Many of their functions go beyond an image captured by an ordinary camera. Here are the camera models and technologies used: DH-IPC-PF83230-A180 - panoramic camera with four 8 Megapixel CMOS sensors, which generates a single 180-degree image of 32MP using H.265 compression technique; SD6CE245UN-HNI - PTZ-style positioning camera with various technologies, such as Starlight, which allows viewing of images in very light colors (less than 0.005lux). It has a 45x zoom system, plus an infrared illumination that can reach 250 meters away; MPT310 portable recorder, used with lapel cameras, making recording and transmission of high-definition audio and video online from the point of view of the agent close to the events; DH-IPC-HFW8242EN-Z4FD-IRA-LED - special network camera that captures human faces through AI algorithm, embedded in a chip with Deep Learning Technology. It gives the facial detection server a good deal of processing work, since the camera itself locates the faces of the video image and analyses attributes such as gender, age, facial expressions and whether it has glasses; Network camera recorder and face database manager, DHI-IVSS7016DR-4T - It works in conjunction with the CMS DSS PRO that makes the recording of the videos in the network, in addition to managing and analyzing the faces pre-registered in the database of employees and service providers of Allianz Parque. User can also set a black list and the recorder will alert once unauthorized persons detected in a certain sector. The server can, in real time, work by processing the input stream at the gate opening, being able to recognize up to 40 faces per second in the Arena, detecting the faces and comparing them with the database prepared to issue field safety alerts in up to a few seconds; Video Wall, with 6 46-inch LCD screens (DHL460UCM-ES), forms a 2x3 matrix and a Dahua controller (NVD0905DH-4I-4K), which can display 4K, live images, advertisements and bulletins in a professional manner. Facial recognition system Allianz Parque now has a state-of-the-art facial recognition system, which has artificial intelligence and data analysis" "We are very proud to have this partnership with Dahua Technology. Through it, today, Allianz Parque now has a state-of-the-art facial recognition system, which has artificial intelligence and data analysis, and can be integrated into the public safety team system,” emphasized Eduardo Rigotto, General Manager of Allianz Parque. Rigotto pointed out that there are always possibilities for modernization. "The market has changed in five years and in order to keep us in the lead as an inspiration for other spaces, we need to continue investing in new technologies," he said. In addition to providing advanced security technology, Dahua Technology also became the sponsor of Allianz Parque, as well as Prevent Senior, Banco Pine and the Allianz Seguros brand. With this, the Arena Control Center will be called CCO by Dahua Technology and there are more than 150 information boards present by Dahua Technology in the stadium to remind and protect everyone. Dahua LED panels In 2018, Dahua Technology has successfully delivered the largest RingLed 360º in Latin America, which totals 580 meters of panels for all bars in the arena. The innovative design with LED panels from Dahua Technology was developed by Digital Arena, a pioneer in the field of digital media for stadiums. "Our philosophy is to deliver large projects that make a difference not only to the customer but also to the people who will use their space," said Fabio Lopes, Channel Sales Director of Dahua Technology Brazil. Moreover, he added, "Allianz Parque is an entertainment venue where spectators aim to watch a great show with total safety and comfort. This project aims to demonstrate that Allianz Parque is one of the safest arenas in Latin America.” Stadium security Located in the city of São Paulo, Allianz Parque imposes itself between the districts of Água Branca, Pompeia, Perdizes and Barra Funda, an area of easy access, highlighted by event organizers and club fans. The space has the capacity to receive 43,700 people on game days, 55,000 for shows and 12,000 for events in the amphitheater.
Danish Superliga football club Brøndby IF’s stadium is the first in Denmark to utilize facial recognition technology, provided by Panasonic, to ensure a safer stadium experience and alleviate the strain placed on staff during high profile matches. Panasonic security cameras The system is being deployed to automate the process of identifying blacklisted persons and prevent them from entering the stadium, a task which was previously undertaken manually by security personnel. Panasonic’s security cameras and FacePRO facial recognition software, automatically identify any individuals registered on the list, and sends a message to staff to take the appropriate action.The automated procedure at the stadium entrance will decrease congestion at the gates The system will enhance security measures and fan safety, which will prove especially important during high profile matches such as the derby against F.C. Copenhagen. Furthermore, the automated procedure at the stadium entrance will decrease congestion at the gates, resulting in a faster entrance process for fans. Stadium security Expecting an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist, it allows staff to focus their attention on better assistance and service towards fans entering the stadium. Jesper Jørgensen, Managing Director of Brøndby IF commented, “The system will significantly increase our efficiency in identifying blacklisted persons at our entrance gates, so we can ensure they do not enter the stadium. We are always trying to optimize our stadium experience for our fans, and ultimately create the best possible fan experience. This is another step into the right direction.” FacePRO facial recognition software To maintain personal privacy, the facial recognition technology does not store the images or data of those who are not registered on the blacklist. Also, the data of those who are registered on the internal Brøndby server is not connected to the internet or to any other system. Panasonic’s facial recognition system contributes to a safer stadium environment by alleviating security pressure" “Panasonic’s facial recognition system contributes to a safer stadium environment by alleviating security pressure on the ground, while ensuring that all data is protected from unauthorized external access” said Gerard Figols, head of the European security business at Panasonic. “In turn, we can offer peace of mind to football fans and Brøndby IF that our technology will improve the standard of safety even during high profile matches, something that fans have already complimented the system for.” High-performance facial recognition Recognized by the National Institute of Standards of Technology (NIST) as having the world’s highest level of facial recognition performance in independent testing. The technology can identify faces that are difficult to recognize with conventional techniques, such as those taken from an angle of up to 45 degrees to the left or right or 30 degrees up or down, and even when part of the face is concealed or hidden by sunglasses. The system also recognizes faces from photographs that are up to 10 years old.
The first forensic science-based crime prevention system in New York State was installed at luxury Swiss watch manufacturer, Richard Mille. It is the fourth system to be deployed in the United States. The technology, the Intruder Spray System from SelectaDNA, utilizes forensic science to reduce burglary, robbery and high-value theft by a documented range of 40 to 86 percent. The cutting-edge technology was installed at the world-renowned watch brand’s architecturally stunning flagship boutique, located on ‘Billionaire’s Row’ on 57th Street in Manhattan. Irrefutably identify criminals The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory The system uses the power of forensic marking science to considerably deter crime and, if a crime is committed, enhances law enforcement ability to irrefutably identify criminals, then apprehend and prosecute them. The technology has been used for more than ten years in 46 countries on five continents. It is now available and beginning to be deployed in the United States. The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory. It is scientifically structured, and functions, the same as organic DNA – but is more durable. Each unit of the forensic solution contains a universally unique code (sequence), which is never replicated; thus; providing an exclusive identifying marker for each client. Each unique forensic code provides an uncontestable link between a criminal, or stolen item, to a specific crime scene and the rightful owners. Remote video monitoring The system – comprised of a control box, spray head and PIR – is easily integrated with other security systems such as burglary, access control, intrusion, video, and many others. Installations take approximately four hours. The system can also be installed as a standalone crime-fighting solution. There are various modalities of system activation, including but not limited to panic buttons, money clips, remote video monitoring via Milestone Systems, RFID and facial recognition technology. When the system is activated, the invisible, non-toxic and water-based forensic solution remains on marked criminals’ skin for four to six weeks, and clothing for two to three months. The solution is only visible via a special frequency UV light, leaving criminals exposed to identification and apprehension well after leaving the crime scene. Crime-fighting technology SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime" “We’re pleased to provide Richard Mille with a proven crime-fighting technology to further enhance its already impressive security measures,” said Henrik Olsen, CEO of CSI Protect, the exclusive provider of SelectaDNA technology in the United States. “SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime across the globe and now in the United States.” Many Fortune 500 and iconic, well-known companies have used SelectaDNA technology, including, Tag Heuer, LVMH, Chanel, Pandora, Watchfinder & Co., 7-Eleven, Circle K, G4S, Securitas, GlaxoSmithKline, Lloyds Bank, The Royal Bank of Scotland (RBS), Bank of New Zealand, McDonald’s, KFC, Balfour Beatty, Shell, Texaco, Raptis Rare Books and thousands of others. Offender marking solutions The co-founder of Milestone Systems, Henrik Friborg Jacobsen, is a major proponent of the technology and anticipates major growth of its use in the United States. Friborg Jacobsen is also an investor in, and chief advisor to, CSI Protect. SelectaDNA is a pioneer in forensic marking offering a full range of property, infrastructure and offender marking solutions, using a completely secure and unique forensic technology. SelectaDNA, which is water-based, non-toxic and non-flammable, is proven to reduce crime (especially robbery, burglary and high-value theft) by up to 86%. SelectaDNA not only reduces crime, but also enables law enforcement to link criminals to crime scenes and secure convictions.
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?