Human identification system
HID Global, a worldwide provider of trusted identity solutions, and Keyfactor, a provider of secure digital identity management solutions, announced a collaboration that will improve how organizations secure data and protect privacy. By adding HID IdenTrust digital certificates to the Keyfactor platform, the offering provides enterprise customers with a single convenient solution to meet today’s zero-trust security models and identity. Digital certificates are used as a foundational secur...
Nedap Identification Systems is excited to share the upcoming OSDP upgrade within Nedap’s long-range RFID reader portfolio for automatic vehicle identification. The portfolio will be upgraded and compatible with V.2.1.7 of the Open Supervised Device Protocol (OSDP) standard. This upgrade supports the interoperability of the company’s reader portfolio with a growing number of access control and security products. Over the last few years, an increasing number of access control panel m...
Video surveillance company Ocucon launches a new technology that cleverly monitors the number of people going in and out of a store, automatically shutting the entrance when the occupancy threshold is met. Occupi by Ocucon is a response to a growing need for controlled entry to retail stores during the COVID-19 pandemic. Social distancing has meant many retailers are spending thousands of pounds a week per store on extra security personnel to manage store entrances and exits. Occupi by Ocucon p...
As a vast majority of companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining the security of their cloud environments during the transition. The findings are a part of the State of Cloud Security survey conducted by Fugue, the company putting engineers in command of cloud security. The survey found that 96% of cloud engineering teams are now 100% distributed and working from home in...
Actuate, the computer vision technology company behind the threat- and intruder-detecting AI software, announced it is offering a deep discount on its intruder detection capabilities to businesses to combat the growing number of COVID-19-related burglaries. In order to help stop the spread of the coronavirus, cities have ordered restaurants and bars to cease on-site service, leading to many establishments closing altogether or greatly reducing operations. Increase in burglaries&n...
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or rep...
Alcatraz AI, developer of secure frictionless access control platforms, has named security industry veteran Josh Jackson as Regional Vice President, Strategic Partnerships. Based in Florida, Jackson will oversee sales, business development, customer service, marketing, and operations for Alcatraz AI. “We’re excited to have a security industry pro lead our East Coast sales operations as we continue to build our innovative frictionless access control platforms,” said Alcatraz AI Chief Executive Officer and Founder Vince Gaydarzhiev. “Josh Jackson has earned a high level of respect throughout his career with leading roles with international security companies and professional organizations. His colleagues consistently report that he is hard-working, dedicated, and very skilled at relaying complex technical processes like those we are developing.” Focusing on video surveillance Josh comes to Alcatraz AI with a wealth of security industry experience. He most recently served as Regional Vice President North America with RightCrowd Software. After focusing primarily on video surveillance he joined STANLEY Security as Director of Global Product Integration leading those efforts in their product business. He has served as Director of Strategic Accounts for Pelco by Schneider Electric and helped start the EMEA Center of Excellence while on assignment in Paris. Josh took a role in the Physical Security Interoperability Alliance (PSIA) global security consortium trying to move away from proprietary systems and into the open standards world. He was a member of the team that took the PLAI (Physical Logical Access Interoperability) specification from an idea on a whiteboard to a commercially available solution. He served as a board member for seven years and Vice Chairman for three of those years. Future of access control The future of access control is in the ability to deliver security without compromising on friction “As a longtime security industry professional, I’ve witnessed many impressive technological advances, but access control in physical security has not been innovating at a pace consistent with the demands of digital transformation. With Alcatraz AI, there is a product to change the way access control ties into the site access experience strategies of many enterprise organizations adding frictionless access, but without compromising the validation and identity assurance required." "That is why I am thrilled to join Alcatraz AI to lead the way in getting the offering to market,” said Jackson. “The future of access control is in the ability to deliver security without compromizing on friction and Alcatraz AI has developed an incredible product that will improve access and overall security for a variety of vertical markets.” Highly secure and frictionless entry Developed by Gaydarzhiev, a former Apple hardware engineer, the Alcatraz Rock is a 3D facial authentication product that works with any access control system. It replaces badging as an access point identification method with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses secure facial authentication, an intelligent enrollment that switches to face-only identification after it has learned an employee’s face, and guards against tailgating.
We are always in pursuit of clearer and more colorful images not only for their eloquent appearance, but also for practical reasons, since clarity and vividness usually means more information concerning safety. A lot of violent crimes are more likely to take place at night in major cities according to a 2019 report from Security Magazine. And the demand for cameras to perform in low-light environment is on the rise, as shown in 2019 IHS report, growing at 20.6% CAGR from 2018 up to 2023. Dahua Technology, a video-centric smart IoT solution and service provider, introduces full-color to Smart Motion Detection (SMD). The two technologies make a perfect match that is capable of identifying humans and vehicles in full color even in an extremely low-light environment. It effectively filters false alarms, while retaining more useful details, that can be easily cross checked though it’s built-in AI. The integration of these two technologies is the first-of-its-kind in the industry, delivering unparalleled value to Dahua customers. Cameras of LED series are equipped with warm light that serves as a supplementary light in dark environment Large aperture lens Dahua Technology offers two series of full-color cameras, LED series and Non IR series, that both adopt large aperture lens that collect higher amount of absorbed light and present a more vivid and colorful image under dark environment. Cameras of LED series are equipped with warm light that serves as a supplementary light in dark environment. The warm light also serves another purpose, to deter intruders, that can significantly reduce crimes in places like dark alleys or parks at night. Cameras of Non IR series have no complementary light device, and do not emit light like infrared cameras at night, which means it will not interfere with ongoing activities or contribute to light pollution in the environment. Also, it prevents reflections on rainy days and attraction of small insects, making it an ideal silent security guard in dim places like stores, parking lots and casinos. Enhanced accuracy SMD can easily process the visual information collected by full-color cameras. Boasting an enhanced accuracy thanks to full-color technology, Dahua SMD can effectively filter false alarms triggered by irrelevant objects, such as pets, insects, leaves, branches, raindrops, lights, etc., focusing only on real threats, human and vehicle. SMD Accuracy at Night Product Human Accuracy Vehicle Accuracy Traditional Camera ≥90% ≥90% Full-color Camera ≥98% ≥98% With advanced AI algorithms, SMD also supports quick target search from recorded videos by extracting and classifying humans and vehicles from massive video data. Users can easily trace and analyze past records using specific features such as certain colors of human and vehicle, saving huge amount of time and labor on event retrieval. Alarm Visualization function In addition, another advantage of this solution is its Alarm Visualization function, which is the capability of SMD to show clearly whether there is a human or vehicle intruding the property. Supported by real-time visual evidence, it is unlikely for users to miss or misperceive the real cause of the event. When combined, the two technologies of full-color and SMD stand as an excellent choice for customers with small and medium-sized projects since all practical demands are covered with a relatively low cost. Likewise, it is also suitable for distributors and channel engineering companies with general requirements for intelligence. Combined strengths of full-color and SMD The following are some scenarios in which security will be significantly enhanced with the combined strengths of full-color and SMD. For shopping malls and supermarkets at night, the two technologies together can record all theft incidents that happened in the dark with clear features of the suspect such as hair color and clothes. More importantly, it can send real-time alarm to the user and police before the crime takes place. Anyone who approaches the door during odd hours will be automatically detected and recorded. The same benefits also apply to residents of villas in suburban areas where it is essential to be able to detect any intruder in the dark. Once a person or a car is detected, users will receive an alarm push notification on their mobile phone so they can act and respond accordingly. This versatile product is also qualified to guard an industrial area that is off limits, which varies from factories processing dangerous chemicals to warehouses containing valuable inventories. Due to the vastness and complicated structure of industrial parks, it is unlikely for security guards to patrol the place 24/7, especially at night. But with a security system that features full-color and SMD, a safe and effective protection of factories at night can be achieved with less labor cost or even unmanned.
DigiCert, Inc., a provider of TLS/SSL, IoT and PKI solutions, is upgrading channel partners to DigiCert CertCentral® Partner, a comprehensive TLS certificate management solution for cloud and hosted environments. CertCentral helps partners customize and automate all stages of lifecycle management for their end customers, as well as easily deliver new features and solutions, while simplifying business management. Management of customer accounts CertCentral Partner offers an updated API that lets partners easily integrate key features into their own offerings for their customers. Pre-validation capabilities, as well as support for change orders during order processing, help improve business agility. Using CertCentral, partners can support multiple sub-accounts under a main account, simplifying management of customer accounts, ordering, payments and other processes. CertCentral Partner helps partners simplify and expedite their selling processes" “DigiCert CertCentral Partner is part of our comprehensive strategy to support our partners with world-class technology and services to help them succeed,” says Philip Antoniadis, executive vice president of worldwide sales at DigiCert. “Many of our partners are already experiencing compelling business outcomes, including new growth and organizational efficiencies.” DigiCert CertCentral Partner “Partners have distinct requirements for managing customers’ digital certificates, and DigiCert CertCentral Partner helps them better address each customer’s specific needs,” says Tobias Zatti, product manager at DigiCert. “CertCentral Partner helps partners simplify and expedite their selling processes while delivering a superior experience to end customers to set the stage for growth, new revenue and upsell opportunities.” CertCentral Partner provides an advanced set of account management tools for better TLS certificate deployment to end customers. Leading features allow partners to: Access all certificate types from one place, through an advanced API, to better address end customer requirements and easily build new solutions that help drive growth; Take advantage of flexible ordering processes, including order changes, for improved efficiency, enhanced agility and an improved experience for end customers; Gain 360-degree visibility through an easy-to-use UI that provides fast access to everything they require in just a few clicks; View and use a comprehensive library of documentation with API details, technical support and more. Support certificate management It’s intuitive UI gives you quick access to all the features you need in just a few clicks" DigiCert has received an enthusiastic response from partners who have deployed CertCentral Partner to support certificate management for their end customers. “DigiCert CertCentral Partner is a fantastic, progressive upgrade for us,” says Einar Ágúst Baldvinsson, system administrator at Sensa ehf. “It’s intuitive UI gives you quick access to all the features you need in just a few clicks. Ordering certificates in CertCentral takes far less time than before. It is feature-rich and greatly improves the service level that we are able to provide to our customers.” Flexible domain validation “The streamlined API gives us access to more products than before,” says Marco Hoffmann, head of product management & domain registrar services at InterNetX. “With enhanced features like pre-validation and the detailed document library, DigiCert CertCentral Partner makes our daily tasks a lot easier.” “DigiCert CertCentral Partner simplifies our reselling processes,” says Kenta Shinoda, sales manager, and Furuki Ikko, president, at Sophia Research Institute. “Flexible domain validation, certificate issuing format and authentication status tracker are so great.” Lifecycle management solution “At Secure128, we’ve found the DigiCert CertCentral Partner and API to be a breath of fresh air,” says John Monnett, managing partner, operations, at Secure128. “The level of tools, reporting, automation options, sub-account functionalities, and ease of use are professional-grade and second to none. We believe CertCentral to be the most comprehensive certificate lifecycle management solution we’ve ever used.” With DigiCert CertCentral Partner, we have achieved much improved certificate lifecycle management" “With DigiCert CertCentral Partner, our customers and our organization have saved so much time,” says Marcus Wessberg, head of IT at Ports Group. “The pre-validation of organizations and domains make it really easy.” “Through the API and ACME, DigiCert CertCentral Partner gives us the ability to issue certificates instantly and automatically for all our customers,” says Rollin Yu, technical director at TrustAsia. “The product is highly flexible: the certificate chain, the algorithm, the validity period and other extensions can be customized accordingly.” Manage all TLS certificates “With DigiCert CertCentral Partner, we, as well as our customers, have achieved much improved certificate lifecycle management, which is now more visible and intuitive,” says Roger Werner, CEO of CertSuperior. “And we can manage all TLS certificates in one location.” Partners can get details about upgrading to CertCentral Partner by speaking with their account representative.
Ping Identity, a provider of Intelligent Identity solutions, announced it has named Patrick Harding as the company’s Chief Product Architect. Harding returns to Ping Identity after two years of advisory and consulting work in the blockchain and identity space, including work at Hedera Hashgraph where he advised on applicable decentralized identity use cases. A distinguished identity specialist, Harding is actively involved in the standards community and is a former Board Member of the Information Card Foundation, as well as the Open Identity Exchange. He is a co-inventor of the SCIM standard, which automates the exchange of user identity information between identity domains and which has become increasingly important with the growth of SaaS tools. Determine appropriate capability investments From 2005 to 2018, Harding served as Ping’s original Chief Technology Officer and has been a trusted advisor over the past two years. His extensive background and unique historic knowledge of Ping will make him an invaluable asset as the company continues to enhance its solutions and expands its global 3,000 customer base. Identity can and will be leveraged to impact digital experiences across the board for all people" In his new role, Harding will help oversee the development and maintenance of Ping’s strategic vision and product roadmap. He will also support the sales, marketing, business development, and corporate development teams. Through this work, he will help ensure appropriate business investments are made, determine appropriate capability investments, streamline communication to customers and prospects, and foster key technology and alliance partnerships in addition to his many other responsibilities. Investment in strategy and innovation “There is massive opportunity for growth and innovation in our industry right now. Identity can and will be leveraged to impact digital experiences across the board for all people—whether they are customers, partners, employees, or citizens,” said Harding. “I chose to return to Ping because of its prioritized investment in strategy and innovation that will bring identity’s full potential to life.” “We couldn’t be happier to welcome Patrick back to Ping and have him on board as our Chief Product Architect,” said Andre Durand, CEO, Ping Identity. “Having worked with him for over a decade, I know he has the market understanding and forward-looking vision that will continue to propel Ping and our customers toward the future of identity.”
IDIS will be highlighting the latest advances in deep learning video analytics, with accuracy, at ISC West 2020. Building on its track record of artificial intelligence innovation, IDIS has taken another step forward in neural networks developing what is now one of most accurate AI engines available. Users can easily access a range of advanced AI tools through the latest version of IDIS Deep Learning Analytics (IDLA) technology, either as a service module with the IDIS Solution Suite VMS or via the cost-effective AI in the Box appliance for smaller applications. Korea’s largest video tech manufacturer will be demonstrating the latest AI-driven metadata filtering capabilities, designed to make incident investigation faster and more effective. Incident management This guides first responders to take the most appropriate action and reduces the chance of incidents being missed IDLA makes control room operations more efficient by dramatically reducing false positive alarms and in turn supporting proactive decision making and prompting faster officer intervention during security and life safety events. It can accurately recognize incidents such as intrusion, loitering, and trespassing, all in real-time, and trigger notifications. In practice, this guides first responders to take the most appropriate action and reduces the chance of incidents being missed. IDIS Instant Meta Filtering (IMF) now allows users to exploit the power of metadata to speed up incident investigations. Operators can do this not just through IDLA but also through the totally cost free IDIS Center VMS via the deployment of new IDIS 6000 Series Edge VA (EVA) cameras. IDLA or EVA cameras record metadata even when an analytic rule is not applied. Person Match tool This allows operators to easily collate footage, with IDIS IMF scanning hours of recorded video from multiple streams, to identify relevant data. This makes it easy to search footage to track a person or vehicle, cutting through large volumes of video data to reveal the movements and last-known locations of persons or vehicles of interest. For example, using the Person Match tool the operator simply highlights the video image of a suspected perpetrator and within seconds IMF provides thumbnails of the person it identifies as being the suspect. The operator can then simply click the thumbnails to view the relevant video clips. Reduce investigation time IDIS will be showcasing its line-up of analytics appliances and specialty cameras IDLA combined with IMF promises to deliver significant labor efficiencies and reduce investigations from days or hours to just minutes. For busy security departments, this means less time spent staring at screens and more time engaged with more important and rewarding duties. IDIS will also be focusing its solutions on important vertical markets. For systems integrators there are now major opportunities to help retailers grow combined online/in-store customer experiences and operational efficiency. DC-C4212RX 2MP micro dome camera To serve this fast moving sector, IDIS will be showcasing its line-up of analytics appliances and specialty cameras which now includes new 12MP Panomorph and 5MP Compact Super Fisheyes, giving complete situational awareness of stores and logistics centers. In addition, the new, compact DC-C4212RX 2MP micro dome camera blends discretely with the aesthetics of high-end locations such as jewelery stores and designer boutiques. IDIS will also demonstrate the new reporting capabilities within its popular retail plug-and-play, VA in the Box analytics appliance. These make it easy for store managers to compile and access business intelligence reports across branches, all through the convenience of a web browser. IDIS Solution Suite IDIS Solution Suite is proving particularly popular as a scalable and affordable VMS In the education sector, IDIS has a growing track record of systems installed at schools and colleges where it is helping to create safer, more positive learning environments. IDIS Solution Suite is proving particularly popular as a scalable, affordable VMS that works with a wide range of robust NVRs and cameras suitable for varied lighting conditions and locations all backed by the IDIS Ultimate Warranty. These offer the advantage of ease-of-use for teachers and administrators, with essential privacy functions and affordable, wide area coverage. “This year at ISC West we’re really making it easy for systems integrators and customers to take advantage of advanced deep learning AI with some practical tools,” says Keith Drummond, Senior Sales Director for IDIS America. Importance of cybersecurity And he adds that IDIS will be reminding everyone about the continued importance of cybersecurity. “Protecting against network attacks through cameras and video infrastructure is no longer just a ‘nice to have’, it’s a ‘must have’. The threats to organizations are too great to ignore, and the consequences of failure are too damaging.” IDIS has been at the forefront in protecting customers with multi-layered cyber-defenses, securing data access, transmission, and recording, designing more robust protocols and issuing timely firmware updates.
Similar to the famous saying of Georges Clemenceau (“Father Victory”) that ”War is too serious a business to be left to generals”, the security matter nowadays is too serious to be entrusted to security guards, police or any personnel alone. The complexity of situations is well beyond the capacity of human eyes and brain, making modern technologies like AI suitable to play an essential role in the field work. As is seen in the recent case of Novel Coronavirus (COVID-19) for example, thermal imaging technology is widely used in transportation hubs across China to detect possible carriers of the virus in a crowd with an accuracy of±0.3℃. AI technology will be used after to trace back their routes and locate the people they had close contact with, who will then be quarantined for at least 14 days to see if they have been infected. Artificial Intelligence in the security industry WizSense, a series of AI products and complete end-to-end solutions based on deep learningThe necessity of AI in security industry is also testified by the numbers that reflect people’s high expectation. According to a report by MarketsandMarkets, AI-powered Video Analytics Market is projected to register a CAGR of 41.76% during the period 2018-2022. To accelerate AI adoption, Dahua Technology - a video-centric smart IoT solution and service provider - is proud to release WizSense, a series of AI products and complete end-to-end solutions based on deep learning that focuses on human and vehicle, providing intelligence, simplicity and inclusivity to users. Cyber security using encryption algorithms With easy configuration and reasonable price, WizSense is competent enough to meet the needs of most ordinary users. Its benefits include: accurate prediction before an event; instant deterrence during an event; quick target search after an event; storage saving while ensuring target details, and privacy protection and defense against attacks. While offering abundant functionalities, WizSense also ensures high-level of cyber security using encryption algorithms that are certified by TÜV Rheinland and UL (Underwriters Laboratories). Users can rest assured that their privacy will be properly protected using WizSense series products. WizSense provides users with comprehensive protection as well as personal options to satisfy more diversified needs.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Asian Banker magazine recently selected Qatar National Bank for having the “Best Biometrics Initiative, Application or Program in Qatar” for its use of iris recognition systems from Iris ID in some QNB branch ATMs. The bank is the one of the largest financial institution in the Middle East and Africa, with branches, subsidiaries and associate companies in 31 countries on three continents. Biometric Eyes (IRIS) Scan ATM program The deployment of QNB’s Biometric Eyes (IRIS) Scan ATM program, a first-of-its-type in Qatar, is part of the bank’s commitment to innovative solutions to deliver premium services to customers in a safe, fast and convenient way. Mohammed Murad, Vice President, Global Sales and Business Development, Iris ID, congratulated QNB on the award. “QNB should be applauded for staking out a futuristic, leadership position when it comes to improving the security, convenience and safety of its customers as they access their accounts via bank ATMs” he said. “The ease and speed of our contactless iris-based recognition system makes it ideal for use in the financial industry. Our contactless systems have taken on added importance with the worldwide spread of the COVID-19 virus.” Iris ID authentication systems The bank launched its use of the Iris ID biometric solution in ATMs in late 2016. The system enables QNB customers to access their accounts at ATMs without the need of a bank card or PIN. To use the Iris ID solution the bank’s customers, participate in a one-time registration at a QNB branch office. The two-minute process involves taking a digital photo of the iris, which is converted into a small template stored in a secure database. At the ATM, customers need only a second to look into a built-in reader and have their iris pattern confirmed. In addition to the QNB deployment, Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Danish Superliga Soccer Club Brøndby IF has enhanced fan safety by using Panasonic security solutions to prevent banned soccer hooligans from entering the stadium, while maintaining visitor privacy and complying with European Union General Data Protection Regulations (GDPR). Installing Panasonic’s FacePRO facial recognition system at the entrances to the stadium has helped to more effectively identify those on the banned list. The club had been aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism, illegal use of flares and safety. Family-friendly stadium With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the soccer club wanted to find a way to make genuine fans feel even safer at the family-friendly stadium by preventing any problems before they could occur. Up until this point, lists of banned people were distributed to security staff at the entrance gates. They would manually check each person coming into the stadium but the process was time consuming and not always effective. With the use of Panasonic’s security solution, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. System operators in the surveillance room double check matches made by the system before sending notification to the stewards at the gates to prevent them from entering. Panasonic FacePro solution Brøndby IF sought approval on its approach to GDPR compliance from the Danish Data Protection Agency The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. Another issue important to address in the implementation was compliance with European Union GDPR. The Panasonic FacePro solution is very flexible and can be configured to delete or store data as required. To meet Brøndby IF’s requirements, data from the camera is encrypted and the data and images of people not on the blacklist are never stored. In addition, the details of banned individuals are encrypted and only stored on a server blocked from the Internet and all other external systems. Brøndby IF sought permission and approval on its approach to GDPR compliance from the Danish Data Protection Agency. Facial recognition system Mickel Lauritsen, Head of Security at Brøndby IF, said: “We can see that we have decreased the amount of flares being used within the stadium during our matches. It has been a success and it’s an absolutely vital tool in order to maintain safety and security.” Gerard Figols, Head of the European security business at Panasonic, commented: “Panasonic’s facial recognition system contributes to a safer stadium environment by alleviating security pressure on the ground, while ensuring that all data is protected from unauthorized external access." "The accuracy and processing capacity of Panasonic FacePRO means that it is ideal for soccer, and other sporting stadiums around the world, as well as many other venues where security and high visitor numbers are a factor. Besides the pure security factor, our facial recognition system can also help to enhance the customer experience by providing quicker, more streamlined access or tailored services.”
HID Global, globally renowned provider of trusted identity solutions, has announced that the government of Argentina has selected its HID goID citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app. The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernization makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card. Mi Argentina app The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernization and allows citizens who download the app on their mobile devices to request appointments, receive health information and access credentials, such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline. The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens" “The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, director of Renaper, adding “This innovative application is not only easy to get, but we also believe this could be the first step in digitiszng identity across the government in Argentina and potentially other countries in years to come.” Enhanced security of citizens’ mobile identity Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft. The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required. Superior identity solutions Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals: between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years. Argentina’s implementation of our technology provides its citizens with innovative ID access" “HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global. “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.” Enhancing Border Security The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution. The HID goID technology mobile ID ecosystem powers a more secure and connected world based on field-proven identity technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customizable solution that delivers many more functions than physical identity documents.
Faced with a number of security challenges and planned future expansion, a major airport decided it was time to implement a scalable security surveillance solution. Let’s take a look at how to manage such a scenario to ensure the selected solution provides scalability for growth. With the existing proprietary solution at the airport locked down to one manufacturer and littered with issues resulting in high maintenance and expansion costs, a new solution was required that would allow the airport to scale its surveillance solution in line with future expansion plans. Difficult in identifying people The low-resolution analog cameras made it difficult to identify people during incidents Not only was the existing surveillance solution analog and proprietary, it wasn’t intuitive and was difficult for operators to use. There were several ‘satellite’ security installations scattered in the various terminal buildings that weren’t viewable in the centralized Control Room which meant extra operators were required. The low-resolution analog cameras made it difficult to identify people during incidents and coupled with the lack of video coverage, it gave operators poor situational awareness. Reviewing past events with the existing VMS was difficult as playback wasn’t synchronized and, without bookmarks, it was time-consuming to find important events. The combination of multiple terminal buildings and the centralized Analog Architecture resulted in bottlenecks and latency issues as all processing must pass through the centralized server. There was also no redundancy so if there was any failure in the system, the Control Room would no longer have the capability to view live or recorded video. Additionally, as the system was locked down to one manufacturer and the whole system had to be hardwired to the centralized server, there were very expensive expansion costs. Addressing security and scalability concerns New NVRs were specified to cope with the increase in camera streams and an extra NVR for redundancy and failoverThe required solution had multiple requirements to ensure that the existing issues were resolved and that the solution could scale with the planned expansion. With expansion planned to facilitate growing passenger numbers, an open IP based solution was specified to replace the existing analog solution to improve situational awareness, provide scalability and integrate with a number of other systems operating in the airport. The architecture needed to limit bottlenecks, reduce latency issues, provide redundancy advantages and be scalable to allow for multiple new terminal buildings to be connected with ease. New HD cameras were specified to improve image quality and coverage, with a Video Wall required in order to view and manage the increase in video streams in the centralized Control Room. New large capacity NVRs were also specified to cope with the increase in camera streams and an extra NVR for redundancy and failover. Distributed Architecture reduces data bottlenecks A solution with Distributed Architecture was chosen as it solved multiple issues with the existing solution and facilitated future expansion without the need for a centralized server. Distributed Architecture allows data to be kept close to where it is produced or needed. When cameras, surveillance workstations, NVRs, alarm servers, integration gateways, all participate in a Distributed Architecture, data bottlenecks are minimized as all processing doesn’t need to pass through a centralized server. Distributed Architecture provides a truly unlimited and scalable solution that can easily accommodate the largest airports in the world. Enhancing situational awareness Distributed Architecture enables future expansion as it can support thousands of cameras, workstations and NVRsDistributed Architecture minimized the existing bottlenecks, reduced latency, and provided higher availability and faster access to data. It also allowed all ‘satellite’ security installations to be viewed in the centralized Control Room enhancing situational awareness. New HD cameras were installed and due to the scalability of Distributed Architecture, future cameras can easily be connected when needed. Furthermore, the scalability of Distributed Architecture enabled the airport to build new terminal buildings and connect with ease to the security solution when ready. Distributed Architecture enables planned future expansion as it can support thousands of cameras, workstations and NVRs, dramatically reducing the Total Cost of Ownership (TCO). The scalability of Distributed Architecture allows the airport to continue with planned expansion and add a single camera/NVR or a whole new terminal when needed.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernization, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralized security service control center offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernization project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognizing person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimize the percentage of false responses. With this intelligent system, it is possible to immediately recognize a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customized to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload