The use of Mobile IDs in access control grows more frequent every week. That is why Idesco’s display reader, 8 CD 2.0 Pin D, will also soon accept a mobile ID from one’s smartphone. Interactive routines that require identification, like payment, are easily and securely managed with an RFID keypad/display reader providing a menu and displaying user-specific responses. That is why 8 CD 2.0 Pin D’s keypad is designed to flexibly support users’ need to select options and inp...
Device Authority, a global provider of identity and access management (IAM) for the Internet of Things (IoT), announced the latest version of its KeyScaler platform which includes enhanced device connectivity, secure data storage and support for Microsoft Azure Sphere. In today’s evolving technology-driven world, security needs to be architected into IoT devices from the moment of inception and requires a robust foundation to deliver secure updates throughout the device lifecycle. Devices...
Iris ID, the global renowned provider of iris recognition technology solutions, announced that it has begun shipping IrisTime, a new biometric time and attendance platform that offers a fully customizable and accurate solution, to meet the pioneering workforce management needs of small businesses to enterprise organizations worldwide. IrisTime IrisTime also offers a new recognition technique for authenticating employee identity that uses a fusion of iris and face recognition to increase accura...
IDEMIA, the globally renowned provider of Augmented Identity and Identity Management solutions, has announced the appointment of Andrew Boyd to the position of President and Chief Executive Officer (CEO) for IDEMIA National Security Solutions. Andrew Boyd will be responsible for the over-all strategic growth and leadership of the team, delivering state-of-the-art technology solutions that support national defense, national security, and the classified missions’ space. Security and Intell...
Alcatraz, a developer of autonomous access control products, announced it has joined the NVIDIA Metropolis Software Partner program and is leveraging the NVIDIA Jetson Edge AI platform to create a real-time machine learning and computer vision multi-sensor embedded system. Alcatraz offers the Rock, a touchless and secure physical access control platform that works with any access control system, delivering an autonomous solution on the edge. It replaces or augments badging as a credential with...
LexisNexis® Risk Solutions releases its biannual Cybercrime Report, which tracks global cybercrime activity from January 2020 through June 2020. The report dives deep into how the COVID-19 pandemic has impacted the global digital economy, regional economies, industries, businesses and consumer behavior. The period has seen strong transaction volume growth compared to 2019 but an overall decline in global attack volume. This is likely linked to growth in genuine customer activity due to chan...
Vanderbilt, a global provider of state-of-the-art security systems, announced the launch of their VCredential cloud-based credential management platform. Following the introduction of the Bluetooth Low Energy (BLE) reader family in conjunction with ACT Enterprise in October 2019, Vanderbilt’s increased expansion in this market responds to the continuing trend toward virtualization and a shift toward touchless door access. VCredential is a cloud-based credential management platform that offers users the ability to create and manage Bluetooth credentials independent of the access control platform. It’s key benefit focuses on intuitive usability and the opportunity to benefit from the latest industry technology trends. Market expansion We confidently believe that being able to offer Bluetooth credentials through all of our systems builds on our success" “VCredential clearly expands our footing in this market following our successful Bluetooth reader launch last year. Now, our BLE readers no longer only support our award-winning ACT Enterprise system. Instead, thanks to the VCredential platform, they support all Vanderbilt systems. This includes OMNIS, ACT365, SPC, as well as multiple third-party partner systems,” explains Nadine Frost, Senior Product Manager at Vanderbilt International. “We confidently believe that being able to offer Bluetooth credentials through all of our systems builds on our success in the market to date. It brings our product offering to the next level,” finishes Frost. The benefits of Bluetooth has always been convenience and ease-of-use. Following a global pandemic, they have never been more apparent or needed. This is the take of Ross Wilks, Head of Marketing Communications at Vanderbilt International. Smartphone convenience Smartphone credentials are time and cost-effective alternatives to managing physical credentials" “For example, smartphone credentials are time and cost-effective alternatives to managing physical credentials," said Wilks. "Their convenience is that they enable mobile phones to be used just like a traditional access control card or tag.” “Moreover, the creation and management of Bluetooth credentials can be carried out by the administrator directly in the cloud-based VCredential management platform for easy management.” Note: This can also be achieved in any of the Vanderbilt access control systems, or third-party systems, through the integration of RESTful APIs. Customer-first Wilks further weighs in on why the company is expanding its reach into the Bluetooth credential field. “Customer-first is one of our most important mantras at ACRE. Forward-thinking and high-performance are two others that we really care about as well. The VCredential management platform hits all of these criteria out of the park,” Wilks states. “Why we feel so strongly about this market approach is because by introducing Bluetooth readers into existing systems, it reduces the total cost of ownership. This is because it extends the life of the existing system controller and hardware, allowing a smooth migration to mobile credentials. This benefits everyone.” “Furthermore, Bluetooth introduces a new level of end-user convenience. By removing the need for a physical credential, and introducing Bluetooth-enabled smartphones as a mobile credential, it provides end-users with a seamlessly smooth user experience,” says Wilks. No hidden costs Importantly, the VCredential is supporting the same perpetual license model as currently offered under ACT Enterprise. There are no hidden costs as the price per credential is paid up-front and does not reoccur on a monthly or yearly basis thereinafter. In addition, Vanderbilt is not asking for an annual maintenance fee and covers upgrades and support of this service free-of-charge. “For existing users of BLE readers with our ACT Enterprise,” Wilks concludes, “The approach here is the same and is based on convenience and simplicity. It mimics the same approach as the ACT Enterprise software interface. The only difference is that the credential management instead takes place through the VCredential platform.”
Blaine Fredrick has joined Alcatraz as Vice President of Product to lead the technology startup in product development as it delivers its secure, autonomous access control platform. As VP of Product, Frederick serves as a liaison between business, technology and user experience. He manages all components of the Alcatraz Rock product from strategic planning to tactical activities. He connects internal resources with the needs of the addressable market and guides the development of product requirements including features, pricing, and positioning. He also works closely with engineering during development to maintain alignment with product requirements. Autonomous access control “As we pioneer a new sector of the security industry – autonomous access control – Blaine will play a critical role to bring the Alcatraz Rock platform to market,” said Alcatraz Chief Revenue Officer Tina D’Agostin. “Blaine’s impressive experience as a security consultant and in product management and engineering roles with some of the leading names in biometrics and physical security is a great asset to Alcatraz.” Frederick joins Alcatraz from BDIS Group, a physical security consulting firm where he served as Principal. Prior to founding BDIS, he served as VP of Product Management for biometrics security firm EyeLock and as Product Manager, Software Team Leader, and Senior Engineer for global security integrator STANLEY Security. Verifying identities and detecting tailgating Frederick earned a Bachelor’s Degree in Electrical Engineering from Purdue University Frederick earned a Bachelor’s Degree in Electrical Engineering from Purdue University. “I joined Alcatraz because I believe that we have the team and the technology necessary to fundamentally change the way people view and use access control,” said Frederick. “Alcatraz looks at the problem of access control differently – instead of thinking about biometrics as solely a means to replace a traditional credential, we are looking at how we can improve the experience of not only the user, but also the business manager, the system administrator, and the installer. By creating a device that can autonomously make complex, real-time decisions – including verifying identities and detecting tailgating – we change the entire access control paradigm.” Facial authentication solution Alcatraz has changed the way that companies leverage access control systems by providing a facial authentication solution that leverages 3D, artificial intelligence, and analytics to modernize existing access control technology. Enterprises are choosing to deploy the Alcatraz Rock as their first line of defense against unauthorized access to deliver effective and secure autonomous access control. Because Alcatraz's platform also detects masks, it has become the perfect COVID-era solution for businesses that want to deliver touchless security in their buildings, while observing state and local mask mandates.
Sectigo, a provider of automated digital identity management and web security solutions, and Managed Security Service Provider (MSSP) Trustify, have partnered to deliver advanced web security solutions to companies of all sizes across Europe, the Middle East, and Asia. The new partnership combines Sectigo's all-in-one Web Security Platform with Trustify's digital signing, email security, and professional management; now available as Trust365. "Sectigo is the first Certificate Authority (CA) to offer a comprehensive website security solution, combined with industry-leading TLS/SSL certificates," said Michael Fowler, President of Channel Partners, Sectigo. "Trust365 enables additional services that are fully managed for customers by security experts so that they can focus on their core business and feel confident they are protected from cyberattacks." Cybercrime prevention Trust365 brings together best-in-breed web security technology from Sectigo and Trustify, either fully automated or fully managed for customers. Available as an all-in-one solution bundle or as a la carte products, Trust365 includes: Sectigo SSL certificates Sectigo's eight-layered Web Security Platform Web Detect: Daily malware and vulnerability scanning Web Patch: Automated vulnerability and CMS patching Web Clean: One-click malware removal Web Backup & Restore: Daily website backups and one-click restore Web Accelerate: Global Content Delivery Network (CDN) Web Firewall: Continuous DDoS protection with WAF Web Comply: Simplified PCI Compliance Web DNS: Sectigo’s Global Anycast DNS TrustiMail—Fully-encrypted secure email, user-friendly across all key email platforms TrustiSign—Advanced electronic signing solution Simple integration "Trustify is continuously innovating to secure organizations from cybercrime and downtime," said Alistair Murray, CEO & Founder, Trustify. "We selected Sectigo because they share this vision with us, offer a complete portfolio that other CAs do not offer, and they made it incredibly easy to deploy with simple integration into a single API."
The Security Industry Association (SIA) has stated that the decision by the City Council of Portland, Oregon, to ban facial recognition technology use by businesses in places of public accommodation, starting January 2021 and to prohibit all city government use of facial recognition technologies are shortsighted decisions that do not consider effective and beneficial applications of facial recognition. Ban on facial recognition tech use The Portland ordinance prohibiting private entities’ use of facial recognition technologies affects any business providing goods, services or other accommodations to the public and will impact businesses’ ability to protect workers, customers, facilities and property, since it effectively targets business use of security systems. “Turning back the clock on technological advancement through a complete ban on private-sector use of technology that clearly keeps our fellow citizens safe is not a rational answer during this period of social unrest in Portland,” stated Security Industry Association (SIA) Chief Executive Officer (CEO), Don Erickson. Educating masses on facial recognition technology It is hardly a model approach to policymaking that any government should adopt" He adds, “It is hardly a model approach to policymaking that any government should adopt. Let’s act together now to thoughtfully educate the public about the legal and effective use of facial recognition technology, while at the same time, being mindful of legitimate questions raised about the impact of this technology on all stakeholders, including communities of color.” Don further stated, “We continue to invite local leaders across the country to work with us to develop more sensible approaches to the use of facial recognition.” SIA’s Senior Director of Government Relations, Jake Parker, provided his testimony at the Portland City Council hearing on Thursday, Sept. 9, 2020, in opposition to these widespread prohibitions on the use of facial recognition technology. National Institute of Standards and Technology research paper As part of the council’s discussion, Portland City Councilwoman, Jo Ann Hardesty stated prior to the vote that the council would revisit the ban when there is technology that is not racially biased and is tested by independent third parties. SIA notes that such technology is available in the current scenario, and in July, SIA authored and submitted a letter to Portland’s Mayor and City Council, which noted the National Institute of Standards and Technology’s research paper that documented that high-performing algorithms perform equally well across different demographics. The letter stated, “The National Institute of Standards and Technology (NIST), the world’s renowned and foremost authority on this technology, found last year that the highest performing technologies had ‘undetectable’ differences across demographic groups, with accuracy rates well above 99% and undetectable false positive differences across demographics, even when tested against galleries of up to 12 million images.” Lawful, ethical and nondiscriminatory use of facial recognition SIA believes all technology products, including facial recognition, must only be used for lawful purposes SIA believes all technology products, including facial recognition, must only be used for purposes that are lawful, ethical and nondiscriminatory, and recently released and committed to a series of principles to be used in the development and deployment of facial recognition, ensuring the technology is used in a transparent and nondiscriminatory way that implements privacy protections and human oversight into its use. SIA welcomes working with cities and government on future facial recognition ordinances and policies to ensure decisions are based upon facts and a complete understanding of current technologies and that such policies consider widespread public support for the benefits of this technology. SIA protects and advances its members’ interests by advocating pro-industry policies and legislation at the federal and state levels, creating open industry standards that enable integration, advancing industry professionalism through education and training, opening global market opportunities and collaborating with other like-minded organizations.
Sectigo, a renowned provider of automated digital identity management and web security solutions, announced the launch of its PKI Risk Assessment Tool designed to help medium and large enterprises assess their exposure to essential security risks. The resource provides IT and cybersecurity professionals with a brief questionnaire, then produces a custom report that evaluates the organization’s risk level across 8 different Public Key Infrastructure (PKI) use cases, so that teams can focus on critical vulnerabilities. Protect valuable assets The PKI Risk Assessment Tool, available now for any enterprise to download at no cost, determines the risk level for each specific use case independently, making the approach unique to Sectigo and the security market as a whole. The new Sectigo PKI Risk Assessment Tool helps educate IT professionals about the many use cases for PKI and its benefits, and where vulnerabilities lie, so that they can future-proof their cryptography, reduce the risk of outages or breaches, and keep security standards high. Though PKI has been around for years, its applications in the enterprise have evolved exponentially" “Though PKI has been around for years, its applications in the enterprise have evolved exponentially with the likes of DevOps, IoT, IAM, making the need for automation and crypto agility greater than ever,” explained Tim Callan, Senior Fellow at Sectigo. “We are proud to provide the industry with this unique resource so that IT professionals can better uncover the risks they face and then make well-informed business decisions to protect their most valuable assets.” Combined software development In recent years, PKI solutions have evolved to become even more versatile, harnessing automation, orchestration, scalability, crypto-agility, and visibility. The PKI Risk Assessment Tool identifies a risk level for the current environments that are applicable to most modern businesses, focusing on 8 important use cases: Web servers - Web and application servers hosting either external or internal applications Email - Enterprise email systems for employees Networked devices - Computers and mobile devices connected to the enterprise network IoT devices - Computing devices and mechanical and digital machines with the ability to transfer data over the enterprise network Application development - Development of proprietary software applications for either external or internal use DevOps Environment - Combined software development and information-technology operations environment using containers Key management in public cloud - Third-party cloud PaaS or IaaS environment hosting external or internal applications SSH-based server management - Control of employee access to services through SSH Keys Protect digital identities The PKI Risk Assessment Tool is particularly useful for Sectigo customers. While Sectigo Certificate Manager seamlessly deploys and automates lifecycle management of PKI certificates across all use cases, the tool helps enterprises prioritize which use cases put them at the most risk so that they can take action to protect digital identities across users, applications, web servers, IoT devices, and more.
Maxxess Systems, a globally renowned company in event response management and collaboration systems, is pleased to announce that they have entered into a global strategic partnership with WaveLynx Technologies, leveraging complementary technology innovations and a shared focus on expanding market adoption of mobile access control. Ethos Readers and LEAF credentials Maxxess Systems will serve as a reseller of WaveLynx Ethos Readers and LEAF credentials, and will develop an end-to-end mobile access solution integrating Wavelynx MyPass technology for automatic mobile credential provisioning into Maxxess’ suite of security and safety management solutions. “The current security environment has demonstrated to all company leaders the importance and value of mobile credentials,” said Nancy Islas, President of Maxxess Systems, adding “WaveLynx MyPass Mobile Credentials provides convenient security while complimenting Maxxess mobile suite of safety solutions.” Maxxess eFusion solutions Laurie Aaron, WaveLynx Technologies, Executive Vice President stated, “WaveLynx Technologies drives our products into the market through our loyal, value-added OEM partners and we’re excited to partner with Maxxess Systems. WaveLynx reader devices and our LEAF enablement align with the innovative culture of Maxxess eFusion solutions and the partnership will help WaveLynx expand our international presence in South America, Europe and the Middle East.”
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
Beginning September 1, 2020, six Vision-Box Automated Border Control (ABC) eGates will greet arriving travelers enrolled in the NEXUS Program at Winnipeg International Airport. As the only international airport in the Province of Manitoba, Winnipeg is an important travel hub for the region, having served close to 5 million aviation passengers in 2019. NEXUS program NEXUS is a trusted traveler program operated by Canada Border Services Agency (CBSA) that expedites border crossings for pre-approved and enrolled Canadian, American, and Mexican citizens. Travelers enrolled in the NEXUS program avoid border entry lines by using specially reserved lanes equipped with identity screening platforms for expedited checks when entering the country from anywhere in the world. Automated Border Control (ABC) eGates ABC eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers The Automated Border Control (ABC) eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers from all international locations using safe and secure automated biometric facial matching. “Finding better ways to serve the needs of travellers is paramount for Winnipeg Airports Authority,” said Barry Rempel, WAA President and Chief Executive Officer (CEO), adding “Adding Vison Box eGates for NEXUS users at Winnipeg Richardson International Airport not only enhances the customer experience but sets the foundation for future innovation and brings us one step closer to seamless, touchless passenger travel.” NEXUS touchless solution This is the first time that ABC Biometric eGates are being deployed to process NEXUS enrolled Travelers, instead of the regularly used NEXUS kiosks. It is also the first NEXUS touchless solution that will improve the border clearance process and give NEXUS travelers a unique convenience at the airport. The deployed GT-11 eGates are part of Vision-Box’s newest generation digital identity systems and will use the latest advances in biometric technology to securely and efficiently clear travellers using digital facial matching. The GT-11 eGates offer a smaller footprint than the previous NEXUS kiosks and are part of a modernizing process for a seamless travel journey from curb to boarding at Winnipeg International Airport. Remote installation of border digital identity software This may also be the first time that a complete remote installation of border digital identity software has been successfully attempted and completed. Because of the COVID-19 pandemic that quickly spread across the globe, work at Winnipeg International Airport had to be stopped in February 2020, with only the physical installation of the eGates completed. Software and systems setup The ability to go live with a remote orchestrated installation is a major accomplishment" Logical setup of the software and system testing, prior to going live was then completed entirely from Vision-Box Lisbon headquarters, in close collaboration with Canada Border Services Agency (CBSA), using a dedicated secure connection. By remotely installing a border processing system, Vision-Box proved the feasibility and security of a remote installation process that could lead to far-reaching industry changes and cost-saving measures. “The ability to go live with a remote orchestrated installation is a major accomplishment,” said Miguel Leitmann, Vision-Box’s Chief Executive Officer (CEO), adding “Our team, along with CBSA and members of the Winnipeg Airport Authority worked tirelessly across time zones, with frequent and intense communication, to make this happen. I couldn’t be prouder of this accomplishment and I congratulate all the agencies and people involved in making this project a reality.” Orchestra Digital Identity Management Platform Vision-Box’s Orchestra Digital Identity Management Platform will manage the Nexus border clearance and crossing process. Orchestra manages in real-time the necessary parameters of traveler identification at the crossing point. After the traveler scans their NEXUS member card, a photo is taken of the traveler’s face and a secure identification match is made against the biometric facial information in the traveler’s NEXUS membership profile. This system gives CBSA and Winnipeg International Airport added flexibility with faster dedicated lanes that simplifies the airport border clearance process along the way.
Lufthansa Technik operates in a special division of the aviation industry, and security is a top priority to safeguard its people, planes and facilities. Over the years, the need to control access to its premises - particularly when it comes to external visitors - has become increasingly more important. A key challenge, however, is that Lufthansa Technik wants to maintain an inviting environment that feels free from restrictions, while also ensuring the highest security standards. Although Lufthansa Technik wants to prevent unauthorized access, it doesn’t want to hinder employees as they go about their day. It’s really important to the business to find the right balance between security and convenience, so people can feel secure but also free as they move around. And employees have a dynamic work environment that supports them in performing to the best of their ability. Unified access control Another key objective for Lufthansa Technik’s new access control system was unification. It has more than 35 locations and 100,000 employees worldwide and, in the past, each site was responsible for its own security. This would sometimes involve hiring specialists to solve the same problems at different locations. Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system Lufthansa Technik wanted to avoid this and ensure not just consistent security standards but a culture of great connection where people can easily network and collaborate wherever they’re based. As a result, Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system and follow the same standardized security policy. Access control system It also wants all employees to be able to use one single Lufthansa Technik badge to access all the locations they’re authorized to access - both locally and internationally. It was a big challenge to begin tackling, particularly when considering the IT challenges of implementing a unified access control system in multiple locations around the world. Lufthansa Technik began its search to find the right access control system by thoroughly researching the market and issuing an in-depth tender to a variety of suppliers. After detailed comparison, it chose Nedap. Melf Westphal, Head of Security Solutions at Lufthansa Technik, explains: “We were really impressed with Nedap’s entrepreneurial culture, hands-on mentality and personal approach. They were really reaching out to us, determined to find out exactly what we need. So we decided to implement Nedap’s AEOS system, which has helped us tremendously in meeting our requirements and creating a single system.” Security with convenience People set free to perform at their best Lufthansa Technik’s goals for its access control also align with Nedap’s people-first approach to providing ‘Security for life’. Nedap believes that a security system should be designed around the people using it, rather than the technology driving it. This ‘Security for life’ concept underline’s Nedap’s desire to free people’s minds from security so they can make the most of each day. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg Which, in turn, mirror’s Lufthansa Technik’s desire to balance security with convenience. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg, where it has 10,000 employees, followed by four affiliate locations. Melf says: “We weren’t sure at first how to go about it. But we got a lot of help from Nedap and their excellent partners, who were a great help to us during the implementation phase." Create tailormade solutions "The pilot project enabled us to overcome two major challenges: how to implement AEOS access control in our IT infrastructure and how to involve our employees. In both areas, Nedap and their partners did a wonderful job,” he continues. “It wasn’t only the really good products they presented to us. With their support, and that of their dedicated partners, they helped us solve all the operational issues." "And through their partner network, they enabled us to create tailormade solutions by offering third party integrations that matched our security demands. It’s meant that instead of barricading ourselves in we have relative freedom of movement. I feel very secure but I can use my badge to go anywhere. We have fantastic solutions and, importantly, the same Lufthansa Technik ID badge connects all of us – no matter where we’re based.” Third-party integrations The AEOS access control system that Lufthansa Technik implemented goes beyond just securing doors; they installed additional components such as key cabinets and visitor management. Melf says: “AEOS was a great help in this respect - it enabled us to bring in third-party providers. As Nedap has an ethos of working closely with third-party technology partners, and AEOS integrates easily with other systems, it means we weren’t restricted to just one solution." "We had the flexibility to create exactly what we wanted. I have a slogan when it comes to our security: ‘We open doors rather than close them.’ That’s really important to me,” Melf Westphal, Head of Security Solutions at Lufthansa Technik. For Lufthansa Technik, a key aspect of the pilot project and subsequent rollout is getting employees on board with the new access control system. Significant investment in training Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment It believes that even the best access control system loses its value if the people working with it don’t have the right mindset. For this reason, Lufthansa Technik made a significant investment in training, communication and awareness campaigns. These focused first on letting employees know how valuable they are, how important security is and why the security changes are being implemented. They’ve also made employees aware of the importance of anticipating security risks and of their own role in Lufthansa Technik’s security management system. Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment. And they’re all trained in how to respond to a security alert and address someone if they see them in a place they’re not supposed to be. New security system Importantly, Lufthansa Technik employees understand that their AEOS access control system is as much about preserving their freedom as it is about locking down their safety. The next steps for Lufthansa Technik are to continue rolling AEOS out worldwide. Melf explains: “The success of our new security system hasn’t gone unnoticed. Other Lufthansa Technik facilities have seen that AEOS has proved itself in practice in Hamburg, in a facility with 10,000 employees." "And we’ve seen an increase in requests for similar systems from facilities all over the world. Our goal now is to implement AEOS in all our locations worldwide, so we can truly build a unified security system that connects the entire Lufthansa Technik family. A security system that allows us to open doors, not close them.”
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Ava helps the team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them. Spotlight brings relevant feeds to the operator’s attention and triggers real-time alerts to address threats before they escalate. Leverage integrated video and audio analytics to give an enhanced understanding of the camera feeds. Respond to loitering challenges, access anomalies, theft incidents, fires, and more. Identifying suspicious people Smart Search allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, identifying suspicious people like unescorted visitors, investigating health incidents or damage to the property, performing cleaning crew inspections now take minutes instead of hours. Combine with access control to identify tailgating or fire or active shooter scenarios To gain occupancy insights, operators can leverage Ava Aware’s unique Map view with Smart Presence. By adding floor plans and maps of premises, people and vehicles appear as dots in their precise on-site locations. Operators can see live footage as they move on the cameras’ fields of view. Combine with access control to identify tailgating or fire or active shooter scenarios. Connect Ava Aware to the cloud to achieve easy and simple deployment and access from anywhere in the world. Share links of recorded video with team members, claim investigators, and law enforcement, regardless of whether they have admin access to Aware or not. Get a secure download of video files in a standard mp4 format with digital watermarking for authenticity. Key benefits delivered are as follows: Integrate with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Increase operational productivity and reduce facility costs Distribute heat and cooling efficiently, optimize cleaning and workplace productivity through hot-desking insights Use people flow insights to manage people and vehicle queues efficiently Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava appliance— small footprint support for larger facilities One-click Ava Dome and Ava 360 camera configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licensing model, Vaion always includes services and software upgrades. They no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Retailers face complex challenges that range from loss prevention and maintaining a safe environment for both customers and staff to improving customer experience and operational productivity. Choose Ava Unified Security (formerly Vaion) to ensure security operators can tap into advanced analytics to detect and react to anomalies in real-time. Additionally, store managers can use Ava’s customer intelligence insights to increase profits and meet the customers’ needs. Leverage Ava’s machine learning anomaly detection to get alerts on people and vehicles loitering or cars present out of hours. Facilitating advanced analysis Get a clear understanding of activity at rear entrances, aisles, or end-caps by counting people who congregate in certain areas. Track cash register points to minimize thefts and identify return frauds. Authorized users can share links of recorded video securely with team members, claim investigators, and law enforcement. Monitor queues and the number of employees behind counters to ensure minimal waiting time Use counting of people and vehicles entering and exiting to analyze store performance, footfall, queues, and allocate more staff during busy periods. Download and share historical data of occupancy information with store managers to facilitate advanced analysis. Improve store safety by detecting verbal aggression, robberies, and vandalism, and empower security operators to act before incidents escalate. Track goods and control access as vehicles are entering your warehouses. Get notifications in real-time when trucks are approaching loading docks and prevent the damage of fleet and storage areas. Monitor queues and the number of employees behind counters to ensure minimal waiting time. Use Ava’s powerful search features to investigate across all stores, warehouses, and distribution centers and identify repeat offenders or suspects. Enhanced overview of operational insights Increase operational productivity and reduce store and warehouse costs Distribute air efficiently to match economics and customer comfort Use people flow insights to manage queues efficiently Understand the customers’ in-store activity and which are the least and most visited areas Enhanced customer experience Get insights on the customers’ in-store traffic patterns Instant notification when queues are detected to allocate staff according to the busiest business hours Find out which of the locations perform the best and why Saving storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava vserver appliance—small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that NC State University in Raleigh, North Carolina, has installed new turnstiles as part of a major renovation of their D. H. Hill Library. Founded in 1887 as a public, land-grant, research university and part of the University of North Carolina system, NC State is the largest university in the Carolinas. The university is home to two libraries: the D. H. Hill Jr. Library on the North Campus and the James B. Hunt Jr. Library on Centennial Campus. Different common spaces The Hill Library houses over one million volumes of the libraries' total collection and offers a number of different common spaces for work and study. A recent renovation transformed the interior with the addition of an open grand staircase. The stairs connect the second and third floors to the lobby and flood the space with natural light. Two of the new turnstiles are for visitors entering the library, and the other two are dedicated for those exiting As part of this renovation, four Boon Edam Lifeline Speedlane Swing optical turnstiles were added to the Hillsboro Street entrance on the north side of the building. Two of the new turnstiles are for visitors entering the library, and the other two are dedicated for those exiting. The Hill Library is open to the general public during certain hours, with visits limited to the campus community the rest of the time. Exterior swinging doors lock During the day when the library is open to all, the turnstile barriers are kept open for free entry and exit. After general hours, the exterior swinging doors lock and authorized visitors must use their ID badges to unlock the doors and subsequently pass through the turnstiles. The Speedlane Swing turnstiles are known for their ultra-slim, stylish cabinets as well as their user friendly and responsive LED lighting system, which turns on when users approach and shows where to present their badge. The turnstiles offer support to security staff in the library lobby, helping ensure that no unauthorized individuals can access the library during non-public hours. If tailgating occurs, the turnstiles sound an alarm and security staff can respond immediately. Avoiding barrier contact On a typical day during the school semester, the turnstiles process approximately 6,000 to 7,000 students and other visitors. During the summer, this number drops to 400, but during exam time, usage peaks with up to 10,000 people entering the library every day. The campus population had no difficulty adapting to the new turnstiles at the Hill Library The campus population had no difficulty adapting to the new turnstiles at the Hill Library, as there were already turnstiles in place at the Hunt Library. According to Travis Tyo, the Director of Facilities for the Libraries, the new Speedlane Swing turnstiles were an improvement from the older turnstiles, due to their accurate ability to sense tailgating attempts and avoid barrier contact with fast moving users. Implementing another installation The University is already implementing another installation of Speedlane Swings at the south entrance to the Hill Library. The new entry will match the layout of the north entrance, with four turnstile lanes and a security guard on site. A future installation at the Hunt Library is also in the works. Travis says of the installation, “We worked closely with our Security and Applications Technologies departments here on campus; we tested different products and everybody liked the Boon Edam turnstiles and the ability of the company to respond whenever we need them. Ultimately it is much simpler and more efficient to have people badge in than to have a security guard look at IDs as each person enters the library.”
Marian University is a school with a mission. Having transitioned from a liberal arts college to a comprehensive university in 2009, it has become one of the private education institutions in Indiana. And that’s not all: the university has ambitious goals to grow its programs and broaden its mandate even further. Currently, the school has over 500 staff members and more than 3,500 students from across the United States and around the world. And by 2025, it aims to double its number of annual graduates. Located just ten minutes away from downtown Indianapolis, Marian University’s close proximity to a major center of American business, finance and culture is a major selling point. Managing increased traffic The city is also experiencing an influx of technology companies, making it the fifth-fastest growing municipality in the country for high-tech jobs. However, as in many booming regions, economic success isn’t evenly distributed. While some areas have experienced revitalization, others have seen social unrest and rising crime rates. As such, while Marian University’s campus has the privilege of sitting near a bustling city, these challenges aren’t far away. That fact — along with the increasing number of staff and students on the premises — motivated the university to upgrade their security systems to help keep both its people and the wider community safe. Marian University’s previous security system wasn’t up to the task of monitoring the premises, staff and students — so how would it manage increased traffic and additional properties as the school met its growth targets? High definition cameras ACC™ software is much more than a centralized source from which to review recorded video The ongoing maintenance and licensing costs were also prohibitive. Administrators were at a loss of what to do until the security integrator they were working with suggested Avigilon. With high definition cameras and built-in analytics that seamlessly integrated with Avigilon Control Center (ACC) video management software, it offered a comprehensive, intelligent and scalable solution. Additionally, the licensing fee was a one-time cost, saving the school both time and money. As the security team at Marian University found out, ACC™ software is much more than a centralized source from which to review recorded video. Not only can security operators analyze the video by zooming in and rewinding in real-time, but Avigilon Appearance Search™ technology leverages AI technology to help them instantly locate specific individuals and vehicles of interest. Advanced video analytics Furthermore, Unusual Motion Detection (UMD) technology uses advanced video analytics to flag events that may require further investigation and filter them in the recorded video timeline, allowing security operators to find and review these instances faster. All of this was made possible with the installation of intelligent Avigilon cameras and network video recorders (NVR) across the campus. “The organization is tremendous to work with,” says Ray Stanley, CIO/Vice President of Marian University. “I have never worked with a security company where I've been able to pick up the phone and have someone to help solve issues and make sure we are using the product the right way so that we see good value for our money. This was true not just in the beginning, their support exists right to this day.” Intelligent security system Avigilon coordinates with local third-party integrators to make sure the system is functioning Instead of sending Marian University setup instructions and leaving the security and IT teams to figure it out for themselves, Avigilon coordinates with local third-party integrators to make sure the system is functioning and actively helps operators learn how to utilize it to its full potential. Personnel will come onsite to work with staff and guarantee they know how to get the most from their various video analytics platforms and solutions. The main buildings at Marian University may be surrounded by quiet woodlands and wetlands, but the campus isn’t as isolated as it appears. Being a mere ten minutes away from the middle of Indianapolis, the school’s property borders several roadways, businesses and residential neighborhoods that all benefit from having an intelligent security system in the vicinity. Keeping the community safe “The great quality video has helped keep the community safe, without a doubt,” says Ray Stanley, CIO/Vice President of Marian University. “In one case, local police were able to identify a suspect involved in an incident at a nearby gas station because of our Avigilon system. Being able to help our surrounding community stay safe is absolutely an added benefit for us.” With its Avigilon solution, the Marian University campus has become an extra set of eyes for law enforcement. UMD and Avigilon Appearance Search technologies mean that criminals who make the mistake of moving across campus have a much higher chance of being detected by the authorities who can then quickly track their route to see where they have been and where they are headed. Potentially-Dangerous behavior It enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis With its user-friendly interface and high-quality video, the security installation not only helps with police work and prosecution, but it enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis, creating a safer environment for students and staff. "For example, we were able to see a suspect driving at a high rate of speed across campus, and with Appearance Search, we were able to see where the vehicle went and identify the suspect,” says Chief Richard Robertson, Marian University Police Department. “That helped us to save a lot of trouble and potential injuries.” Protecting local communities In the United States, Indianapolis looms large not only as the crossroads of the country — two-thirds of Americans can drive to the city in ten hours or less — but also as a hub of innovation and investment. However, safety continues to be a top-of-mind issue as crime increases in certain sections of the city. This is why Marian University chose Avigilon: as the school aims to provide a safe space for students and prepare them for the many opportunities Indianapolis has to offer, there’s also a deep-seated obligation to help protect local communities and public spaces. Avigilon allows it to do both — and even better, the solution will be able to scale with the university as it evolves and expands in the years ahead.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?