Internet of Things (IoT)
Videonetics, the world’s first AI & Deep Learning-powered Unified Video Computing Platform (UVCP) provider, has announced the integration of its Intelligent VMS 3.0 software with Perimeter Intrusion Detection System (PIDS) of Future Fibre Technologies (FFT). Technology integration The technology integration will empower users to monitor zone alarms and videos from a centralized system, providing further situational awareness, maximizing preparedness and response to perimeter breach o...
The number of cyber-attacks on companies, governments, and individuals has been consistently rising in recent years, with global ransomware attacks increasing significantly in 2020, up 485% in compared to 2019. Tackling cybersecurity and protecting key critical infrastructure is key to national security, and the quick pivot to remote working during the COVID pandemic has seen even the most prepared organizations face new security challenges, with cybercriminals quick to take advantage. This is...
HENSOLDT has announced the appointment of Celia Pelaz to the Management Board of the company as of July 1, 2021. As Chief Strategy Officer, she will be responsible for the strategic positioning of HENSOLDT, as well as its business development. Additionally, Celia Pelaz will continue to lead the Spectrum Dominance and Airborne Solutions division, as well as HENSOLDT Ventures. With this step, the Management Board of HENSOLDT will be expanded from three to four members. Management Board expansion...
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as...
Clavister, a globally renowned company in high-performance cyber security solutions, has announced the launch of the latest generation of Clavister NetShield Virtual, highly regarded as one of the world's fastest virtualized solution for securing 5G networks. With data rates of over 600 Gbps on a single Intel Xeon-based server, Clavister sets a new high-water mark for 5G Security capacity. Virtualized solution for 5G networks With the proliferation of virtualization, there has been a steady i...
IDIS has announced powerful and affordable options for integrating video, access control, life safety, and building management systems between its end-to-end video technology solutions with Gallagher’s access control solutions. This powerful off-the-shelf integration, from Korea’s renowned video manufacturer, gives systems integrators and end users everything that they need for complete, future-proofed site control. It enables straightforward integration of powerful security managem...
Core to Cloud, an innovative cybersecurity solutions provider that enables secure digital business in a world of growing threats, announced the recent appointment of Phil Howe as Chief Technology Officer. Phil Howe joined the business to drive forward several new technology initiatives, working closely with customers to ensure that their needs are met, but more importantly that they stay one step ahead of the cyber-criminals. Particularly in the current post-pandemic environment, where there has been a significant reported increase in cyberattacks, it is now more important than ever that organizations have the right cybersecurity strategies and solutions in place. With in-depth industry experience and a strong focus on healthcare, education, compliance, and security, Core to Cloud creates bespoke solutions that effectively help organizations with visibility, validation, governance, compliance and response to cyber threats. Innovative solutions Core to Cloud was an integral part of our team and really hit the mark, bringing innovative solutions to us" Along with its extensive work within the public sector, its unique, consultative approach has positioned the firm as one of the most trusted cybersecurity specialists out there. In the last couple of years, Core to Cloud has quickly gained a reputation for bringing highly disruptive security technologies to market and this was one of the key reasons why Phil took on the new role. Phil Howe, CTO, Core to Cloud comments: “The tech Core to Cloud has in its product stack is best of breed and very innovative. I have worked with Core to Cloud for the past five years and have been a customer when I was deputy CTO at Bolton NHS Foundation Trust. At the Trust, we had a small IT security team and I needed a partner who could work alongside my team, who really understood my needs, who I trusted, who listened and came back with solid recommendations to help overcome some of the challenges we were facing.” “Core to Cloud was an integral part of our team and really hit the mark, bringing innovative solutions to us that were really fit for purpose. They helped us build out the security for the organization and I was so impressed with the company culture and ethos, not to mention its growth ambitions, that I decided this was the right place for my next career move and I’m really excited about the opportunity.” Lack of time and resources Phil Howe is a highly experienced senior IT manager with hands-on knowledge of developing new technologies" James Cunningham, Founder and Director, Core to Cloud adds: “We are delighted that Phil has joined us. We work with a lot of NHS Trusts and it is great to have someone on the ground, in our team, who can really relate to the challenges that some of these Trusts are grappling with. Most have relatively small teams, a lack of time and resources, and are being hit daily with requests while also trying to defend against the bad guys, so it is great that Phil can immediately relate to this and has the experience to help remediate.” “Having spent over 18 years working in the NHS, Phil Howe is a highly experienced, multi-skilled senior IT manager with hands-on knowledge of developing new technologies within large and critical IT infrastructures.” Prior to joining Core to Cloud he was Deputy Chief Technology Officer at Bolton NHS Foundation Trust. Here he led the third line and projects team, focusing on technical strategy and program management as well as developing, funding and delivering key IT projects and systems to support IT security and the delivery of patient care within a large and complex organization. Emerging technologies He joined the Trust in 2008 and worked for over a decade in several senior technical roles before being promoted to Deputy Chief Technology Officer. Prior to joining Bolton NHS, Phil Howe was a senior IT specialist for Ehealth at NHS Dumfries and Galloway. Cylera reduces security risk and provides key information for segmentation, and for IT and DSPT returns as well A Prince2 practitioner, Phil Howe also has extensive experience working in the private sector and spent more than four years at Northgate Information Solutions as a senior technical project specialist and engineer. Now, as part of the Core to Cloud team, he will help the business grow and move to the next stage in its rapid development. Looking forward, Core to Cloud is committed to delivering best of breed solutions for its clients and, even in the last six months, has brought several new and emerging technologies to market that exactly meet client requirements. One specific technology that NHS Trusts have identified a gap in is security for their IoT medical devices. A number of Trusts reached out to Core to Cloud, who had just partnered with Cylera, who provide a complete asset list of all connected devices. Granular device information Phil Howe adds, “We had multiple customers asking us for an IoT solution that would provide a complete asset list of all their connected devices and provide a clientless way to secure medical devices as well as highlight their vulnerabilities, show granular device information and utilization as well as provide the information needed for segmentation. We researched and tested the market and found the best fit was the new Cylera solution, which is custom built for hospitals and provides rich information for IT, IG and Medical Engineering.” There are clear use cases for Cylera. The product ensures providers regularly patch their devices, (the large majority will not allow client installs to monitor this). It also provides rich device information to assist around device life and replacement, allowing Trusts to plan this into their capital programmes. And finally, Cylera reduces security risk and provides key information for segmentation, and for IT and DSPT returns as well.
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has expanded and updated its line-up of PTZ cameras to include six new models. The cameras are available in 4K/6MP/2MP resolutions with 25x/40x optical zoom ranges to fit any use case. New PTZ Plus cameras Featuring the groundbreaking Wisenet 7 chipset, the new models include three IR models (XNP-9250R, XNP-8250R, XNP-6400R) and three non-IR models (XNP-9250, XNP-8250, XNP-6400). The new PTZ Plus cameras are 65% lighter than conventional PTZ cameras and include a re-designed twist-lock mounting feature to simplify installation. A single HPoE RJ-45 is the only connection required for power and data. Wise IR allows for monitoring in complete darkness, up to 200 meters away in crisp detail. AI deep-learning algorithm for object tracking The new cameras utilize an AI deep-learning algorithm for powerful object tracking (person or vehicle) The new cameras utilize an AI deep-learning algorithm for powerful object tracking (person or vehicle). Operators can simply right-click on an object to engage the target-lock tracking feature. The PTZ mechanism achieves a pre-set accuracy of ±0.1º, allowing the camera to move to the correct position within one second. The new dome design also enables significantly enhanced tilt angles, including 20º above the horizon and 90º straight down. The PTZ Plus cameras also feature a new dome shape, built to repel water coupled with a unique ‘triple-spin’ drying and heating function that can be operator activated by a customized soft-trigger from a VMS, like Wisenet WAVE. Offering a variety of configurations “Our new PTZ Plus cameras provide a variety of configurations to suit the unique requirements of any installation,” said Ray Cooke, Vice President, Products, Solutions and Integration, Hanwha Techwin America. Ray Cooke adds, “The lighter design with simple twist lock mounting makes installation easier than ever. With up to 4K quality, 40 and 25x optical zoom, AI- based object auto-tracking and innovative water removal features, Hanwha Techwin have raised the bar again.” Support for ‘extreme’ Wide Dynamic Range technology With Wisenet 7 SoC at their core, the new PTZ cameras support Hanwha Techwin’s proprietary ‘extreme’ Wide Dynamic Range (WDR) technology. This enables the cameras to capture ultra-clear images from scenes, containing a challenging mix of bright and dark areas. Wisenet 7’s enhanced noise reduction technology minimizes motion blur and image artifacts, while increasing object sharpness and definition. High level of cyber security Wisenet 7 offers the highest level of cyber security possible, by embedding unique certificates and encryption keys into every camera during manufacturing. The PTZ Plus cameras feature IP66, IK10, NEMA4X, & NEMA-TS 2 ratings.
Aryaka®, the front-runner in fully managed Cloud-First WAN and SASE solutions, announced that it has acquired Secucloud GmbH, a proven SASE platform provider, delivering network security from the cloud. The deal closed in late April 2021, and Secucloud is now a wholly-owned subsidiary of Aryaka. Based in Hamburg, Germany, Secucloud GmbH offers an innovative platform designed to provide an all-in-one, global, cloud-based firewall-as-a-service, secure web gateway with advanced threat protection capabilities. The platform is engineered to connect all edges including WAN, Cloud, Mobile and IoT securely together. SASE is paramount in a Cloud-First World The COVID Pandemic has accelerated the adoption of “Cloud-First” architectures. The consumption of network and network security “as-a-service” has driven the need for increased convergence and led to changes in buying behaviors and architectural shifts. Gartner calls this architecture Secure Access Service Edge (SASE), and predicts the SASE market will grow from $4.5B in 2021 to $10.9B in 2024, a 42% CAGR. According to Aryaka’s 2021 State of the WAN report, which surveyed over 1,300 global enterprises, SASE deployment plans are accelerating, with 29 percent of enterprises stating that they are already deploying what they consider to be a SASE architecture. Another 56 percent are planning to deploy a SASE architecture in the next 12-24 months, which speaks to the strong interest and momentum for SASE. Only 12 percent plan to rely on their security vendor to provide all WAN components. Authority comments Aryaka has gained increasing traction with network security and private access offerings delivered as-a-service “Secucloud brings a great team and proven, innovative technology that we can integrate with Aryaka’s industry leading, Cloud-First, SD-WAN as-a-service,” said Ashwath Nagaraj, Co-Founder and CTO at Aryaka. “The combined technologies will allow us to offer truly converged network and network security as-a-service offerings. It complements our existing portfolio and significantly enhances Aryaka’s ability to compete and win larger deals while delivering the industry’s most flexible, managed SASE solution experience.” “We are excited to join Aryaka. Like Aryaka, Secucloud has been designed from the ground up to deliver a Cloud-First architecture with everything delivered as-a-service,” said Dennis Monner, CEO of Secucloud. “We think this joint solution and Aryaka’s brand reputation of delivering the industry’s best customer experience, will create a highly differentiated offering for enterprise customers.” Existing network security solutions The acquisition complements existing network security solutions that Aryaka offers with other technology partners like Check Point Software, Palo Alto Networks, Zscaler, and others, delivering choice to enterprise customers for a variety of deployment use cases. In the past year, Aryaka has gained increasing traction with network security and private access offerings delivered as-a-service, netting large multi-million-dollar subscription deals that include security-sensitive financial services companies, and enabling enterprises to deploy hybrid workplaces for tens of thousands of “anywhere” workers.
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a cellphone phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical standards for IoT, especially in terms of communications. This results in inefficient data management and reduced interoperability mechanism and ultimately may cause reduced security in the IoT network. The global Internet of Things (IoT) security market size is expected to grow from USD 12.5 billion in 2020 to USD 36.6 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 23.9%. Importance of cybersecurity Various vertical industries store unprecedented amounts of data on devices like IP cameras and NVRs Dahua Technology, a video-centric smart IoT solution and service provider, believes cybersecurity is of vital strategic importance in the age of AIoT. In various vertical industries, such as traffic, banking & finance, hospital, and critical infrastructure, organizations collect, process, and store unprecedented amounts of data on devices like IP cameras and NVRs. A significant portion of that data can be sensitive or private information, which can be prone to cyber-attacks and the situation, is getting worse because there are more devices than people. As a security solution provider, Dahua Technology continuously invests in cybersecurity and actively copes with network security issues. Continuous investment & active coping Committed to becoming a leader in cybersecurity and privacy protection in the global security industry, Dahua Technology has been developing and exploiting cybersecurity for nearly 10 years. The company keeps investing about 10% of its annual sales revenue in R&D every year, including cybersecurity. In addition, the company put together a professional team of nearly 100 personnel to focus on cybersecurity issues. With rich experience and sufficient resources, Dahua Technology promises to be positive, open, cooperative, and responsible when it comes to cybersecurity. Dahua Technology cybersecurity approach 1. Organizational structure In order to achieve better efficiency and effectiveness, Dahua Technology operates a comprehensive system to cope with all cybersecurity-related issues. The system, led by the cybersecurity committee, also contains a cybersecurity & data protection compliance group, cybersecurity institute, and product security incident response team (PSIRT). The cybersecurity committee, above all departments or teams, can call resources from the whole company, from the R&D center to the legal department, supply chain, overseas business department, etc. when necessary. Cybersecurity Institute is in charge of building the sSDLC process and implementing the process to all Dahua product series, making sure that all Dahua products are strong against cyberattacks. 2. Security development lifecycle Dahua adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security Dahua Technology adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security. During the security design phase, STRIDE + Attack Tree + PIA is adapted to improve threat modeling. During the security realisation phase, OWASP top 10 and over 150 CWEs are used to achieve static code analysis. During the security test phase, over 20 tools within 7 fields are applied to realize the multiple security testing. CompTIA PenTest+/Security+ are used to carry out professional penetration testing, while compliance ISO 30111&290147 and MITRE org CAN are followed during vulnerability management after the products are sold. 3. Emergency response system Cooperation with professionals from across the globe is a great way to improve vulnerability detection. Therefore, Dahua Cybersecurity Center (DHCC) is established to solve cybersecurity issues with security vulnerability reporting, announcement/notice, and cybersecurity knowledge sharing with our global customer base in order to provide them with more robust and secure products/solutions. Product Security Incident Response Team (PSIRT) is an integral part of DHCC. Composed of professionals ranging from marketing, supply chain, service, and legal representatives, PSIRT is responsible for receiving, processing, and disclosing Dahua product and solution-related security vulnerabilities. Team members are on duty 7 days a week and guarantee to respond to an emergency within 48 hours. End-user, partner, supplier, government agency, industry association, and independent researchers are encouraged to report potential risk or vulnerability to PSIRT by email. 4. Personal data & privacy protection Dahua Technology also attaches great importance to personal data & privacy protection. Complying with applicable laws and regulations such as EU’s General Data Protection Regulation, EDPB’s Guidelines on the concepts of controller and processor in the GDPR, ETSI EN 303645’s Cyber Security for Consumer Internet of Things: Baseline Requirements as well as US’s California Consumer Privacy Act, the company established the Personal Data & Privacy Protection Standard. The standard stipulates that privacy protection methods such as de-identification, data encryption, and systematic access control, privacy-friendly setting are fully adapted to the complete data life cycle all the way from the collection, transmitting, storage to sharing, copying, and deleting. In addition, working with world-renowned third-party institutions, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 Certification and ISO 27701 Certification from BSI, which help demonstrating its capability in managing personal information and compliance with privacy regulations around the world. 5. Continuously iterating security baseline The security baseline built a security element layout of "AAA+CIA+P", a systematic protection framework Centered on the core principles of Security by Design and Security by Default, the Dahua security baseline initiative taps into product safety technology to provide users with adequate safety guarantees. Based on and practicing the security and privacy design principles, the security baseline builds a security element layout of "AAA+CIA+P", forming a systematic protection framework covering physical security, system security, application security, data security, network security, and privacy protection. 7 versions of baseline and 100+ principles have been developed to adapt Authentication, Authorization, Audit, Confidentiality, Integrity, Availability, and Privacy protection deeply into the product quality assurance system, making sure that all Dahua products enjoy the factory default security. 6. Product security center In order to help users clearly understand the security status and capabilities of the device, the product security center will assist users to conveniently and quickly set up the right security configuration to suit the scenarios. General security capabilities include privacy protection (face occlusion, information hiding, etc.), video encryption, security alarm, trusted protection, CA certification management, key management service, attack defense, and so on. 7. Cybersecurity ecosystem Adhering to openness and cooperation, Dahua Technology keeps cooperating with international authoritative security institutions to jointly build a secure ecosystem. By rich & in-depth communicating and cooperation with institutions like TÜV Rheinland, BSI, DNV·GL, Intertek EWA-Canada, and bright sight security lab, the company stays advanced its security capabilities and systems. In a widely networked world of IoT, cybersecurity challenges are pretty much a universal sore spot for companies globally. Dahua Technology, in the business of keeping people safe, takes cybersecurity seriously from head to toe. With a mindset that emphasizes cybersecurity and all the resources that it can allocate to establish, carry out and strengthen the cybersecurity approach, Dahua Technology plans to stay positive, open, responsible and improving for the matter of cybersecurity.
Cylera, the foremost healthcare IoT (HIoT) cybersecurity, and threat intelligence company, has announced the addition of Core to Cloud to the company’s Global Channel Partner Program. Based in the U.K. Core to Cloud delivers innovative cybersecurity solutions that enable secure digital business in a world of growing threats. “With in-depth industry experience and a strong focus on healthcare, education, compliance and security, Core to Cloud creates bespoke solutions that effectively help organizations with visibility, validation, governance and response to cyber threats. This creates the perfect opportunity for Cylera to partner with a strong industry-leading provider with clear success in the U.K. markets,” said Timur Ozekcin, Co-Founder and CEO of Cylera. “We are already seeing success through enhancing Core to Clouds offering with Cylera’s HIoT cybersecurity platform.” Cybersecurity specialist Core to Cloud has gained a reputation for bringing highly disruptive security technologies to market Along with its extensive work within the public sector and healthcare, Core to Cloud's unique, consultative approach has positioned the firm as one of the most trusted cybersecurity specialists out there. In the last couple of years, Core to Cloud has quickly gained a reputation for bringing highly disruptive security technologies to market and this was one of the key reasons why Cylera chose to partner with the organization. “With a go-to-market strategy that provides a solution-led approach that puts the customer needs first, we are excited to add Cylera’s technology to our capabilities and aid the expansion of the relationship,” said James Cunningham, Managing Director at Core to Cloud. “This collaboration will enable both Core to Cloud and Cylera to be jointly competitive in the U.K. market.” “We have already seen demand with multiple NHS customers asking us for an IoT solution that would provide a complete asset list of all their connected devices and provide a clientless way to secure medical devices as well as highlight their vulnerabilities, show granular device information and utilization as well as provide the information needed for segmentation. We researched and tested the market and found the best fit was the Cylera solution, which is custom built for hospitals and provides rich information for IT, IG and Medical Engineering.” Contextual awareness Cylera is a contextually aware platform for asset management, risk analysis, and threat detection. The platform is purpose-built for complex, high-impact environments, and combines comprehensive contextual awareness with a deep understanding of operational workflows. Cylera’s insights and recommendations simplify response playbooks, decrease time to remediation, and enable informed decision making.
The new FLEXIDOME IP starlight 8000i X series cameras offer enhanced image quality for low-light scenes and fast-moving objects, thanks to two resolution offerings of 2- or 4-megapixels and next-level HDR X and starlight X technologies. HDR X and Starlight X technologies HDR X enables the cameras to optimize video capture in scenes with fast-moving objects with a dynamic range up to 144 dB, ensuring perfect exposure, while reducing motion-related artefacts and blur in the daytime. The new Starlight X technology helps to significantly improve image quality during the day and excels in near-dark scenes, ensuring color images down to 0.0061 lux due to its custom optics, Bosch advanced image processing algorithms, and noise suppression. The camera’s new 1/1.8 inch sensor further improves image quality across all light levels. Capitalizing on the significantly improved image quality of the X series, the camera’s built-in Artificial Intelligence (AI), which features Intelligent Video Analytics and Machine Learning (Camera Trainer), offers more relevant data-supporting predictive solutions in mission-critical applications. FLEXIDOME IP starlight 8000i X series The new X series extends the outdoor fixed camera portfolio of the FLEXIDOME IP starlight 8000i family The new X series extends the outdoor fixed camera portfolio of the FLEXIDOME IP starlight 8000i family, by delivering an ideal mix of resolution, light sensitivity, dynamic range, and frame rate all at once for mission-critical applications that demand the highest image quality combined with actionable insights, 24/7. In extreme low-light scenes, starlight X technology provides clear and relevant images with color filtering down to 0.0061 lux. Motion-optimized HDR X technology has a dynamic range of up to 144 dB, ensuring perfect exposure, while eliminating motion-related artefacts and blur in scenes with challenging lighting conditions and fast-moving objects or vehicles in tunnels and on roadways. Exceptional image quality and robust design The camera’s exceptional image quality is backed by a comprehensive, robust design that is water and dust resistant, with an IP66 and IP6K9k rating, and is vandal resistant with IK10+ housing. It withstands temperatures ranging from -50 to +60°C (-8 to +140°F). The high-quality, dual-layer coating of the camera also protects against corrosion (IEC 60068-2-52 1344h), making the X series ideal for challenging outdoor applications. Built-in AI supports predictive solutions All FLEXIDOME IP starlight 8000i cameras come with built-in AI featuring Intelligent Video Analytics and Camera Trainer to support predictive solutions. This built-in AI enables these cameras to understand what they see and attach a layer of metadata to video feeds to convert video data into actionable insights, helping users anticipate unforeseen events and prevent them from happening. Intelligent Video Analytics is highly resistant to false triggers caused by demanding weather conditions, such as snow, wind, rain, hail, and water reflections, and environments subject to vibration, such as on bridges. It provides automatic object detection over large distances, making it ideal for mission-critical applications such as perimeter protection of airports, parking lots, critical infrastructures, government buildings, border patrol, ship tracking, and traffic monitoring. Combined with Starlight X technology, this built-in AI provides more rich data, even in extreme low-light situations. Camera Trainer, based on machine learning, enables system integrators to tailor Intelligent Video Analytics to detect objects or situations that matter most to their customers. Remote device management Bosch remote device management is a combination of tools like Project Assistant and Configuration Manager Bosch remote device management is a combination of tools like Project Assistant and Configuration Manager, and services for secure, transparent, and cost-effective device management throughout a product’s life. The innovative remote wireless configuration and commissioning functionality of the FLEXIDOME IP starlight 8000i range enables installers to work smarter while onsite. When commissioning, installers typically must climb up and down ladders or hire lift equipment to reach cameras at high levels. With any FLEXIDOME IP starlight 8000i camera, commissioning can be done entirely wireless, no need for ladders or lifts. Bosch Project Assistant app Installers can use the Bosch Project Assistant app installed on a wireless tablet or smartphone to adjust the pan, tilt, roll, and zoom (PTRZ) and set the required field of view without touching the camera or lens. The new X series cameras, as with all Bosch cameras, connects securely to the Bosch Remote Portal, a cloud-based service offering device management with daily or advanced configuration and set up and continuous health monitoring from any offsite location. Bosch’s Green Way approach Any PTRZ adjustments required post installation for new store layouts or altered high-risk zones, for example, can be conducted remotely to save time, costs, and effort. System integrators can work remotely with customers to perform services, such as changing configuration settings or installing firmware updates, ensuring systems meet the highest reliability standards. The remote device management and wireless commissioning process minimizes the number of commutes, resulting in sustainable business practices that are economically viable, socially responsible, and environmentally friendly. This approach is called Bosch’s Green Way promise.
As technology develops at an ever-faster rate, the possibilities for where and how new innovations can be used are endless. The property sector is one such area where new technology, such as smarter video surveillance, is being used to improve the quality of life for families and communities by increasing security as well as implementing changes based on new insights. Specifically for the coliving movement, cloud-based video surveillance is helping operators to improve the communal spaces for their tenants in ways that on-premises surveillance never could. From tighter security measures to better social spaces, here’s how coliving is benefitting from the PropTech (property technology) boom. What is coliving? The coliving movement is the latest iteration of a recurring human trend. The act of communally sharing space and resources while benefiting from a supportive community is something we’ve seen time and again throughout history. A place that everyone can call home addresses multiple needs. With the concept of shared spaces, and the possibility to work and socialize together, it’s no longer simply a trend. Specifically for the coliving movement, cloud-based video surveillance is helping operators to improve the communal spaces for their tenants in ways that on-premises surveillance never could. As living expenses become ever higher, for many – particularly younger – people getting on the property ladder is difficult, and renting an apartment alone can feel isolating. Coliving spaces offer a ready-built community, and many responsibilities – like maintenance, for example – lie with the building owners, and the cost is included. Where does PropTech come in? PropTech is dramatically changing the way people research, rent, buy, sell and manage property. The combination of the internet, huge compute power, cloud platforms and artificial intelligence (AI) have all combined to create technologies that are transforming the way the entire property sector works. Whether that’s helping buildings to operate more efficiently or even become more sustainable, PropTech is a sector that’s on the rise. When it comes to coliving, PropTech is helping to make these environments safer and smarter for the people who live there. One of the fundamental areas of building design is people’s safety. Following the past year where health has been at the forefront of everyone’s minds, PropTech is enabling entrance systems with touchless doorways and innovative ventilation systems, for example. And even without taking the pandemic into consideration, people living in shared spaces need to be confident that the security is well-managed, and the management wants to ensure that only tenants and their guests can enter the premises. How cloud video surveillance drives better coliving Once seen as an ‘add-on’ to building design, video surveillance and access control are now becoming increasingly important elements of the PropTech movement, and they are equally as desirable for coliving too. Surveillance cameras are essentially sensors that can monitor activity, patterns, and any other changes in a given environment. Analysis of video data can occur in real-time to effect changes immediately, or video can be stored and evaluated at a later date. In a co-living environment, a cloud-based video surveillance system can help operators to understand how tenants use their space, and implement changes to benefit them. Traditionally, video surveillance data stored on-premises had limited uses, as it was often only accessed after a security incident, such as a break-in. The video therefore wouldn’t be used frequently and the camera and storage system would just be another cost not yielding any ROI. Cloud technology has had a dramatic impact on video surveillance. Remote management delivers the ability to modify, adjust and perfect the system without needing to be present at the site, while remote monitoring alerts operators to any unusual incidents such as an equipment malfunction or breakage. In a co-living environment, a cloud-based video surveillance system can help operators to understand how tenants use their space, and implement changes to benefit them. For example, surveillance can show operators which areas in the communal spaces are frequented the most and at what times, including areas such as the laundry room or gym where space might be limited. By using AI to analyze the video, operators can use insights from it to improve the existing set up wherever possible, and also learn lessons about how to better design future coliving spaces. In today’s world, this technology can also help to keep everyone safe and healthy. Cameras can identify if someone is wearing a face mask as they go to enter a building and deny entry until they put one on. Thermal cameras are another easy tool to screen people for an elevated temperature before they even enter a communal space. Though a raised temperature does not mean you have COVID-19, the technology can provide an initial screening, so that individuals with elevated temperature readings can be checked manually for other symptoms or possibly be recommended for a test. The future of smart living Coliving is not a new phenomenon – humans have been living in communal places for many years, working and socializing together for the benefit of everyone. What makes today’s coliving movement unique is the range of rapidly developing technology that is being implemented to improve the environments for tenants. As an arguably lower cost and higher quality way of life, coliving spaces are certainly here to stay, and so the PropTech surge is no doubt going to grow with it.
The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.
The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol. This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.
Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation. Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics. Adoption of disruptive technologies “Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realize their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.” “Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.” Challenges faced by cities Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness, and reducing costs. Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic. Smart technology “The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualization and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks, and detection of noise level, glass breaks, and gunshots. Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever, and ensure physical distancing. 2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience. Video solutions Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyze customer behaviors to create new routes, pathways, signage and to optimize cleaning operations. Personalized digital experiences will add to the overall entertainment value. In the public safety arena, video enables core capabilities such as protection of people, assets, and property, emergency response, and real-time visualization, and increased situational awareness. Video also provides intelligent incident management, better operational efficiency, and faster information sharing and collaboration. Smart video strategy Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming, and costly. Cities and public venues are looking for hardware, software, and industry expertise to provide the right mix of performance, capabilities, and cost-effectiveness. Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimization, enables customers to build and deploy high-performing computer vision and deep learning inference applications. Intel and Milestone partnership – Video solutions “Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.” As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing, and AI capabilities with Milestone’s video management software and community of analytics partners. Given its complex needs, the smart cities market is particularly inviting for these technologies.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardized across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organization.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centers (CTCs) helps expand clientele, and the Convergint Development Center (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organizations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options“Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Two renowned systems integrators have improved their ability to more effectively specify and design advanced physical security systems, using the dedicated tool, AXIS Site Designer. AXIS Site Designer AXIS Site Designer is a unique and free web application from Axis Communications, a market renowned company in network video solutions, which makes the specification and design of complex security systems quicker and easier. Having recently deployed the solution, two of Axis partners, Southern Fire & Security Ltd. and Acctive Systems, have been able to evidence a more sophisticated process and have won clients as a result. Security devices and sensors As physical security technology continues to advance, in order to keep up with the ever-evolving threat landscape, coupled with more security devices and sensors being added to IT networks, the task of specifying such systems has become more complex. The principal challenges for those working in the industry are to be able to properly illustrate to buyers the capabilities of such devices and also to demonstrate how they can work together to secure a site. This web application holds the solution. Powerful and versatile design tool AXIS Site Designer revolutionizes the specification and design process AXIS Site Designer revolutionizes the specification and design process, by allowing an entire solution to be mapped out to the finest detail. The powerful and highly versatile tool removes any guesswork or element of trial and error, making it easy to create the right system to fit the exact operational requirements and needs of a prospect or client. The application even allows floor plans of the target site to be added, and virtual placement of cameras and devices enables viewing of the coverage they will provide, once installed. Partner with Southern Fire & Security and Acctive Systems Sean Mcnaboe, Axis Communications’ Key Account Manager, explains “The benefits of AXIS Site Designer are numerous. It helps streamline design workflow, simplify demos of security products and accessories, and even generate quotations and change items in a bill of materials within minutes.” Sean Mcnaboe adds, “Axis has been working closely with two partners, Southern Fire & Security and Acctive Systems, to help them drive their businesses forward while meeting, and often exceeding, the evolving requirements of customers.” Security and surveillance systems specification Southern Fire & Security has recently taken on the specification of security and surveillance systems for several high value properties around the London area, so being able to accurately specify dedicated solutions is critical to secure ongoing business. Acctive Systems, a renowned integrator of electronic security systems, needed a method of specifying security systems that would allow it to demonstrate an entire setup and its component parts via digital means. Efficient designing of surveillance systems AXIS Site Designer is an empowering leap forward in the design of surveillance systems Steve Wilson, Director at Southern Fire & Security, explains “Being able to make only basic recommendations around the use of appropriate technologies has been a key challenge for us. It’s very difficult to plan some of the more involved projects in detail, so we desperately needed a way to be able to visualize an entire estate and how a solution would operate.” AXIS Site Designer is an empowering leap forward in the design of surveillance systems, allowing for greater speed and efficiency, and enabling more effective management of any project. Enhancing customer satisfaction High quality designs and other outputs create a level of professionalism that is a major plus point when vying for business, ultimately improving customer satisfaction and pointing towards greater revenue prospects. Gerry Numa, the Chief Technical Officer (CTO) of Acctive Systems, said “AXIS Site Designer delivers everything we anticipated, and more, setting us ahead of our competitors when it comes to slick, professional looking project design. I would encourage other businesses to reach out to Axis to find out how the application can benefit them too.”
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that Reiknistofa bankanna (RB), an IT service provider for Icelandic financial institutions, has recently overhauled its security infrastructure with Genetec Security Center. Managing cameras With the help of its system integrator, Hafnes Ehf, Reiknistofa bankanna is now using Genetec to manage its cameras, access control and video analytics, through one unified interface. Reiknistofa bankanna (RB) is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country’s central clearance and settlement system, and a number of multi-tenant core banking solutions. Enhanced data and staff security As the backbone of Icelandic Financial Services, Reiknistofa bankanna places a very high importance on security and not only data security, but also to protect employees and visiting clients. While its server rooms and offices are protected via disparate video and access control systems, the technology was old and maintenance was becoming both, a financial and an operational burden. RB operates its solutions, across multiple data centers, in a shared, multi-bank environment. This requires a modern and reliable system that brings video and access control into a single solution, making it easy for operators to understand what is happening, when, where, and what action to take next. Genetec Security Center Genetec Security Center was the optimal choice as it simplified daily security operations As an open unified platform, Genetec Security Center was the optimal choice as it simplified daily security operations, allowed for further integration with other tools, such as RB’s heating and cooling systems, and delivered business-wide value. “From day one, we wanted a unified system which could help our teams understand the situation quickly, alerting them if anything required their attention,” said Geir Saemundsson, Data Center Manager at Reiknistofa bankanna, adding “The Genetec solution does just this and is allowing us to built-in customized alerts so we gain business intelligence, providing us with better ROI.” Improved security management “Physical security teams are demanding simplicity and greater functionality,” said Anthonie van der Ploeg, Director of Sales for Benelux & Nordics at Genetec, Inc., adding “Unification can offer them both by bringing together all security system components seamlessly in a single software platform in a way that can vastly improve security management.” Anthonie van der Ploeg adds, “We are delighted that Iceland’s Reiknistofa bankanna has experienced the deep business insights Genetec Security Center is capable of delivering, and we look forward to supporting them as they evolve and grow their operations.” Deep integration and analytics Geir Saemundsson concludes, “The time savings delivered by Genetec have been immense. It’s been a worthwhile investment, especially as it can evolve with us, and allows us to move at our chosen speed. Considering its ease of use, deep integration and leading analytics, we look forward to continuing the partnership over the coming years.”
Videosoft's adaptive low bandwidth video streaming technology has been selected and installed on the Mayflower Autonomous Ship (MAS), in order to help relay high-quality footage of the ship’s various missions, back to humans on land. On its maiden voyage this spring, the Mayflower Autonomous Ship will trace the route of the famous 1620 Mayflower ship, sailing from Plymouth, in the United Kingdom to Plymouth, in Massachusetts, USA. Only this time, there will be no human captain or crew on board, as the 15 meters, lightweight, hybrid-electric powered trimaran (multi-hull vessel) crosses the Atlantic Ocean. Real-time feedback and visuals Videosoft’s technology will help capture footage from the Mayflower's six onboard cameras at sea. Using satellite connectivity and compression technologies, footage will be transmitted back to AI developers and research scientists, providing them real-time feedback and visuals, during the mission. It will also be used to provide the media and public with updates about interesting events that occur during the ship’s ocean adventures. “The ability to receive live video feed from the ship using minimal communication bandwidth is a game changer for us,” said Don Scott, the Chief Technology Officer (CTO) of the Mayflower Autonomous Ship for Marine AI. Reliable monitoring of the live situation Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation" Don Scott adds, “Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation and give us confidence in the vehicle’s operation at sea. It has already been an invaluable tool during sea trials and we look forward to having the live feed during the voyage itself.” The international grassroots project is led by marine research organization, ProMare, alongside IBM, which is acting as both lead technology partner and lead scientific partner, with other key design and construction partners, including MSubs, Aluship (Aluship Technology) and Marine AI. AI Captain with computer vision technology With an AI Captain at the helm, MAS is able to operate for long distances and durations at sea collecting critical data about the ocean. Powered by IBM’s computer vision, automation, and machine learning technologies, the AI Captain maintains constant situational awareness and makes decisions about what to do next in line with collision regulations. Small, lightweight edge devices from NVIDIA provide local computer power for operational independence, relying on IBM Cloud connectivity when available. Cutting-edge video streaming solution Videosoft was selected for its cutting-edge video streaming solution and its ability to reliably stream video from onboard cameras and computer vision systems, which scan the horizon for hazards, as the Mayflower Autonomous Ship sails. Videosoft's software runs on IBM's platform, which skippers the vessel and is linked via satellite. Videosoft's Chief Executive Officer (CEO), Stewart McCone said, “This project is designed to transform humanity’s relationship with the ocean. To say we're totally thrilled to be involved in the Mayflower Autonomous Ship project would be an understatement.” Stewart McCone adds, “By working alongside innovative and specialist companies, who are experts in their field and have an intimate knowledge of what they are doing, Videosoft is enabling the ambitions of this multi-million-pound project. Streaming live video from ocean-going vessels is not straightforward and you really need to know what you're doing to pull it off successfully.” Intelligent transmission protocol An intelligent transmission protocol is required to maintain connectivity" He further stated, “An intelligent transmission protocol is required to maintain connectivity. In addition to switching between satellite and cellular networks, variable signal strength, the topography of network masts, atmospheric conditions, satellite capabilities, speed, and variables all impact the available bandwidth.” Stewart McCone said, “Videosoft, which has developed software specifically for the satellite and cellular industry, to negate the typical issues that arise when using such networks, has made it possible to have eyes on the ocean 24/7. The unique protocols that the Videosoft team has built into our software mean that any video delay from the Mayflower will be dramatically reduced, with any streamed video automatically adapting to the amount of available bandwidth, while retaining good quality.” Real-time situational awareness Stewart continues, “Even in our knowledge-rich industry, not many people realize that this can be done, but it can and is relatively simple to put in place, thanks to our easy-to-use software platform. As with CCTV, IoT and surveillance applications, Videosoft's ability to provide reliable video streams creates a real-time situational awareness that is critical to the operational success of projects, such as the Mayflower Autonomous Ship.” He further adds, “The Videosoft vision has always been to get involved in pioneering projects, such as the Mayflower and serves to underpin Videosoft's mission statement of deploying technology to solve real-world problems at the highest global level, using video and remote services, to make the world be a better, safer place. We're showing that this specialist tech does exist and that we can enable all Internet of Things (IoT) applications for the common good. If that interests you, come and talk to us.”
Just like other industries around the globe, the patience of parking operations management has been tested as the usage of parking facilities in urban and suburban settings fluctuated widely over the past year due to local health and safety and occupancy restrictions. As the overall industry looks to spring back from COVID-19 levels, it is also simultaneously looking to transition from traditional analog and on-premise managed operations to solutions that digitize parking operations and provide a more contactless experience. Parking management Investments in digital tools such as platforms that employ computer vision technologies are one solution helping to speed up this digitalization through better management of parking lot occupancy levels, eliminating paper ticketing systems, parking barriers, and other traditional physical elements of commercial parking. Using smart cameras One area in particular gaining steam is the deployment of smart cameras, which can perform functions from license plate recognition to traffic flow detection and speed as well as a host of other utilities. These capabilities are particularly useful in surface lots and parking structures in environments such as airports and sporting venues, to large retail or corporate parking areas. Digital parking experience Munich-based Peter Park, a software developer of parking management solutions, has helped many parking operations begin to migrate to more sophisticated technologies by connecting different digital services such as payment apps, e-charging systems, and navigation providers to further increase security and automation. The company operates in more than 50 different sites throughout Germany and logs more than 25,000 transactions every day. Peter Park’s cloud-based offering is based on the use of license plate recognition technology (ANPR), which often requires specialized license plate recognition cameras to identify a specific vehicle, detect the duration of stay, and integrate with online payment systems for a fully digital parking experience. Flexibility in selection and functionality Instead of LPR cameras, the company is using new smart cameras with powerful microprocessors to fuel intelligent onboard analysis via multiple video analytics applications on the camera. Smart security cameras can provide parking operators with increased flexibility using an open IoT platform Based on an open IoT platform from Security & Safety Things, these cameras can be equipped and flexibly re-equipped with a variety of applications, including license plate recognition, analytics to detect the presence of smoke, fire, ice, and spills, or other hazards within the parking environment, and other ready to install applications that fit the most pressing needs of parking management.“We can not only use the best application for the computer vision task, but we can also pick and combine the best camera types of different suppliers for each setup, taking full use of the broad spectrum of different camera features such as zoom control, as an example,” said Maximilian Schlereth, CEO, and co-founder of Peter Park. Reduced maintenance costs The reduction or elimination of parking gates and ticketing machines can have positive impacts on staffing levels within parking management and drastically reduce hardware purchase and maintenance costs of the parking gates and ticketing devices. Smart vehicle routing Additionally, cameras outfitted with parking management apps can help to direct traffic flow by analyzing the queue of vehicles waiting to enter the facility and pairing them to available spaces or recognizing when a particular parking area is full. They can also assist in controlling the flow of traffic at peak times to prevent jams and long waits at exits or identify the vehicles of VIPs or season ticket holders at an event venue and route them accordingly to the appropriate parking lot. Parking lot monitoring Smart cameras can also help to manage people, providing valuable security and visitor management functions. Crowd detection analytics can detect the formation of a crowd in the stadium parking lot before it escalates into a post-game brawl, and people counting analytics can detect the number of occupants within each vehicle entering a parking area to better determine anticipated attendance of an event or daily occupancy level of a corporate office location. Analytics can also detect individuals holding weapons and selectively transmit related imagery to help remote operators or on-site security personnel assess and address the situation.
ClanTect and ePm have signed a partnership agreement for the sale and servicing of ClanTect’s next generation Motion Detection systems (also referred to as ‘heartbeat’ detection systems) for the United Arab Emirates (UAE). Detecting humans in vehicles ClanTect’s systems are used to detect the hidden presence of people inside vehicles and are deployed within a wide range of organizations in the Border Security, Prisons and Critical Infrastructure markets. Customers include globally renowned organizations, such as the UK Border Force and Frontex, the European Border and Coast Guard Agency and Her Majesty’s Prison Service in the United Kingdom. Tens of thousands of clandestine operatives and fugitives are detected by ClanTect each year, with hundreds of lives being saved. Ultra-sensitive sensors Its ultra-sensitive sensors can detect even the faintest of movements, from anywhere within a vehicle ClanTect’s systems are based on sound and vibration technology. Its ultra-sensitive sensors can detect even the faintest of movements, from anywhere within a vehicle. The system is extremely fast (approx. 60 seconds for a vehicle search), it is very easy to use, the search process is fully automated, and, unlike X-Ray and some other technologies, it is completely safe for both the operator and for the stowaway. ClanTect’s system is extremely accurate. It utilizes a unique ‘blocking’ capability, which eliminates any nearby surrounding noise from outside of the vehicle. Compact 2nd generation systems With the launch of their 2nd generation systems, ClanTect provides smaller and more compact devices, which are now fully wireless, thereby making them easy to deploy in ad-hoc outdoor roadside locations, even in windy weather conditions. Professor Steve Daley, Managing Director of ClanTect commented, “Our systems can enable the UAE authorities to meet some of today’s most pressing security challenges, such as human trafficking, the protection of critical infrastructure and the security of custodial facilities.” Protection of critical infrastructure Steve Daley adds, “We have also ensured that our systems have been thoroughly tested to meet the challenging environmental conditions faced in the UAE.” Hadi R Omer, Director of Sales & Marketing (Systems & Solutions) at ePm said, “Here at ePm, we have been serving the needs of government and commercial customers since the 1980’s, including the Ministry of Interior, Abu Dhabi Police, Dubai Police, UAE Armed Forces, Dubai Customs, and ADNOC. We feel that ClanTect’s technology perfectly complements our existing portfolio of security products and offers tremendous operational capabilities for public and private sector organizations across the UAE.”
Johan Cruijff ArenA will utilize innovative video analytics to improve visitor flow, optimize parking utilization and offer fans an anonymous way to provide feedback about the stadium experience, among other uses. The Security & Safety Things IoT platform for smart cameras will integrate into the ArenA’s operational software to provide key insights into stadium operations and ongoing health and safety measures, especially useful since the pandemic. The partnership will provide a potential model for other organizations looking to deploy technology solutions to safely reopen. IoT platform for smart cameras Security and Safety Things GmbH and the Johan Cruijff ArenA are partnering up and will deploy S&STs IoT platform for smart surveillance cameras to enhance overall fan experience, optimize ArenA operations and increase visitor security and privacy. The ArenA is home to AFC Ajax and the internationally renowned Amsterdam Innovation ArenA (AIA), a living lab established by the ArenA and the City of Amsterdam to enable development and testing of innovative stadium and smart city solutions. Security & Safety Things IoT platform S&ST IoT platform and network of cameras is integrated into the ArenA’s dashboard software The Security & Safety Things (S&ST) IoT platform and network of cameras is integrated into the ArenA’s dashboard software to provide information and analysis for safety and security as well optimization of stadium operations and visitor engagement. “Every technology selected for our innovation environment is strategic because of the potential benefits not only to our ArenA, but to the City of Amsterdam and other stadiums and large event venues seeking technological solutions to help to re-open safely and operate their facility more intelligently,” said Sander van Stiphout, Director International, Johan Cruijff ArenA. Sander van Stiphout adds, “The unique flexibility of the Security & Safety Things approach enables us to simultaneously deploy COVID-19 health and safety analytics along with business optimization tools and easily re-equip the cameras with other analytic applications as our needs change.” AI-enabled video analytic applications A series of smart cameras on the S&ST IoT platform are installed in key areas throughout the stadium. Using specialized, Artificial Intelligence-enabled video analytic applications from the S&ST Application Store that run directly on each camera, each device will provide the ArenA with valuable operational insights. When the stadium reopens, crowd detection analytics will monitor social distancing compliance and visitor flow around entrances and food or merchandise kiosks. License plate recognition cameras will assist with real-time occupancy monitoring for parking and traffic flow optimization. Queue detection applications Queue detection applications can be employed to reduce visitor wait times by directing fans to less busy areas and by providing the insights required to optimize staffing levels at peak times. In one specific area, a camera also provides the ability for visitors to provide feedback about their stadium experience in an anonymous and contact-free way by detecting the visual of a ‘thumbs-up’ or ‘thumbs-down’ from a visitor, collecting only the rating without disrupting people flow. Smart camera platform We’re honored to be joining the Johan Cruijff ArenA as an innovation partner" “The flexibility of our smart camera platform and the ArenA’s mission of innovation are very well matched to produce the intelligence necessary to address real world issues of privacy, health and safety but also new and creative ideas for stadium and event management,” said Hartmut Schaper, Chief Executive Officer (CEO), Security & Safety Things GmbH. Hartmut adds, “We’re honored to be joining the Johan Cruijff ArenA as an innovation partner and to help them provide a seamless and safe visitor experience.” Smart surveillance camera system The camera system and how it is used complies with all European and Dutch privacy regulations. Furthermore, there are various advantages to this camera system, when it comes to privacy. These cameras are equipped with powerful processors that analyze the images directly on the camera, reducing the need for a constant video stream to be passed on to a central location, where it can be monitored or further processed. Instead, the cameras can be configured to send only the information about relevant events such as when a long queue is forming, groups of people gather too closely, or individuals are not wearing face coverings as required. Only then will respective images be passed along. This reduces the processing of visitors’ personal information to an absolute minimum as opposed to a traditional set-up where all footage is transmitted and centrally processed at all times.
Round table discussion
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?
The “Roaring Twenties” was a decade of economic growth and widespread prosperity, driven by recovery from devastation, a construction boom, and welcoming of new technologies such as automobiles and electricity. As we look ahead to the big picture of the 2020s, 100 years later, are there parallels that suggest a successful decade ahead? Might recovery from the devastation of COVID-19 help to drive even higher levels of economic growth and technical innovation? We asked this week’s Expert Panel Roundtable: Does the new decade represent a new “Roaring Twenties” for the physical security market?
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload