Suprema, a globally renowned company in access control, biometrics and solutions for time and attendance management, has announced that they have been selected as one of the ‘2021 Top 50 Global Security Companies’, by A&S Magazine. Top 50 global security companies Suprema has ranked on this top 50 list for 11 consecutive years now, which acknowledges them as a major security company in the global market. Suprema was also listed as one of the world’s top four entry system...
Azena is announcing that it will host ESCON 2021, a free to all ecosystem conference for smart security stakeholders, on 2 December from 3-6 pm CET. Broadcast live from the BMW Welt, Munich’s iconic landmark, ESCON will bring together leaders in the AI video analytics space to discuss the future of Artificial Intelligence and IoT technologies in the security and safety industry. Actionable operational intelligence “The potential of AI, IoT and video analytics and the influence on t...
Traffic congestion and road accidents are the toughest challenges faced by traffic management agencies across the world. With rapid global urbanization, the growing amount and type of vehicles has led to more road-related issues every year. According to a MarketsandMarkets report, the global number of cars and commercial vehicles on the road will nearly double by 2040, putting tremendous pressure on the existing urban infrastructure. Traffic management strategies Various countries have formul...
Despite the challenges resulting from the COVID-19 pandemic, nearly four in five video security systems-related businesses reported growth in the past 12 months, according to a 23-nation survey conducted by Calipsa, the market renowned provider of Deep Learning-powered video analytics. Slightly less than half of the businesses reported growth in a 2020 report. Calipsa 2021 Video Monitoring Report The Calipsa 2021 Video Monitoring Report is a look inside the industry and its biggest trends. The...
With its major global Innovation Splash in November, MOBOTIX AG is placing 18 new hardware and software solutions on the market at once. New products The first hemispherical camera that combines infrared and LED white light in a single system is a major highlight. In addition, there is a new convenient dome camera, hemispherical modules, and Thermal CIF modules specially designed for perimeter protection for the MOBOTIX7 cameras with up to 105° wide angle of view (FoV). A fiber optic...
Johnson Controls, the global pioneer in smart, healthy, and sustainable buildings, and architect of the OpenBlue digital connected platforms has added enhanced video capabilities and deeper analytics to its Tyco American Dynamics victor and VideoEdge v5.7.1 video management platform as part of the latest software update. The latest software updates harness the power of in-demand technology, including analytics for social distancing detection combined with alerts, for when a violation occurs, an...
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colors. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful" “Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful, capable, and redefined to elevate any door’s security, and management,” said Marc Handels, SALTO Systems’ Chief Technology Officer (CTO). Marc Handels adds, “When you have an excellent product like the SALTO XS4 Original electronic lock that has withstood both the test of time and technology, it makes sense to improve upon what is already working very well.” Embedded with BLUEnet functionality The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability, which enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. The SALTO XS4 Original+ is compatible with the array of SALTO platform solutions, including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE, and NFC technology functionality. “By incorporating the latest in technology into the XS4 Original+ locking range, SALTO has delivered a product that extends up-to-date and comprehensive electronic access control to any door,” said Handels. Engine of XS4 Original+ XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture" The XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture, and the same electronic functionalities, which is based on BLUEnet connectivity, and better power efficiency. The feature rich new security architecture, which is protected against internal and external attacks, makes everything more fluid, transforming the way users’ access, operators manage, and installers’ set-up the electronic lock. Catering to a range of access and customer needs There is an XS4 Original+ model for every type of access and customer need. The existing XS4 Original models are fully available in the XS4 Original+ product range, from the key override option to mechanical or electronic privacy models. Just as with the original version, the SALTO XS4 Original+ is suitable for a wide range of customer applications, including interior doors in educational or commercial buildings or tailored solutions for other specific building requirements. Easy to install and retrofit Easy to install and retrofit, the SALTO XS4 Original+ works with ANSI, Euro, DIN, and Scandinavian door industry standards. Universally compatible, it can replace the existing door hardware and fits any door with unlimited model options. XS4 Original+ wide reader models are slightly wider and the reader is now flatter. “SALTO has long sought feedback from our end-users and partners on what they desire in an upgrade and, taking their input into account, we have developed the XS4 Original+ which delivers everything needed for current and future smart lock solutions,” said Aznar Sethna, SALTO Systems’ Chief Sales & Marketing Officer (CSMO). Aznar Sethna adds, “With restyle designs, industry-leading performance and advanced access control features, with impressive communication capabilities, all with incredible durability, the XS4 Original+ ensures customers get secure and safe access, when they need it.” Redefined and stylish design The XS4 Original+ works with existing XS4 Original door hardware. A broad range of different models and functions make smart access to any door possible, in order to cover all needs of any type of building. Visually, the XS4 Original+ differs from the conventional XS4 Original only in a few details, with improved reader aesthetics. Thanks to a sleek design update, the XS4 Original+ looks better than ever Thanks to a sleek design update, the XS4 Original+ looks better than ever. The reader is now flatter and available in black and white color options, for a simplified, modernized front. The ANSI, Euro Wide, and Scandinavian Wide standard reader models are a little wider, thereby creating a more harmonious version. The XS4 Original+ can be tailored to varying building and door needs, with a wide variety of colors and finishes, including the new Dark Bronze finish, and black or white reader options. These can be visualized on a wide range of door styles, by using the SALTO MyLock Configuration tool. Environment friendly access control solution The XS4 Original+ is designed to minimize its impact on the environment. Today, SALTO Systems is carbon neutral for corporate factory operations and is committed to having net-zero climate impact, across the entire business, which includes manufacturing supply chains and all product life cycles. The XS4 Original+ is the latest model from SALTO to be delivered to customers as a net CO2-neutral access control solution. This concept involves offsetting the CO2 emissions generated during the manufacturing process and the logistics until it is delivered to the customer.
Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and retired in 2020, making him the longest-serving Chief in 50 years. Throughout his career, Alex was posted to the Middle East in highly sensitive roles Throughout his career, Alex was posted to the Middle East in highly sensitive roles. He also acted as the Senior SIS Officer in Afghanistan, a position that marks him out as one of the world’s top authorities, on matters related to human rights in the country. Intersec’s Global Security Leaders’ Summit He will be sharing his unique insights, as the best minds in the industry gather, between January 16-18, 2022, at Intersec’s Global Security Leaders’ Summit, one of six conferences at the event, with hard-hitting discussions featuring global leaders debating and exchanging perspectives on challenges, strategic initiatives, and cooperation, to foster safety and security of all. The full program features over 500 speakers, the largest conference platform for the sector on a world-class stage. Commenting on his participation at the event, Sir Alex Younger said, “I am delighted to be speaking for the first time in the UAE at Intersec, and at a time when conversations for the Security and Safety industry has been thrust into the spotlight from recent global events.” He adds, “The Middle East has always fascinated me - the ever-shifting intricate dynamics of geopolitical relationships in the region and the impact they have internationally create a complex security landscape that I have been immersed in for much of my career.” Intersec 2022 For this industry, Intersec offers the most valuable platform for knowledge exchange" Alex Younger stated, “For this industry, Intersec offers the most valuable platform for knowledge exchange, on the protection of citizens from existing and future threats, and I look forward to sharing my perspective on a topic, which remains a global priority.” Sir Alex Younger is recognized for his unrivaled understanding of the region and has also spoken widely on matters pertaining to human rights in Afghanistan, academic freedom, and the geopolitical nature of China’s digital and technological interests in western infrastructure. Intelligence and security community veteran Alex Nicholl, Messe Frankfurt Middle East’s Head of Intersec, said “Intersec’s commitment to bringing the brightest, most qualified experts to the stage in 2022 is at the forefront of our strategy, to deliver the most relevant content for our audience. Sir Alex Younger is undoubtedly a legend in the intelligence and security community, and his storied career in the Middle East makes him the perfect addition to our conference line-up.” Alex adds, “This is Mr. Younger’s first time speaking publicly in the UAE and his participation underscores the value Intersec is bringing to its visitors, with exclusive opportunities, to engage with and learn from the very best in the industry. We are delighted to have Sir Alex onboard and look forward to welcoming him at the show.” Safety and security of future generations The 23rd edition of the flagship event is being held under the patronage of His Highness Sheikh Mansoor Bin Mohammed Bin Rashid Al Maktoum, at the Dubai World Trade Center, in Dubai, UAE, and will be focused on the theme of ‘Uniting the world’s leading industry specialists for the safety & security of future generations.’ Demonstrating Intersec’s strategic importance to the UAE, Official Supporters include Dubai Police, Dubai Civil Defense, Security Industry Regulatory Agency (SIRA), the UAE Cyber Security Council, and Dubai Municipality.
Hikvision, a pioneer in delivering high-performance professional security solutions with tremendous value, announced it has elevated three sales engineers to expert level based on dedication in the field. These three professionals were designated from the company’s established team of engineers across the U.S. and reinforces Hikvision’s support for its extensive base of dealers and customers across North America. Possible security solutions “Our team of sales engineers help to ensure that the specification, sales and implementation processes of Hikvision security solutions progresses quickly and smoothly for both integrators and their customers.” Xiao also indicated that Hikvision is seeking to further expand its sales engineering team “These new designated products and solution experts embody Hikvision’s commitment to the North American market by helping our sales partners and end-users deliver the best possible security solutions with the best value propositions in the industry,” said John Xiao, Vice President Marketing, Hikvision USA. Xiao also indicated that Hikvision is seeking to further expand its sales engineering team in North America. The three Hikvision sales engineers now elevated to expert status include: Matt Cesareo, Sales Engineer representing the western Mid-Atlantic region, who spent more than 20 years in law enforcement and as a surveillance consultant before joining Hikvision. Versatile security challenges In his previous roles, Matt was a Special Agent in the Technical Operations Unit for the Ohio Bureau of Criminal Investigations and was responsible for all of the electronic surveillance for his agency. He and his team also conducted all aspects of video surveillance for law enforcement agencies throughout Ohio. Matt focuses on Hikvision’s ColorVu G2 cameras, which showcase images in full color without the need for additional configuration or added devices, even in total darkness. He also supports integrators with HikCentral Professional, integrated and modular security software designed to meet versatile security challenges in one intuitive platform. HikCentral manages individual systems such as video security, access control, intrusion alarms, and more, and enables collaborating multiple systems under a unified architecture. Video security industry Walter is also a HikCentral Professional specialist, helping integrators transition to the new software Walter Santos, Sales Engineer representing the New York metro area, worked for more than 23 years providing technical and application support to customers in the video security industry, including training New York City police officers on video surveillance management and monitoring. He employs a hands-on approach to helping integrators design, installs and perfect security systems that exceed their customers’ expectations. Walter focuses on Hikvision’s 4 MP Radar PTZ cameras and Pro Series with AcuSense Network Speed Domes cameras. Like Matt Cesareo, Walter is also a HikCentral Professional specialist, helping integrators transition to the new software and educating them about Hikvision Optimus, a system-level middleware product for integration of events, alarms, and data synchronization between HikCentral and other systems such as access control, building management systems, and IoT devices. Achieving numerous certifications Kevin Shumate, Sales Engineer representing south Florida and Puerto Rico, grew up in the security and surveillance business working at his parents’ security company from the time he was young. Because Hikvision solutions were their company’s go-to products for surveillance, Kevin attended many training courses, gained an extensive amount of product knowledge, and achieved numerous certifications. As a valued resource for integrators, Kevin excels at developing partnerships, helping to create effective security solutions for challenging applications, and educating integrators on unique and useful technologies. His focus is on Hikvision’s 4 MP ColorVu Solar-Powered Security Camera System, a standalone solution with a solar panel and a built-in battery, providing 24/7 color images, which he describes as a perfect fit for his territory’s climate. Hikvision’s sales engineering team provides a tremendous resource for security integrators and dealers by delivering a superior level of product and systems expertise and exceptional customer support skills.
The new IDIS Intelligent Video Wall Station, designed as a simple plug-in for the cost and license-free IDIS Center VMS, brings the benefits of video wall services to a wider market, including smaller and mid-sized customers. The new offering makes it easier for businesses to plan, design, configure, and use dynamic video walls. It lets them optimize safety and security, with centralized monitoring for single or multiple-sites, without the traditional price tag. IDIS Intelligent Video Wall Station Integrating seamlessly with IDIS’ full line-up of network and analog cameras and devices, as well as third-party technologies, the IDIS Intelligent Video Wall Station uses a single server and network wall controller, to manage up to 12 UHD monitors as standard. The station connects up to 4,096 cameras and lets operators monitor 64 panes simultaneously, including de-warped 360-degree fish-eye video. Now, users can easily customize their monitors to display the most critical video streams and event data, to provide a real-time visual overview. Fast and efficient incident response The new solution combines remote and straightforward configuration with batch firmware updates Advanced features enable a quicker and more efficient incident response, paired with smoother and more dynamic video search, playback, and forensic export. The new solution combines remote and straightforward configuration with batch firmware updates, simple role-based access management, audit trails, and device health monitoring. For customers, this results in increased efficiency and minimal maintenance, delivering on the IDIS promise of a low total cost of ownership (TCO). Designed for 24/7 video surveillance operations And with H.264 and H.265 dual codec fully supported, users can retain their existing and third-party screens, reducing waste and saving budgets, or for upgrades, they can also choose from the IDIS range of reliable, low power consumption monitors, designed for powerful, but economical 24/7 surveillance operations. The IDIS Intelligent Video Wall Station also integrates seamlessly with the enterprise-level IDIS Solution Suite VMS, making it easy to expand or adapt the system, as operational requirements change, giving customers the assurance of a future-proof investment. Dynamic video wall monitoring solution “It’s more important than ever for organizations to enhance situational awareness, while increasing efficiency,” said Andrew Myung, the President at IDIS America. He adds, “The addition of the IDIS Intelligent Video Wall Station delivers the benefits of advanced and dynamic video wall monitoring, without the need to design and build dedicated control rooms, or incur the costs of traditional VMS recurring maintenance agreements, or ongoing device connection fees.”
Ava Security has launched the ability to use third-party sensors with Ava Aware Cloud, the open data platform for building and facilities intelligence. By merging video security with sensor technology, organizations can unlock the enhanced situational awareness of security along with facility management, staff well-being, and productivity. Open Ava Aware data platform Siloed unconnected systems are a big challenge for organizations seeking greater insights and better building security. Integrations either require heavy, custom development, or organizations are often forced into a single vendor lock-in when moving to certain cloud vendors. Organizations can now use the open Ava Aware data platform with third-party sensors to capture insights into their sites' activities and environmental conditions. Users can set rules for real-time notifications and alerts for readings such as abnormal noise levels, temperature, proximity, touch, humidity, smoke, vape, chemicals, and gas, allowing organizations to act quickly on environmental incidents. Integrating data with video footage Sensor data combined with video security footage through a single interface allows getting a clearer picture Sensor data is combined with video security footage through a single interface, allowing organizations to get a clearer picture of the security incidents that could impact their facilities, assets, and people. For example, by associating a sensor with a camera, facility operators and IT would immediately see the sensor alarm and the real-time video associated with that sensor (e.g. an open emergency door). Businesses derive value beyond security; gathering data that can help achieve greater efficiency and improve operations. Initial sensor integration rollout Ava Security is initially launching these quarter integrations with the Halo smart sensor from IPVideo Technology and the tiny wireless sensors from Disruptive Technologies. Customers also have the option to integrate with other sensor providers of their choice through Ava’s open API platform. As a cloud-native and open platform, Ava Aware customers benefit immediately from new features and value as they are delivered over time. Features of Ava Aware Cloud The Ava Aware Cloud is also incredibly flexible, allowing customers to: Connect sensors in minutes, set up rules, and notify users in real-time View sensors on intuitive floorplan maps Associate sensors with cameras with simple drag and drop Remotely monitor sensors from anywhere in the world Secure sensor data through end-to-end encryption, SSO, and 2-factor authentication Cost-effective and flexible solution Ava’s open architecture solves provides a cost-effective and flexible solution on the market" Sam Lancia, Head of Video Engineering & Co-Founder of Ava Security commented, “There is immense power in the visibility gained by combining the data from sensors with intelligent video security systems as it creates a far clearer picture for an organization. Historically, this wasn’t possible because systems were too difficult to set up, often disconnected from one another, and organizations had to rip and replace existing investments to install software and devices from a single provider.” “Ava’s open architecture solves this problem for organizations, providing them with a cost-effective and flexible solution that utilizes the best technology on the market. We already have keen interest from a range of customers across different verticals such as real estate, education, and retail.” Physical security Bengt Lundberg, CEO of Disruptive Technologies commented, “Ava Security is at the forefront of physical security. We are looking forward to seeing customers unlock the value from our combined products and services through this partnership.” “The Ava Aware system, enhanced by the DT sensors, unlocks huge potential for real-time insights for organizations to inform their security and facility management.”
March Networks is pleased to announce that it has achieved CyberSecure Canada certification, developed by the Canadian Center for Cyber Security, Canada’s authority on cybersecurity. In order to become certified, an organization must put into place the requirements of the 13 security control areas developed by the Center. Examples of these control areas include developing an incident response plan, implementing strong user authentication, providing employee training, implementing data recovery methods, and ensuring encryption across all data. Accredited certification body After implementing the requirements, an organization must go through a rigorous audit by an accredited certification body. March Networks is pleased to have been successful in the implementation of these stringent requirements. “March Networks’ solutions are deployed by some of the world’s largest banks, retailers, and transit agencies, organizations with the most demanding cybersecurity requirements,” said Net Payne, Chief Sales & Marketing Officer for March Networks. “Our complete end-to-end approach to cybersecurity – covering our people, products and processes – enables us to continually meet these rigorous standards year after year. Achievement of this certification is further evidence of our commitment to cybersecurity and data protection.” Extensive physical access March Networks’ holistic approach to cybersecurity involves a 360° view of all areas of its business March Networks’ holistic approach to cybersecurity involves a 360° view of all areas of its business – from product development and source code management to operational processes such as securing corporate technology infrastructure. It also includes internal processes incorporating security controls, employee education, and the protection of customers’ data and privacy. The company’s Network Operations Center, for example, operates with extensive physical access and networking controls and restrictions to ensure the security of customer data. The company also participates in comprehensive security audits and penetration testing on a regular basis, as well as when initiated by its large enterprise customers seeking to confirm the security of their video solution provider. Identifying potential vulnerabilities In addition, March Networks takes a proactive approach to identify potential vulnerabilities in its products. The company’s Security Updates and Advisories program involves regularly tracking US-CERT reports on identified vulnerabilities, conducting in-depth investigations when required, and alerting customers and partners to any necessary software updates via email alerts and information posted on the March Networks website and Partner Portal.
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialized equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair color, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders. In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero. Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually. Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.” Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.” “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.” Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs. Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.” A simple but effective fraud Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes. A primary risk is SIM Box fraud. SIM Box fraud SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal. The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.” While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box. Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.” Is it illegal? If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service. For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organized crime or people trafficking.” “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.” Other telecommunications fraud Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market. While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion. The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetize their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.” “The call starts as a dialed telephone call, but the user receives it within an OTT app. If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.” Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.” According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”. This is defaulted to “on” when the app is downloaded. Only the most technologically savvy users would even know it was there. Combatting the fraud against networks Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud? The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.” “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible. This has led to a mindset where whatever the questions the answer is always more marketing promotions.” A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return. An opportunity for the future As mobile networks mature and become more commoditized, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behavior that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.”
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalization in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialog over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritization to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customized accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
Nestled on the Western shore of Lake Como, the Grand Hotel Victoria in Menaggio is one of the latest 5-star luxury properties in the Larian landscape. The magnificent resort in Art Nouveau style, which encompasses a late 19th-century palace and a former monastery, has been completely renovated to host 81 rooms, lush gardens with pool, more than 2,000 m2 spa, 2 restaurants, and 90 car places in the underground parking. End-to-end security solutions The Grand Hotel Victoria in Menaggio, wedged between the lakeside and the heights of the Lepontine Alps, promises its guests a unique experience. To make this happen, it is essential to improve the security level. Dahua Technology is a world-pioneering video-centric smart IoT solution and service provider. Based on technological innovations, it has offered end-to-end security solutions, systems, and services to create value and solve problems for clients. This is why the hotel management entrusted Dahua and MD Impianti – its system integrator partner – the realization of the perimeter and indoor surveillance system. AI-based cameras and deep learning With deep learning, Dahua Perimeter Protection technology can recognize humans and vehicles accurately In the solution provided by Dahua Technology, 15 units of IPC-HFW5241E-ZE 2MP bullet cameras with 2.7~13.5 mm motorized varifocal lens of Dahua WizMind series – equipped with various AI functions such as perimeter protection and people counting – were installed to guard the outside of the building providing clear images even in the low-light environment due to IR LEDs (range up to 50 m), WDR (120 dB) and Starlight technology (till 0.0002 Lux before switching to B/W). With the deep learning algorithm, Dahua Perimeter Protection technology can recognize humans and vehicles accurately. In the restricted areas (such as pedestrian areas and vehicle areas), the false alarms are largely reduced. Dahua Lite series network camera After crossing the main entrance surmounted by a balcony that rests on four Doric columns, no less than 110 units of IPC-HDW2431T-AS-S2 4MP eyeball network cameras – featuring IR LEDs and Starlight themselves - discretely watch over the premises of the historical and new wings. With upgraded H.265 encoding technology, the Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest Starlight technology and displays better color images in the condition of low illumination. Enterprise-level NVR NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage Two 128-channel NVR608R-128-4KS2 network video recorders with 8 hard disks and redundant power manage all streams, while the networking was implemented with ePoE, PoE, and aggregation switches, connected by CAT6 cables and optical fiber. For applications where details are critical for identification, this enterprise-level NVR provides a powerful Intel processor with up to 4K resolution. Additionally, the NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and backup storage. Remote monitoring All images collected by the whole system can be visualized both in the concierge and remotely. The latter is a feature that allows great flexibility to meet the needs of the end-user, who is already evaluating the integration of DSS centralization software and a video wall. The system protecting the prestigious Gran Hotel Victoria in Menaggio demonstrates once again how Dahua Technology, along with its partners and supply chain, is capable of providing high-profile and tailor-made integrated security solutions, suitable for any scenario and compliant with current legislation.
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times and Milestone XProtect VMS has supported the airport’s needs along the way. As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash, and expanded parking facilities. As the need to increase security continues, XProtect open platform software will enable IT team growth and the seamless integration of new cameras, and data storage capabilities. Enhanced situational awareness All video is kept for up to a full year, with most of the system’s cameras set for motion recording, around the clock. As a result, administrators achieve greater situational awareness and better security. The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport contends with a great deal of plane de-icing, for several months each year. The process occurs at a distance from the main buildings. Thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing airline personnel to monitor progress on their own has saved airport staff time and resources. Monitoring security In addition, the airport uses the system to closely monitor the security checkpoint, to capture video documentation, in case of an incident. By monitoring baggage areas, it’s possible to investigate lost bags and left-behind items, by reviewing recorded video. New 4K multi-sensor cameras support an investigatory system, helping staff see previously uncovered areas. The cameras capture high-resolution video and provide enough data to zoom in, after the fact. Deployed Agent Vi’s video analytics Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport Additionally, the team has deployed video analytics from Agent Vi, to provide a layer of automated alarms, for flagging abnormal occurrences. For example, video analytics can detect travelers moving against the foot traffic flow and crossing into restricted areas. Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport. Authorized users now have a new standard for accessing surveillance remotely. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive activity overview. Force multiplication using advanced technology The ongoing use of Milestone’s VMS makes it possible to maintain the independence and efficiency of a small team of personnel, delivering maximum security at the edge of a wild frontier. Andrew Wells, IT Manager for the Jackson Hole Airport, said “Situational awareness for our team and our clients allow us to be as secure and efficient as possible, with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport Jackson Hole Airport lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in the USA. It is unique for being entirely within the Grand Teton National Park limits. It is the busiest airport in the state of Wyoming, with nearly 500,000 in-bound passengers welcomed annually. The Jackson Hole Airport covers over 500 acres of land area and has one runway, nine boarding gates, and three baggage carousels.
Salient Systems, a pioneer in open architecture video management systems, has announced that its CompleteView VMS, an open platform video management system has been selected by Maine-based Brigid Farm for a multi-state video upgrade project for the company’s cannabis facilities. With headquarters in Saco, Maine, Brigid Farm is a vertically integrated cannabis firm that has been providing cannabis products for more than a decade. The company has recently expanded its operations to include multiple grow fields, an edible manufacturing facility, and two retail stores – a total of eight locations in Maine and one in Massachusetts. Remote and centralized monitoring As each location poses its security challenges, Brigid Farm chose the robust, open platform CompleteView VMS to enable remote access to and centralized management of video from all the company’s locations, including its retail operations, The Farm Stand, and The House of Hash. We were looking for a robust VMS that could help us easily monitor all of our operations from anywhere" “Given the heightened security concerns in the cannabis industry, and the unique security needs for our different locations, we were looking for a robust VMS that could help us easily monitor all of our operations from anywhere,” said Brett Messer, owner, and general manager of Brigid Farm. “It was vital for us to have an open system that can accommodate our future technology needs and expand as our company grows.” Integration software and LPR Brigid Farm also selected CompleteView for its ability to integrate with several other key operational technologies, including license plate recognition (LPR) to monitor daily incoming and outgoing deliveries, point of sale software for retail transactions, and the cannabis industry seed-to-sale tracking software, which cannabis businesses use for regulatory compliance. “Our CompleteView VMS is widely used in the cannabis market as it is uniquely positioned to solve pain points for cannabis operators,” said Sanjay Challa, chief product officer, Salient Systems. “We’re excited to work with Brigid Farm to fulfill their integrated video management needs and provide them with operational visibility across their enterprise.”
Mister Car Wash, Inc., North America’s largest car wash network, has chosen Interface Security Systems (Interface), a globally renowned managed service provider, to upgrade and optimize its video monitoring and alarm systems. With over 350 car washes nationwide, and rapid expansion plans, Mister Car Wash is committed to delivering a safe and consistent customer experience, across all its locations. Interface overhauls CCTV System To address their unique safety requirements, Mister Car Wash chose Interface Security Systems, to overhaul its CCTV and alarm installations, and create a foundation for consistently replicating safety and security best practices, across all future locations. As a part of the upgrade, Interface successfully integrated security camera feeds with a third-party vehicle anti-collision system, to increase efficiency and reduce the chances of accidents, inside the car wash tunnel. The solution tracks the flow of vehicles, inside the car wash tunnel and automatically stops the conveyor belt, if an imminent collision is detected. Integration of cameras and NVR with anti-collision system Interface was the only vendor, who was able to seamlessly integrate our cameras and NVR with the anti-collision system" “Interface’s consultative approach to identifying key problems and innovative solution design was a breath of fresh air for us,” said Jim Figueredo, Director of Asset Protection at Mister Car Wash. He adds, “Interface was the only vendor, who was able to seamlessly integrate our cameras and NVR with the anti-collision system. This has allowed us to reduce costs, while improving operations. The true benefit of using Interface is their ability to really understand our problems and go the extra mile to suggest future-proof solutions that can scale.” Expanding operations and enhancing customer safety With Interface Security Systems, Mister Car Wash is able to expand operations rapidly, while delivering a safe and consistent customer experience. By upgrading and optimizing the video monitoring and alarm systems, Mister Car Wash has reduced false alarms, minimized instances of false vehicle damage claims, reduced general liability issues, and improved overall safety, at their locations. Having upgraded over 90 locations, Interface is collaborating with Mister Car Wash, to eventually bring most of its countrywide network of locations, to the new technology standard.
Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers. Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA). Dahua’s Security solution Empresa Panamena de Alimentos is a renowned company in the processed food industry in Panama, Central America. It was founded in 2012 and owns production plants and warehouses in the capital city, as well as agencies around the country. EPA’s products, including all kinds of cookies, coffee, and pasta, are already important parts of consumers’ day-to-day life. With the prevailing COVID-19 pandemic risks, EPA needed a system to sustain efficient management and operation, over their staff and facilities. Implementing multiple access controls in the facilities As a food company, the operations of the company need to be under caution, especially during the pandemic As a food company, the operations of the company need to be under caution, especially during the pandemic. It was necessary to implement multiple access controls in the facilities. With multiple plants located around the nation and accelerated growth, a centralized monitoring system for all equipment, alert management and user reports was needed. The solution, applied at EPA’s facilities, integrates various electronic security systems under a single platform and was evaluated based on the company’s needs. ANPR, AI-based cameras and access control systems “Currently, 480 Dahua devices have been arranged. Among them are different models of cameras, access control systems, and automatic number plate recognition products. AI-based cameras enhance the level of personnel protection. Everything is monitored by a DSS Express server in the main plant,” said Luis Araujo, the Manager of Infrastructure and Telecommunications of the Secutec Panama. Every day, more than 800 employees enter EPA facilities nationwide, the access control system allows a faster and safer automated entry of the staff and their cars. access controllers and Pro Network Video Recorders Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted Apart from automatic number plate recognition (ANPR) devices, more than 20 access controllers (ASI7213X-T1) were installed in main offices for temperature monitoring and attendance management. Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted. With a powerful processor, they have the capability of 4K resolution processing and high definition recording quality. Perimeter protection and access control In Dahua Technology’s security solution, perimeter protection and access control are both realized. “We have had Dahua equipment for 7 years. It is a brand that has been of great help to our safety. It has contributed to continuous and steady operations throughout the COVID-19 pandemic,” said Guillermo Figueroa, EPA’s Safety and Control Manager. Javier Rodríguez, Secutec Panama’s Operations Manager, valued the quality and technology of Dahua’s solution, which has been ‘key’ for the development of their projects, the support and accompaniment to the brands that are planned to be developed. Trust in Dahua Technology’s solution “We are very proud that our teams are here for EPA and that companies, like EPA and Secutec, trust Dahua Technology. We continue to innovate to offer solutions that help companies to work in a safer and smarter way,” said Fermín Osorio, an Engineer at Dahua Technology Ltd.
Gindi TLV, a residential complex in the heart of Tel Aviv, Israel, maintains the safety of its community, by using Oosto’s face and object recognition, to reduce contact with surfaces and enforce a policy of density, distance and wearing masks in public areas. Securing Gindi TLV complex Gindi TLV is an innovative residential complex, located in the heart of Tel Aviv, which includes 4 towers, restaurants, cafes, a country club and a mall. The complex has been planned and designed to allow community life for families and individuals, who have chosen to live in the beating heart of Tel Aviv, located within walking distance of the city’s business and entertainment areas. Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities, parking, guest invitation and as a social network that is the basis for community life in the complex. Gindi TLV is also equipped with advanced and interconnected technological systems that enable efficient and cost-effective management of infrastructure and service for tenants. Oosto’s facial recognition technology The Prop-tech technology in the complex was developed and managed by the start-up, MyTower, which serves as a design partner in the project and is responsible for making it the first smart residential neighborhood in Israel. Gindi TLV uses Oosto’s facial recognition technology, in order to provide tenants with touchless and secure entry. Dan Stern, the Vice President (VP) – Digital, at Gindi TLV, explains “On the one hand, the tenants in the complex are highly sensitive to personal security and privacy, and on the other hand, because it is their home, we did everything to avoid using cards, chips or fingerprints, and allow easy access control for tenants, and their guests, using Oosto’s advanced facial recognition technology.” Visual AI and touchless access control Dan Stern adds, “Following the ongoing COVID-19 epidemic, there has been a need to expand the use of visual AI, to maintain community safety, by reducing contact with surfaces, monitoring density in facilities and public areas in the complex.” Ofer Schmidt, Sales Director of Central Europe & Israel, Oosto, said “Pre-COVID-19, maintaining tenant safety was primarily about security - letting tenants and their guests in and keeping unauthorized people out, in a transparent and smooth manner. Deployment of facial and object recognition solutions These days, we are seeing more and more prestigious residence complexes using face and object recognition" Ofer Schmidt adds, “These days, we are seeing more and more prestigious residence complexes using face and object recognition, to maintain the health of the tenant and staff, for example by enforcing a policy of on distance, density, wearing masks and allowing only vaccinated, or those with a negative test, access to common facilities, such as the gym.” He further stated, “The high accuracy of the computer vision algorithms, operating in Gindi TLV, enables the maintenance of the health of those who live or visit the complex, while minimally interfering with their daily routine. “ Video analytics using AI Video analytics using artificial intelligence (AI) to reduce COVID-19-related risks is not unique to residential complexes. According to a recent survey, 82% of academic institutions in the US and Western Europe will adopt face and object recognition technologies, in order to maintain safety through enforcing mask wearing, social distancing and reducing contact with surfaces to a minimum.
Round table discussion
Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Security software: Manufacturers & Suppliers
- Vanderbilt Security software
- Milestone Security software
- Vicon Security software
- DSX Security software
- Hanwha Techwin Security software
- Gallagher Security software
- HID Security software
- TDSi Security software
- Bosch Security software
- Nedap AEOS Security software
- CEM Security software
- Software House Security software
- CCTV Software Security software
- Honeywell Security Security software
- PAC Security software
- Dallmeier Security software
- FLIR Systems Security software
- Panasonic Security software
- IDTECK Security software
- Geutebruck Security software