Visitors to The Security Event will be among the first to see live demonstrations of some of the latest products to be launched by Tyco, the security division of Johnson Controls. A wide range of access control, intrusion and video products from the American Dynamics, Exacq, Illustra, Bentel, CEM Systems, DSC, Kantech, Software House and Visonic brands, which are supplied under the Tyco umbrella, will be on show on stand SE102. These include: Access Control Credential iotega, an all-in-one smart security and home automation platform for residential and small commercial properties A new camera to cloud solution which provides a cost-saving and efficient and method of managing IP cameras and securely storing video in the cloud. The recently launched Illustra Flex IR 30 x PTZ cameras which have adaptive IR illumination that adjusts the intensity of the IR in line with the operator controlled zoom setting of the camera. A new 8 channel VideoEdge Deep Intelligence Network Video Recorder (NVR), which utilizes machine learning techniques with the help of a powerful Graphic Processing Unit (GPU). This optimizes the ability of the NVR to display highly accurate video intelligence compared to standard methods of video analytics. Kantech EntraPass software which enables users to operate any number of doors where card access is required and provides support for a server based Go Pass mobile App that allows card holders to use their mobile phones as an access control credential. iotega, an all-in-one smart security and home automation platform for residential and small commercial properties. Commercial Security Exhibition Tyco is a Founding Partner of The Security Event which takes place at the NEC Birmingham on 9-11th April, 2019 and is intended to fulfill the need for a UK focused commercial security exhibition. “The opportunity to take an active role as a Founding Partner in an industry event which will be at a location which so many of our customers consider ‘home’, is extremely welcome,” said Gordon Morrison, GB Sales Director for the Tyco Security Products access control and video brands. “The concept, focus and size of the show makes it ideal for us to showcase our unified fits with our requirements and plans for a major part of our business."
Wavestore, developer of highly secure and open platform Video Management Software (VMS) solutions, will be hosted by three of its technology partners at ISC West, which is taking place at the Sands Expo, Las Vegas on 10th -12th April 2019. Visitors to the Feenics, Mobotix and Raytec booths will have the opportunity to see how easy it is to benefit from a fully integrated security system with Wavestore at its heart. Wavestore VMS Solution As a truly independent company, Wavestore focuses solely on the development of its highly secure VMS platform to deliver an ever-evolving feature set and ensures compatibility with associated devices and sub-systems from its technology partners. If the requirement is just for video, or there is a need for a fully integrated solution from one to tens of thousands of cameras and devices, Wavestore is able to demonstrate how its VMS can help deliver a scalable and completely future-proof solution for your next project. Wavestore has a well-established Technology Partner program that allows users to benefit from seamless integrations across a host of best-in-breed brands" “Wavestore has a well-established Technology Partner program that allows users to benefit from seamless integrations across a host of best-in-breed brands encompassing cameras, access control, video analytics and much more”, says James Smith, Managing Director of Wavestore. “In addition, Wavestore’s open platform is fully compliant with ONVIF profile-S, bringing enhanced flexibility to camera choice, enabling users to achieve maximum return on investment from their security solutions.” VMS Upgrade Bundles As well as demonstrating the latest features of Wavestore’s VMS, the team will also be highlighting how choosing Wavestore can help reduce the total cost of ownership through provision of free technical support and flexible VMS Upgrade Bundles, which enable partners to stay up-to-date with the very latest features over time, without signing up to expensive recurring support contracts. The Wavestore team will be demonstrating the latest features of its award-winning VMS on the Feenics booth (22130), Mobotix booth (16089) and Raytec booth (22075).
On a mission to create safer communities, companies, and environments, Vintra uses artificial intelligence to augment the established surveillance systems deployed to protect the spaces where people work, learn, and travel. Vintra works with private companies, higher education, and law enforcement to transform visual data from any camera – including, remarkably, mobile sources like drones and dash cams – into actionable, tailored and trusted intelligence with proprietary deep learning algorithms. Backed by investors including Bonfire Ventures, Vertex Ventures and London Venture Partners, Vintra has raised $4.8 million to date. Deep Learning System Vintra’s team of deep learning experts build their own algorithms from the ground upFounded in 2016 by entrepreneur Brent Boekestein and leading computer vision experts, Dr. Ariel Amato and Dr. Angel Sappa, Vintra saw a critical need developing with the rise of security systems and proliferation of cameras, including mobile surveillance cameras that are burgeoning in use. As the use of surveillance and security cameras grows, the amount of data collected per year requires billions of hours of manual interpretation if done by human operators. With Vintra’s unique platform, this overwhelming amount of video data can be organized, analyzed and monitored through a purpose-built deep learning system. Vintra’s team of deep learning experts build their own algorithms from the ground up and GPU-optimize their models to take advantage of the latest hardware and acceleration techniques. These models can be deployed now to augment the majority of safety and security scenarios, with future plans to empower customers to create their own analytics in order to be responsive to the specific needs of each installation environment. AI-Powered Video Analytics Solution FulcrumAI can be used in the cloud, as a powerful post-event investigation solutionVintra has created FulcrumAI, an AI-powered video analytics solution capable of continued evolution and improvement over time that works on video data from any source that can be leveraged in two ways: as a tool to more accurately monitor live video feeds and produce actionable alerts, and as a tool to analyze footage in post-event investigative scenarios. The flexible system can be deployed in two ways to provide different benefits depending on the needs of the installation environment: FulcrumAI can be used ‘on-premises’ at an organization’s location, to augment human resources by transforming overwhelming numbers of live video feeds into preventative alerts, timely situational awareness, and instantly searchable video forensic data. FulcrumAI can be used in the cloud, as a powerful post-event investigation solution that enables fast, accurate, and advanced video forensics at industry leading speeds. Structuring Unstructured Video Today, Vintra structures previously unstructured video from live cameras and recorded clips to make that data monitorable and searchable with industry leading accuracy, speed, and cost in a way previously unobtainable by human operators. Additionally, Vintra strives to ensure their algorithms are ethically-developed in regard to data bias via continuous internal review to identify and correct issues prior to production. Vintra makes it easy for customers to test its solutions and review performance data on publicly available datasets"Vintra is committed to building solutions capable of reducing the unintended bias that can affect AI-powered security systems, and to creating safe spaces for everyone while respecting individual privacy concerns. Computer Vision For Video Analytics “Every year, billions of dollars in time and resources are spent on security personnel to monitor live streams as well as post-event investigations by law enforcement and analysts. Vintra exists because we knew we could use computer vision and deep learning to build a new way forward for video analytics that took mobility and customization into account,” said Brent Boekestein, CEO of Vintra. “One of the most important parts about building AI solutions is ensuring that customers, the public, and communities can trust the solutions being deployed. To that end, Vintra makes it easy for customers to test its solutions and review performance data on publicly available datasets.”
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced that the Avigilon H4 IR PTZ (Infrared Pan-Tilt-Zoom) camera has been selected as one of the recipients of Asmag’s Buyer’s Choice Awards for 2018. Winning in the network cameras category, the Avigilon H4 IR PTZ camera line combines patented Avigilon self-learning video analytics with zoomable infrared (IR) technology to provide broad coverage and exceptional image quality in a range of lighting conditions and environments. The H4 IR PTZ camera’s powerful zoom lens and IR technology allows users to see up to 250 meters (820 feet) in complete darkness. Rugged Housing Available in 1.3 MP (45x zoom) and 2 MP (30x zoom) camera resolutions, the H4 IR PTZ features continuous 360-degree rotation, enabling operators to more easily zoom in and out to capture and monitor activity in almost any direction. It also features an optional wiper to keep the window surface clear of moisture and a rugged housing design for tough environments, making it well suited for a wide range of applications. Gaining Visitor Traffic “We are honored to receive this recognition for our H4 IR PTZ camera,” said James Henderson, Avigilon’s President. “This camera provides our customers with a versatile surveillance solution, that delivers exceptional image quality and area coverage, offering the detailed evidence needed to effectively respond to security events.” The winners of the Buyer’s Choice Awards are companies who gained the most visitor traffic on their product pages, as well as the highest number of votes from global security buyers and system integrators.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organization’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The Next Wave In IP Technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analog-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analog audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial Intelligence: Hype Vs. Reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organization’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting With The Right Partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimize waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimize waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labor, fair wages and sourcing minerals from countries in armed conflict. Go In With A Plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish. Major Security System Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome. While every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs. Product Knowledge Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing. What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going. Team work is essential with large projects not only to get the job done, but also to manage any risk Comprehensive Strategy At STANLEY Security we very much focus on identifying technology solutions that minimize financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery. A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two. Manage Any Risk Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate. High Security Requirements This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues. Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skillful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents security threats that unconnected systems would not face. In 2018, we saw a notable shift from the convenience of a connected system to the less convenient, but more secure, standalone system. Consumers are willingly making the choice to trade convenience for security, and companies are responding. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019This in turn is driving an increase in more IoT-like deployments. Rather than the traditional client that is connected to a device to retrieve information, more often we are seeing more active devices, capable of reporting their presence and transmitting information on a scheduled basis, without the need for a client. Preventing Security Systems From Outside Threats This changes the dynamic of the network and alleviates many threats associated with traditional systems because there is no opportunity for outside threats to access your system since the device is transmitting information out vs requiring a connection to the outside world. With IoT deployments, when the device is active and sending messages out of the network segment, it is not vulnerable in the same way that the traditional systems are. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019. In 2018, we saw an increased acceptance in the residential market for smart home applications. While this has been an area of discussion for the past ten years, it is now gaining real traction. With artificial intelligent capabilities in tow, smart home deployments are more common than ever and the video analytics that accompany them are quite impressive. Cloud Security For The Commercial Sector If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as wellIn addition to the residential market, connected platforms will likely start to impact the commercial space as well. The border between consumer and commercial user will become a little more blurred. Companies such as Google that cater primarily to home services have cloud capabilities beyond the means of many competitors, in turn giving them a favourable advantage to provide security for the cloud. If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as well. As far as ONVIF is concerned, we are excited to see how the market will adopt the newly released Profile T for advanced video streaming in the coming year. We are also excited to explore our relationship with the International Electrotechnical Commission (IEC), by continuing our work on giving devices the ability to communicate upwards and proactively. It is clear that the market is open to adopting models in the quest for more efficiency without sacrificing security.
Application of artificial intelligence (AI) and deep learning in the physical security market runs a gamut from cloud computing to edge computing. A variety of hardware solutions enable AI to be deployed at any level of a system from the cloud to edge devices such as security cameras. Smarter AI-Powered Applications A distributed structure can incorporate cloud computing and edge computing. It extends the Artificial Intelligence (AI) algorithm from the cloud, to an edge network of on-premises video recorders and servers, and further to edge devices like the security cameras. The three-layer architecture all supports the goal to build a new class of AI-powered applications, being even smarter and faster. A combination of in-camera video analytics and deep learning capabilities in the cloud can improve video analyticsA combination of in-camera video analytics and deep learning capabilities in the cloud can improve video analytics. Cameras can be equipped with basic video analytics, and they are tied into a cloud infrastructure that provides additional deep learning algorithms. The cameras provide computer vision pre-processing, with the bulk of detailed analysis happening in a neural network in the cloud. Data capture form to appear here! The software-as-a-service (SaaS, or cloud) model gives companies the resources to improve deep learning. Systems are more accurate and can scale better and faster, using a larger data set from multiple customers accessing the cloud-based system. One customer benefits from another customer, and all the knowledge is aggregated together. Distribution Of Data From Edge To Cloud Cloud computing allows users with various computing capabilities to store and process data either in a privately-owned cloud or on a third-party server located in a data center. However, with the computing business becoming more and more versatile and complicated, the demand for data processing performance is even higher. In the process of data transition to the cloud, cloud computing consumes tremendous network resources and time, which all result in network congestion and low reliability. Distribution of data throughout a system, from the edge to the cloud, relieves pressure at any one point Distribution of data throughout a system, from the edge to the cloud, relieves pressure at any one point. With AI algorithms woven into edge devices, only selected information such as an individual or a vehicle in a video image will be extracted and sent which significantly enhances the transition efficiency and reduces the network bandwidth, while still sustaining high quality and accuracy. The Cloud Adds AI Capabilities The cloud provides additional data computing capabilities required for AI and deep learning applications. A single Amazon Web Services data center has between 50,000 and 80,000 servers. All told, observers estimate Amazon Web Services may have between 3 million and 5 million servers. The other major cloud services — Google, Microsoft, VMware, Citrix and others — add additional millions of servers. Amazon Web Services offers a broad and deep set of machine learning and AI services for a business AWS (Amazon Web Services) offers a broad and deep set of machine learning and AI services for a business. In effect, the service puts machine learning in the hands of any developer, enabling them to build, train and deploy machine learning models. On behalf of customers, AWS is focused on solving some of the toughest challenges that hold back machine learning from being in the hands of every developer. Capabilities are built on a comprehensive cloud platform optimized for machine learning with high-performance and no compromises on security and analytics. Advantages Of Edge Systems Deep learning and neural network computing are everywhere. They are now widely available in on-premises computers, in systems embedded in edge devices, and even in the cloud. The edge is particularly important in the video surveillance market, enabling systems to function despite any bandwidth or latency issues that would limit the effectiveness of a central server-based system. Edge-based functionality also limits concerns about the privacy of information and eliminates dependence on the availability of 3G connectivity. Edge computing makes it possible to ensure data is more private, rather than having it reside in a private or public cloud Artificial intelligence (AI) is a very computational-intensive process, and doing that processing at the edge avoids the need to do it centrally, whether in the cloud or in an on-premises computer. In the case of video cameras, in particular, there isn’t enough bandwidth to transfer video data across a network infrastructure to be processed. Half the populated world has Internet speeds of less than 8 mbps, which can’t possibly handle the level of data required for new intelligence applications. Latency is another advantage of intelligence residing at the edge. Applications increasingly require little to no latency (less than 200 milliseconds), and transferring data to be processed elsewhere takes time. Edge computing also makes it possible to ensure data is more private, rather than having it reside in a private or public cloud or on premises. Higher computing ability and efficiency of embedded systems at the edge are paving the way for physical security devices with intelligence far beyond what the industry now has to work with.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organizations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise Software Companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organizations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analyzing Mobile Endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyze past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android Mobile Endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution Of Artificial Intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionizing the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
Digital Barriers, edge-based IoT surveillance and security technologies solutions provider, has announced that its cutting-edge facial recognition technology was successfully deployed at The O2 in London to enhance security at both The BRIT Awards (“BRITs”) in February and the National Television Awards (“NTAs”) in January this year. The technology was used to screen guests at multiple entrances at both events, which had a combined television audience of more than 10 million viewers. “After a series of demonstrations with facial recognition providers, we selected Digital Barriers for our live trials. Their holistic approach, analytic technology and partnership with human verification worked perfectly in a real-world deployment,” said Stefan Thompson. Digital Barriers – SRI Partnership At the O2, Digital Barriers partnered with Super-Recognizers International (SRI), whose trained staff identify faces in crowds, enabling them to respond quickly to any matches on the system. Digital Barriers provides mobile apps linked to its facial recognition system, enabling face-to-face secondary verification and the super recognizers were fully trained in this technology. Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join" Digital Barriers has also announced that following this successful partnership, Kenny Long, SRI’s co-founder and COO, has joined Digital Barriers. “As an expert in people identification I’ve seen every solution on the market,” he said. “Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join.” Facial Recognition System At O2 Arena Digital Barriers and SRI have agreed to partner together wherever there is a requirement to combine facial recognition and specialist operators. “This is a unique offering anywhere in the world,” Kenny Long explained, “and I look forward to working with my former colleagues.” “The O2 is the world’s most popular music and entertainment venue, we’re continually reviewing our security measures. The use of facial recognition is proving to be a valuable enhancement to the security and safety of the venue, its guests and staff. The trials with Digital Barriers have been successful and we’re committed to creating a safe and secure venue for all our fans, staff and performers,” said Paul Williams, Senior Security Manager at The O2. “There are multiple companies in the facial recognition field making claims as to what their technologies can do in the real-world – most have never deployed at scale successfully and rely instead on exaggerated marketing,” said Zak Doffman, CEO of Digital Barriers. “We work with government agencies around the world. Our technology is field-proven in the hardest operating environments. We are delighted with the successful deployments at The O2 and that Kenny Long is joining us. Both attest to the world-class quality of our technology.”
A 300-plus camera city center video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The previous analog-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analog cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fiber lease costs, as well as reduced energy consumption and the ability to configure and maintain the cameras remotely. Installation Of IP Full HD System The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Bandwidth Efficiency Using H.265 Compression A combination of fixed and PTZ cameras were installed over a new 1GB duplex network. These include cameras from the Dahua Pro series, which features high image quality, bandwidth efficiency using H.265 compression and excellent low-light performance. Bullet cameras from the Ultra series – with powerful optical zoom, IR distances of up to 50 metres and software which supports people-counting and heat-mapping – were also installed. The design of the scheme incorporated both camera and server-side analytics with legacy motion and audio detection The bandwidth efficiency of the cameras meant that multiple cameras could be installed in any given position, providing 360° coverage of locations and up to 20 Megapixels of video capacity per location – compared with less than 400,000 pixels with the previous analog cameras. The design of the scheme incorporated both camera and server-side analytics, including video content analytics, facial recognition, ANPR, heat maps and pedestrian counting, as well as legacy motion and audio detection. The objective of the facial recognition aspect is to support operators in areas such as the search for missing and vulnerable individuals. PoE Switches For Providing Power The superior image quality of the new system is borne out in figures which show an increase in ‘actionable’ images from 5% with the previous system to 60% successful reviews with the new one. Dahua PoE switches were also installed to provide power to the cameras, which are then connected to a layer-2 network. A new video wall comprising ten Dahua DHL49-4K LED backlit 49-inch 4K Ultra HD video wall display units featuring industrial level wide-viewing LCD panels, was fitted into a newly refurbished control room in City Hall and connected to i-Comply wonderwall video display drivers. This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security"Supplied through authorized distributor Mayflex, the entire system was installed by public space CCTV specialists Videcom Security, which worked with other partners to provide a high-performance, efficient and feature-rich system. Cost-Effective And Reliable Equipment Bill Mead, Managing Director at Videcom Security, said that working largely with Dahua video equipment meant it was easier for engineers in terms of configuration, as well as being cost-effective and representing good value for money. “Working with the Dahua product range has been great. The products have proved to be reliable and we experienced very few problems, from the initial configuration through to installation and commissioning. “This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security. We broke new ground with the development of 4K H.265 decoding, the support through Luxriot for camera-side analytics and edge recording, and the development by Dahua of camera-to-camera communication, allowing for non-connected systems to communicate locally.” Infinet 5GHz And Siklu E And V Band Radios Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex AcademyDahua is a solution provider in the global video surveillance industry and associated technology and has a keen focus on innovation by investing heavily in research and development. For the Lincoln city scheme, its products were selected based on their performance and cost-effectiveness to meet project budgets. Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex Academy. This helped Videcom negotiate key firmware enhancements, which added to many of the analytical features available in each of the cameras. The wireless network is built with Infinet 5GHz and Siklu E and V band radios. Resilience and diverse routing has been built into the network design, which supports video surveillance as well as public Wi-Fi and capacity for smart city services. Luxriot have worked closely with Dahua, supplying their Evo Global video management system and supporting edge analytics integration through their ‘events and actions’ management, which has also been integrated through to i-Comply’s VTAS CRVMS software (now rebranded as Viewscape). Real-Time Control And Video Streaming The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution"The introduction of H.265 compression was ground-breaking for such a project, with the system capable of displaying 4MP and 6MP H.265 to the operator’s spot monitor with real-time control and video streaming. “The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution,” said Martin Byrne, CCTV Team leader at Lincoln City Council. “The police are extremely pleased with the system and we’ve had very positive feedback from them. “There is really no comparison from how we operated previously to how we can now. It revolutionizes how we manage the CCTV systems and data. The potential for what we can achieve going forward is remarkable. We have now started to get real results from the investment in analytics; in particular vehicle and people-counting has been deployed and data is used to enhance other city projects.” Martin added: “Dahua has taken time out to visit and discuss with us our ambitions for smart city services. We have adopted Dahua as our brand of choice for CCTV cameras and have so far been very pleased and impressed with their reliability, low-light performance and overall image quality.”
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Provide Law Enforcement Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. Crowd Size Monitoring “Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software. “IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analyzing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realize its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload