Razberi Technologies has extended its Razberi Monitor™ solution with new video health monitoring features. Razberi leverages its patent-pending deep packet inspection technology to assure security professionals that their cameras are providing secure and reliable audio and video streams. Razberi’s latest software automatically reboots cameras and sends alerts when problems are detected. Razberi Monitor provides complete system health and cyber monitoring solutions for video surveillance systems. Camera health and cybersecurity solution Razberi Monitor integrates video health with award-winning Razberi CameraDefense for a complete camera health and cybersecurity solution. Razberi Monitor also detects video server, storage and malware issues in real-time. The camera reboot feature automates a major remediation step, saving Razberi customers time and money" Video health monitoring with the camera reboot feature is immediately available with Razberi’s EndpointDefender™ and ServerSwitchIQ™ intelligent edge video appliances. According to Stephen Schwartz, VP of Product Development at Razberi Technologies. “The camera reboot feature automates a major remediation step, saving Razberi customers time and money.” Video health monitoring Razberi’s EndpointDefender and ServerSwitchIQ with video health monitoring enables Cook Security Group to save on the cost of sending maintenance crews to check on potential downed cameras. The camera reboot feature eliminates the need to physically check a camera for data loss and automates the process. “This feature will greatly benefit our customers, along with our NOC, many times a camera needs a simple reboot to restore functionality,” said Daniel Smallwood, VP of Product at Cook Security Group. “Solutions like this are exactly why we partnered with Razberi!”
March Networks, a global video security and video-based business intelligence solutions provider, is pleased to introduce new capabilities available in its powerful Searchlight software. Used by international banks and retail organizations to extract valuable information on customer service, merchandising, operations, compliance and more, March Networks Searchlight helps businesses improve performance and profitability. Integrating clear surveillance video, relevant business data and highly accurate analytics, the software also enables organizations to proactively detect fraud and theft and quickly review suspect transactions – reducing investigation times by as much as 90%. Searchlight software also enables organizations to proactively detect fraud and theft Searchlight software With the launch of this latest version of Searchlight, customers benefit from enhanced filtering and customization features that make it easier to uncover losses and compare key performance indicators (KPIs) from multiple locations simultaneously. These new capabilities include: Expanded fraud/loss detection reporting. Users can now combine specific transaction types with associated point-of-sale (POS) or ATM/teller alarms to proactively pinpoint suspect incidents. A fraud investigator at a bank might set a business rule to report on all loan applications processed with no customer present, while a retail loss prevention manager may want to see all incidents where a no sale transaction is followed by the opening of a cash drawer. Users receive a list of all of their customized exceptions along with links to the recorded video so they can quickly scan through each incident and visually verify what occurred. Enhanced transaction pattern detection, which allows users to more precisely define suspect transactions by combining transaction types (e.g. withdrawals, deposits, voids, discounts or refunds) occurring within a set time interval. A retail employee voiding a transaction immediately following a cash transaction, for example, or someone conducting two ATM cash withdrawals below a set threshold within minutes might be committing a crime. This new Searchlight software capability helps investigators identify such theft and fraudulent incidents faster and provides clear video and data evidence to help them prevent recurring incidents from happening. People counting with employee filtering, through an integration with the latest FLIR Brickstream 3D analytic sensor, to provide highly accurate customer traffic data and sales conversion metrics. The feature uses a combination of Bluetooth Low Energy (BLE) technology and employee-worn tags to automatically identify and remove staff from customer counts, a process that can otherwise be manual or missing in today’s retail environments. Personalized reports that enable users to set and save ‘favorite’ dashboards incorporating data from multiple sites. The customized reports are ideal to help aggregate and compare KPIs, such as the location with the highest percentage of voids or returns, or the most transactions per day over a defined amount. Integrated video and data solutions “These latest Searchlight capabilities make it even easier for our banking and retail customers to uncover, analyze and compare data that’s critical to the success of their business,” said Dan Cremins, Global Product Management Leader, March Networks. “With more than a decade of experience providing integrated video and data solutions to these markets, we’re now focused on expanding the applicability of the data within an organization, while constantly improving the user experience.” March Networks will showcase its new Searchlight business intelligence dashboards and reporting capabilities in Booth 1319 at the Global Security Exchange (GSX) Exposition, September 10-12, 2019 in Chicago, IL. March Networks is a globally renowned provider of intelligent IP video surveillance and business intelligence solutions. They provide technical expertise to enable organizations to realize the true power of integrated data and video. Headquartered in Ottawa, Canada, they are a global organization with corporate offices located worldwide.
Security and Safety Things GmbH (SAST) will demonstrate their open IoT platform for video surveillance cameras at the Global Security Exchange (GSX) in Chicago, September 10 to 12, 2019 at McCormick Place. The world's first open and standardized operating system with a global IoT marketplace will feature applications from more than 15 partner software developers running on security cameras from more than five camera manufacturers in an innovative, airport-themed booth at GSX. "GSX is the ideal event for us to offer a sneak preview of our rapidly growing ecosystem, which includes camera manufacturers demonstrating prototype cameras with the SAST operating system,” said Hartmut Schaper, CEO of Security and Safety Things. “We’re particularly excited to present innovative AI applications as part of the SAST marketplace, ranging from real-time edge analytics to deep learning, using technology such as Microsoft Azure Cognitive Services.” Video analytics improve store operations 15 partners to help increase security, optimize operations and improve customer experiences at airports” The airport-themed booth will illustrate video analytics use cases in three core areas of an airport: The terminal, the boarding gate and the duty-free shops. The terminal section will feature a cross-domain use case together with Microsoft Azure Cognitive Services and Here Technologies, presenting how security and customer experience can be improved with deep learning. The boarding gate section focuses on security and safety use cases, such as showcasing applications to detect abandoned luggage. In the duty-free store, partner developers will illustrate how video analytics help improve store operations and how neural network learning solutions improve the shopping experience of customers. Camera analytics with mapping services “Together with our partner Here Technologies, we will for the first time present cross-domain use cases, showcasing how travel journeys can be improved by integrating camera analytics data with mapping services,” said Nikolas Mangold-Takao, VP Product Management, Security and Safety Things. "These benefits are part of our mission and that of our more than 15 developer partners to help increase security, optimize operations and improve the customer experiences at airports and many other industry verticals as well.” All applications will run on prototype cameras with SAST OS from members of the Open Security and Safety Alliance (OSSA).
Arecont Vision Costar, global provider of network-based video surveillance solutions, will release several advanced surveillance cameras at the GSX 2019 show in Chicago, Illinois this week. The new models are all part of the company’s Total Video Solution, and will be on display in the Costar Technologies, Inc. booth (#693). The expo will be held at Chicago’s McCormick Place Convention Center, from September 10th through the 12th. The Total Video Solution combines advanced megapixel cameras, video management system, and video recorders in a cyber-secure, cloud-managed offering that is easy to use and affordably addresses today’s access-from-anywhere, anytime video surveillance requirements. Arecont Vision Costar will showcase the power of the solution via live, interactive demonstrations simultaneously using both booth monitors and smartphones and tablets to access local camera video and sites across the country. outdoor EX Dome/Bullet cameras Each EX model includes True Day/Night capabilities with integrated IR illuminators for use indoors or outside The ConteraIP Outdoor Dome EX and Bullet EX cameras first unveiled at ISC West in April are now available for ordering for customer surveillance needs. Featuring Arecont Vision Costar’s new Advanced Video Analytics suite, each high-performance EX model delivers 5MP resolution. Included analytics are camera tamper detection, intrusion detection, line crossing, and loitering detection. An optional additional suite of analytics is also available, including object classification (person/vehicle), object left/removed, and people/vehicle counting. Each EX model includes True Day/Night capabilities with integrated IR (infrared) illuminators for use indoors or outside. Each includes a motorized varifocal lens for rapid focusing during setup and offers the full suite of powerful Arecont Vision Costar single-sensor camera capabilities. These include a SDXC card slot for onboard storage, PoE (Power over Ethernet) capability, H.264/H.265 encoders, plus advanced SNAPstream+, SmartIR, Advanced WDR, and NightView technologies. EX cameras are ONVIF Profile S, G, Q, and T compliant. Fisheye Dome indoor/outdoor camera The new ConteraIP Fisheye Dome indoor/outdoor camera is immediately available. This compact, very low-profile single-sensor dome camera offers a full 360-degree image without blind spots at 12MP resolution. The Fisheye Dome is an affordable panoramic camera with advanced technology including a mechanical IR cut filter for True Day/Night use. This product is suitable for projects where a multi-sensor panoramic or Omni camera may not be warranted. PoE cameras Offering multiple de-warp display modes, the newly released PoE camera includes integrated microphone, speaker, IR illuminators, and SDXC card slot for onboard storage. H.264/H.265 encoders and advanced SNAPstream+, SmartIR, WDR, and NightView technologies are included along with the standard suite of Arecont Vision Costar single-sensor camera capabilities. The new Fisheye Dome is ONVIF Profile S, G, and T compliant. LX Series multi-sensor megapixel cameras Arecont Vision will soon release the newest member of the Omni adjustable-view camera family, the LX series Arecont Vision Costar is nearing planned release of the newest member of the award-winning Omni adjustable-view camera family, the LX series. The company first pioneered this technology for the security industry beginning in 2014, with 4 individual megapixel sensors mounted in multi-axis gimbals in a single dome. The sensors can be independently moved 360 degrees to virtually any position, covering the widest possible viewing range with a single, high performance camera. This capability reduces cost and complexity for many projects, by reducing the number of cameras, cabling, and VMS licensing required while delivering improved, non-stop, high resolution video coverage. Each motorized sensor gimbal in the upcoming ConteraIP Omni LX Remote Setup (RS) camera is equipped with a varifocal lens for time-saving hands-free setup. Simply mount the camera, connect the IP cable, and then remotely configure the device from anywhere on the network. Omni LX preset selections offer 360, 270, or 180o fields of view, and additional views can be set and saved by the user. PoE-supporting Omni LX camera The PoE-supporting Omni LX offers a choice of 8 or 20MP models capable of streaming video at up to 30fps (frames per second) with outstanding video quality for indoor/outdoor use, during both day and night conditions. The camera is ONVIF Profile S, G, Q, and T compliant. Visit the Costar Technologies, Inc. booth (#693) at GSX Chicago to see these powerful new additions to the Arecont Vision Costar Total Video Solution. Sister company, Costar Video Systems will also be displaying exciting new products and will join with Arecont Vision Costar personnel in answering any questions attendees may have throughout the three-day expo or in scheduling follow up meetings.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Video is a more common feature of security systems than ever before, driven by implementation of Internet Protocol (IP) networks. In addition, various computer analytics systems are now being implemented as a matter of course. The combination of the two trends is changing – and expanding – the operation of security operations centers (SOCs). Intelligent security operations "Intelligence is central to the next evolution of security", says Alan Stoddard, Vice President and General Manager, Situational Intelligence Solutions, Verint. An architecture is needed that can gather information from multiple devices and process it using intelligence and analytics engines. Cross-domain analytics create a higher level of security. Exposing data to best-in-class analytics provides information tailored to each security operator" “Exposing data to best-in-class analytics provides information tailored to each security operator,” says Stoddard. “There is so much data, and people need to react to it.” The result is the emergence of intelligent security operations centers (iSOCs). Consider, for example, any recent security event: “As people look to understand and get ahead of these incidents, how do they synthesize information? How do they move ahead from response to prevention?” asks Stoddard. Video-centric command-and-control Because of the expanding uses for video, Stoddard sees movement in the industry toward video systems being the focal point for integration of data sources into a command-and-control environment. “Everyone is visual, and video provides a mechanism to understand your environment,” says Stoddard. “Video-centric command-and-control marries the value of video with a map that is easy to navigate and understand. He adds, "Video is pulled in from each location, and various subsystems are integrated into a unified environment. The video management system (VMS) is a natural integration point.” To serve the combined emphasis on analytics and video management, Verint has introduced its VMS One system, a single product that combines video and integrated command-and-control for iSOC environments. The new product serves a need in the marketplace to manage diverse data streams, to analyze data for greater intelligence and to automate workflows. Integration with third party VMS VMSOne combines a VMS with a command-and-control system and is targeted to large facilities and campus-like environments with SOCs. Examples include transportation hubs, large manufacturing sites, critical infrastructure, safe cities and higher education. For even larger, enterprise-type customers with multiple locations and plenty of subsystems, Verint offers its Situational Awareness Platform, which can integrate with third party VMSs and other systems. The scalable system for very high-end customers can manage tens of thousands of devices and subsystems. VMSOne, which had a preliminary launch at ISC West and is featured at the 2019 GSX show in Chicago, is targeted to the next lower tier of customers. Customer shipments will begin in September 2019. Verint’s Situational Awareness Platform can integrate with third-party VMSs Physical and cyber security Increasingly, the security needs of end users are being converged, says Stoddard. They encompass information technology (IT), physical security and cyber security, combined with a corporate security officer (CSO) in charge of decision-making. More sensors and subsystems create the possibility of data overload for security operators, and more intelligence and analytics are tools to filter and manage that data and present it in useful form for better decision-making. Verint recently hired Jeffrey Lewis as Vice President, Marketing, to lead its marketing effort from an IT-centric perspective and talk to customers in a new way about the concepts of converged security. New technologies and a more converged environment create higher expectations and greater demands on the integrator/installer community, too. In response, Verint has launched a VIP Partner program to develop stronger and closer relationships with a select group of integrators. These “VIPs” are the “best of the best” – the most capable in the industry, knowledgeable about new technologies, and able to provide more value to end-customers. VIP Partner program Dealers are screened based on modest volume sales requirements and whether they have the right skillsets, technical capability and training. There are currently several dozen VIP partners, who “lead with” Verint solutions where they make sense in the marketplace. The VIP Partner initiative complements Verint’s other partner channels. Providing another tool to manage the flow of data in an organization, Verint recently acquired Nowforce, a small Israeli company, that provides an enhanced computer-automated dispatch system. Verint offers the integrated dispatch and response capability as either a stand-alone product or as part of the larger Situational Awareness Platform. Situational Awareness Platform Getting ahead [of security threats] requires looking at social media and other data sources" “It allows SOCs to take information in and handle response in an integrated fashion,” says Stoddard. “It also extends the security workforce, enabling customers and employees to take part in the security environment.” Stoddard adds, “Getting ahead [of security threats] requires looking at social media and other data sources, information on site, and creating a holistic security view for greater understanding,” says Stoddard. Verint’s Situational Awareness Platform integrates with third-part systems that track social media, such as Liferaft Navigator, NC4 and Dataminr,” Nowforce creates 360 degrees of control, extends the control center into the virtual workforce, and enables everyone to be managed. Information such as visuals and maps are pushed to security personnel on smart phones, and security officers get to the scene faster.
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorized activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioral understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioral understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognized a growing global need for intelligence to make physical and virtual public areas safer – and realized the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioral recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognize behavioral events in a video such as people fighting or a car collision because such behaviors can’t accurately be concluded in large scale from analyzing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognizing a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security“Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behavior inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimized for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviors can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behavior recognition, behavior events many times are not clearly defined, which is very different from object classification. Behaviors can have many variations and they can be very diverse.” An example is a simple behavior like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviors that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
The National Health Insurance Fund (NHIF) is a Social Health Insurance Scheme established by CAP 395 with the main objective of ensuring accessibility of health care services to all Tanzanians. The Fund has managed to expand its coverage to include councils, private companies, religious and educational institutions, private individuals, children under 18 (TOTO Afya) as well as mutual groups, whereby all members can equally access health services in all accredited health facilities. The Fund is also administering the Bunge Health Insurance Scheme, on behalf of the National Assembly. NHIF is a prestigious public institution that serves people all over Dar es Salaam and Tanzania. It has multiple sites spread over these regions. Their current surveillance platform had a few limitations of integrating third-party cameras and was not facilitating centralized monitoring for multiple locations. Matrix Sataya Samas is designed to meet diverse needs of large enterprises connected to a central location or a single site This posed a problem in managing and monitoring all sites from a single location. For this, they needed a surveillance platform that could easily integrate with multi-brand cameras as well as facilitate multi-location monitoring. Moreover, they needed a system with monitoring capacity of over 500 cameras with the facility of remote management for real-time security. Specifically designed solutions To the above challenges, Matrix Offered Sataya Samas Video Management System. It is a Video Surveillance management solution specifically designed to meet the diverse and complex needs of large enterprises having multiple sites connected to a central location or a large, single site. The system was able to integrate with 56 AXIS cameras available at its Head Quarters and other 16 cameras available at its district branch offices. All the cameras were managed at a single central server located at the NHIF HQ office. Matrix VMS provided real-time security with Intelligent Video Analytics such as Motion Detection, Intrusion Detection, Trip Wire etc. Additionally, VMS enabled monitoring and managing video surveillance from mobile phones and tablets remotely by using Matrix Mobile Application: SATATYA VISION. These features made monitoring much more reliable and easier for them. Project highlights : VMS Simultaneous User Licence - 3 Qty Mobile App (SATATYA VISION) Intelligent Video Analytics Benefits : Retention of existing Security infrastructure Reduces storage consumption with cost-saving features Centralized monitoring and management Real-time security
Motorola Solutions and Avigilon Corporation, a Motorola Solutions company, announced that they have been selected to help protect Georgetown County School District (‘GCSD’) in South Carolina, USA. Serving over 9,500 students throughout its 10 elementary schools, 4 middle schools, 4 high schools, career center and adult education center, GCSD sought to undergo a major security upgrade to increase safety, help mitigate misconduct and offer greater ease-of-use for school administrators, security officers and law enforcement officials using the security system. Deployment of Avigilon Control Center VMS To enhance safety throughout its locations, a complete Avigilon video security system was deployed, with over 1,000 cameras including the H4A Bullet with self-learning video analytics, H4 Mini Dome and H4 Fisheye cameras, all of which helped achieve a tailored security solution for each location while allowing school security operators to leverage the benefits of real-time analytics. Avigilon Control Center video management software was also deployed to provide a more efficient way to manage video from a central location. GCSD also uses Motorola Solutions XPR 3500e radios across its locations GCSD also uses Motorola Solutions XPR 3500e radios across its locations. If suspicious activity is flagged using the Avigilon solution, security operators can quickly contact each other using the Motorola Solutions radios and take immediate action to keep students and staff safe. By using the two systems together, school officials can seamlessly improve operations from the time an emergency call is placed until after an incident is resolved. Unified security solution for schools “Georgetown County School District is an excellent example of how Motorola Solutions and Avigilon provide a unified security solution for schools,” said John Kedzierski, senior vice president, Video Security Solutions at Motorola Solutions. “We are committed to continuing to develop products and technologies that can help enhance school safety and protect what matters most: students, staff and faculty.” “The ability of Avigilon and Motorola Solutions to provide an integrated solution for security, and critical communications is quite unique and extremely valuable to us,” said Alan Walters, executive director, Safety and Risk Management at GCSD. “We selected this system knowing that it is designed with every step of the response process in mind, which can make a world of difference in the moments that matter most.”
Each day, over 55,000 electrical substations in the United States funnel massive amounts of energy to homes and businesses across the country. An array of specialized equipment allows these facilities to keep up with demand, and each component must run smoothly to adequately transfer and distribute energy. Housing mission-critical assets vital to the community means that substations must track everything—from condition monitoring to intrusion and sabotage threats. Thermal imaging cameras, video classification analytics, and radiometric measurement offer unmatched maintenance and security insight for substations and help prevent costly issues that hurt the bottom line. AI and deep learning technologies Advancements in artificial intelligence technologies are expanding the capability of security systems Advancements in artificial intelligence and deep learning technologies are expanding the capability of security systems. As security solutions improve, customer expectations grow. Systems that were once limited to perimeter protection are now able to provide valuable process efficiency and maintenance information. Substations should consider integrating new technology that improves efficiency and safety as they move to satisfy NERC CIP-014 requirements. Problematic heating and cooling connections can plague substations. Overheating and burning a transformer is a costly, potentially multimillion-dollar error that can take several months to correct. Beyond damage costs, the abrupt loss of equipment can lead to extended service interruptions and significant revenue loss. The consequences of equipment failure highlight the importance of asset monitoring, asset resiliency, and predictive maintenance for substations. Radiometric thermal cameras Integrating cutting-edge technologies like radiometric thermal cameras and temperature trend analysis software allows facility operators to remotely inspect equipment and quickly detect issues, preventing overheating and fires. Image quality and software compatibility are vital in planning an asset monitoring ecosystem. To best serve both the security and condition monitoring needs of substations, thermal sensor manufacturer FLIR Systems and software developer Embedded Logix collaborated to create a multi-purpose solution. Security and asset monitoring For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers. A full lineup of fixed and pan-tilt thermal cameras allow security operators to monitor assets and perimeters in complete darkness, smoke, fog, and harsh weather conditions. FLIR thermal cameras provide superior resolution, capturing sharp imagery and minute details for high-performance video analytics and immediate threat detection. Quick intervention during intrusions prevents escalation, and rapid detection with thermal imaging supports fast response time. Smart-LX Sensor Gateway Recognizing threats before they ever reach the fence line deters theft, vandalism, and assault, keeping facility personnel safe and reducing the risk of equipment repair and legal costs. As an industry leader in thermal imaging, FLIR looks to partner with other innovative solution providers to create more advanced technologies. Embedded Logix, a Detroit, Michigan-based test and measurement solutions provider for the utility, plastic, food, and metal industries emerged as an ideal partner to integrate smart analytics software into thermal sensors. Their Smart-LX Sensor Gateway is an open-architecture platform that features Smart-LX Analytics with support for infrared cameras, programmable logic controllers, and SCADA systems. It opened the door for a complete predictive maintenance solution. FLIR thermal cameras Partnering with FLIR means being in the center of the infrared universe" The Smart-LX system allows both maintenance and security personnel to leverage networked thermal imagers on a single platform. By 2012, Embedded Logix was FLIR’s exclusive smart sensor software partner for temperature trending in predictive maintenance, bringing the Smart-LX platform to FLIR thermal cameras. “Partnering with FLIR means being in the center of the infrared universe. We can’t imagine any better product lineup to feed data into our Smart-LX Analytics,” said Deborah McLeod, president of Embedded Logix. “We have bench tested many other brands over the years, but FLIR’s products always come out on top, and that is why we recommend FLIR cameras to our customers. When you combine Smart-LX Analytics with FLIR cameras you turn an incredible sensor into an extraordinary solution.” Smart-LX Analytics Embedded Logix Smart-LX Analytics read, process, analyze, and create a visualization of sensor readings, generating asset performance reports on trends and rules that can be sent to maintenance personnel for further assessment. The software adapts over time with customer input, relying on user feedback to create an expert system. The Smart-LX platform works with both legacy and new equipment, analyzing signals from all sensors and systems, and is capable of aggregating information into VMS, OSI PI, and SCADA platforms. The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement FLIR offers several high-performance thermal imaging solutions for Smart-LX integration, including the FLIR A310 and FLIR FC-R Series cameras. Dual thermal and optical sensors on the FLIR A310 PT offer reliable perimeter protection and automated condition monitoring while pan/tilt controls maximize coverage. The onboard radiometric thermal sensor measures slight changes in surface temperature, allowing the A310 PT to monitor hotspots on equipment and alert an operator if temperatures exceed preset levels. FC-R fixed thermal camera The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement. Onboard human and vehicle classification analytics offer reliable intrusion detection and work in tandem with external monitoring systems to quickly alert operators and security personnel. “FLIR’s innovative A310F, A310PT, and FC-R radiometric thermal cameras have been paramount in substation monitoring for years,” said Michael Chaffee, director of business development at FLIR. “With the addition of Embedded Logix and its SmartLX software, our customers can take FLIR thermal cameras to the next level. When combined, FLIR cameras and Smart-LX software create a data goldmine, allowing a more frequent analysis of substation assets right from the security control room.” Facility security FLIR and Embedded Logix systems revolve around facility security and asset monitoring FLIR and Embedded Logix systems revolve around facility security and asset monitoring. Installing different cameras and network components throughout a substation creates an ecosystem ready to detect and prevent issues. Most security and asset monitoring systems from FLIR and Embedded Logix begin with several FLIR FC-ID cameras along the perimeter of the substation, one A310 PT mounted in the center of the substation, FC-R or A310F cameras installed around high priority assets, and several Smart-LX Sensor Gateways. When the system detects an object of interest, FLIR FC-ID cameras trigger the A310 PT camera to track and zoom on the object for further threat assessment, allowing security personnel to quickly and safely gauge the situation. Condition monitoring thermal imagers can continuously survey any asset in their field of view. Fixed FLIR A310F camera Fixed FLIR A310F and FC-R cameras monitor specific equipment 24/7, while the A310 PT can focus on multiple areas, viewing transformer connections, incoming power transmission lines, switch gears, fans, and more. Generated reports compare the performance of similar assets across all stations Smart-LX Sensor Gateways control the A310 PT preset scanning to gather temperature information on equipment, triggering an alarm if a temperature exceeds the preset threshold. Generated reports compare the performance of similar assets across all stations, address historical temperature trends, and label each temperature reading with the substation location, asset ID, and asset class information. This reporting is vital, as temperature trends can indicate trouble even when alarms remain untriggered. Remote monitoring “If the temperature is rising and falling on one asset, but the temperature on the other assets are steady, it can indicate a problem,” McLeod explained. “Even if the asset doesn’t reach the temperature threshold, the temperature slowly creeping up to that threshold is valuable information.” FLIR and Embedded Logix systems leverage remote monitoring to catch issues before they occur, preventing expensive downtime and maximizing substation efficiency. Predictive maintenance programs can identify poor-performing components, allowing operations teams to decide whether to proactively replace components or to continue monitoring. An unknown failure could cause catastrophic damage to other substation elements, causing customer outages and costing the utility millions of dollars. Thermal imaging Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely “The FLIR and Embedded Logix solution allows you to qualify with more frequency,” said Chaffee. “It ultimately enables you to save money and identify failures sooner. It’s much more expensive to replace a component after failure versus pre-failure. When a failure happens, you shut down the substation and part of the grid, which costs a lot of money.” Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely, improving efficiency during repairs. Traditionally, a thermographer would report to a substation to manually inspect equipment in need of service. Using a handheld thermal imager, the thermographer would take temperature measurements and check for load balance to determine whether equipment should be taken offline for repair. The need for a pre-work assessment and post-repair verification can make for long days. Embedded Logix Smart-LX Sensor Gateways remove this pain point. Live data access The Smart-LX Sensor Gateways give thermographers the ability to inspect equipment remotely and access live data from each networked FLIR thermal camera. Real-time temperature measurement and analytics allow the maintenance crew to confirm repairs or safely identify any additional issues. Thermographers would only need to go to a site when something is critical" “The FLIR and Embedded Logix solution enhances the role of thermographers,” Chaffee said. “Not needing to drive hundreds of miles to do a regularly scheduled thermal scan saves a lot of money. Your thermography team can scan safely, and with more frequency, from the security operations center. Thermographers would only need to go to a site when something is critical. Time is money, so being more productive as a utility and building a substation predictive maintenance program is an important element.” Critical asset monitoring Smart-LX Software works continuously to monitor critical equipment and uncover even small changes that can indicate impending failure. Intelligent maintenance and security systems are making substations safer and more efficient, positively impacting the bottom line. The insurance deductible of a significant substation asset can be hundreds of thousands of dollars. Detecting just one instance of equipment failure can prevent inordinate costs. “The Smart-LX Software solution reduces the cost of an event by detecting it much earlier. Instead of detecting a fire, you’re preventing a fire,” McLeod added. “It’s important for all stakeholders that utilities monitor changes in asset health as a means of improving reliability and reducing the total cost of repairs. Asset security and management Utilities are moving towards proactive deterrence and away from reactive monitoring He adds, “Stakeholders want to see that steps are being taken to reduce insurance claims from unnecessary escalations when a malfunctioning asset is not discovered until it fails and takes out expensive assets or infrastructure around it. Preventing costly downtime by repairing equipment at the first sign of trouble can reduce the number of unscheduled downtime events dramatically and create significant cost-savings.” Leveraging radiometric thermal cameras and analytics for both security and asset monitoring represents a paradigm shift. Utilities are moving towards proactive deterrence and away from reactive monitoring. Substation security FLIR radiometric thermal cameras and Embedded Logix Smart-LX Sensor Gateways safeguard substations and reduce the risk of critical equipment failure. Investing in stronger security keeps substations and their assets safe, and innovative, multipurpose solutions from FLIR and Embedded Logix create a win-win for utility providers throughout the country.
Thermal imaging is a technology that can provide many benefits in a wide range of applications. In particular, thermal imaging cameras have been deployed successfully as highly affordable solutions in the security industry. Accepted throughout the industry as the best 24-hour visual surveillance imaging solutions available, thermal security cameras are vital tools in securing borders, airports, sea ports, nuclear facilities, and other critical infrastructure. Today these affordable solutions are also protecting homes, corporate campuses, industrial facilities and retail businesses. Infrared-Illuminated cameras They can easily detect intruders and other potential hazards in any weather Thermal security cameras let people see what their eyes can’t: invisible heat radiation either emitted or reflected by all objects, regardless of lighting conditions. Because they see heat, not light, thermal cameras are effective tools in any security setting. They can easily detect intruders and other potential hazards in any weather, as well as day and night. Cameras that create images based on visible light—such as conventional CCTV or infrared-illuminated cameras— have the advantage of creating images that are familiar and easy to interpret. Unfortunately, the ability of a given detector, whether the human eye or a camera sensor, to create these images relates directly to the amount of light available. At night, for instance, when there isn’t much visible light, objects appear faint, or not at all. Thermal imaging cameras In contrast, thermal cameras make pictures from heat, not light, having nothing whatsoever to do with reflected light energy. They see the heat given off by everything under the sun. Everything we encounter in daily life creates or reflects heat energy, called a ‘heat signature,’ which thermal cameras can see clearly. Another limitation of relying on visible-light detection is visual contrast. Regular cameras that capture only visible light can be fooled by visual camouflage, or situations where similar colors or patterns blend together and, thus, obscure objects or people that need to be detected. Thermal imaging cameras don’t suffer this same problem. For example, an intruder standing under a densely-branched tree may be hard to detect using an IR-illuminated camera, but with a thermal imaging camera, the intruder would be clearly visible. Providing constant protection One of the biggest benefits of thermal imaging comes in the domain of security These advantages over visible cameras have led to the wide spread use of thermal to detect the presence of people in restricted or suspect areas, assess the tactical situation, and respond accordingly. No one within the view of a thermal camera can hide their heat. Thermal security cameras are the best tool to determine how many intruders are present, and, consequently, how many officers or agents should respond to meet the threat. One of the biggest benefits of thermal imaging comes in the domain of security. Security cameras have become a staple of protection for many (if not all) major businesses across the globe. In such a domain, the need to produce images of surrounding perimeters is critical to providing constant protection against potential intruders. False alarms experienced No matter what you need to see, or what perimeter you need to protect, thermal security cameras let you see clearly, even in total darkness, and through camouflaging foliage, smoke, dust, and light fog. Another reason why thermal imaging cameras often prove cost-effective is that they help reduce the number of false alarms experienced in a business protection scenario. Visible light cameras can be easily fooled by many naturally-occurring phenomena, such as blowing trees, shadows, insects, birds, or oncoming cars. In terms of motion detection, microwave, fence sensors, motion sensors, RAFID, and radar can all detect a possible intrusion, but they are essentially ‘blind’ technologies compared to thermal imaging. When a motion sensor is triggered, a user still needs an additional method of assessing the nature of the alarm, in order to determine the most appropriate response. For example, is it a person climbing the fence or just a harmless squirrel? CCTV security system Because of thermal security cameras’ high-contrast video output, security professionals have found that they work very well with video analytics. They can provide more reliable alarming with fewer false reports than visible-light cameras, even during the day. Thermal imaging security cameras offer both alarming capabilities and reliable images – two solutions in one. Prices for thermal imaging cameras have come down substantially in recent years Thermal imaging cameras are an affordable option for many businesses that want to ensure they have the best security and protection available. Prices for thermal imaging cameras have come down substantially in recent years, to the point where they are on par with regular visible-light cameras, while providing the superior ability to capture images that in many situations regular cameras simply cannot match. In addition, the total cost of ownership of a security system with thermal imaging cameras is, in general, much lower than a CCTV security system, for two main reasons. Monitor multiple areas First, a business would require fewer thermal imaging cameras than if deploying CCTV cameras, thanks to the excellent range performance of thermal imaging cameras. Since each camera needs only a mast for mounting, power, and a video feedback connection, fewer cameras are required. Business can keep their infrastructure simple, minimizing maintenance costs. Another area of cost savings is that thermal imaging cameras work perfectly in complete darkness and don’t require any lighting to maintain security and protection. Not only is lighting expensive to install, it also requires a great deal of electricity to keep those lights on all night. Businesses that wish to monitor multiple areas of their premises would be wise to deploy one or more thermal imaging cameras to provide the best protection against potential intruders, especially at night, when visible light is either low or non-existent. In short, any business that wants to achieve the maximum level of security and protection of their intellectual and physical property should consider deploying a thermal imaging solution.
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
How to Choose the Right Solution for Video Data to Enhance Security and Operational IntelligenceDownload