Video content analysis
ComNet, Communication Networks of Danbury, Connecticut, an ACRE company and a USA-based manufacturer of fiber optic transmission and networking equipment, has announced the introduction of its Generation 4 line of NetWave wireless products that offer greater performance and increased stability, in applications where throughput and increased bandwidth is increasingly important. NW1 Gen 4 wireless products The NW1 Gen 4 can exceed 500 Mbps throughput under ideal conditions and accommodates 10/10...
FUJIFILM Recording Media U.S.A., Inc. (Fujifilm USA) has announced the release of an online calculator designed to help video surveillance (VS) industry professionals assess the Total Cost of Ownership (TCO) for long-term retention of video surveillance content. Modern low-cost, high-resolution cameras, combined with longer-term retention requirements, are driving video content storage costs upwards, across the video surveillance industry and leading many to take a new look at their storage str...
The FLIR Vue® TZ20, the first high resolution, dual thermal sensor gimbal purpose-built for the DJI®Matrice 200 Series and Matrice 300 airframes made available in the United Kingdom. Featuring both a narrow-field-of view and a wide-field-of-view 640x512 resolution FLIR Boson® thermal camera module, the Vue TZ20 offers greater situational awareness with a 20-times digital thermal zoom capability to complete public safety and industrial inspection missions both near and far. Creating...
Exabeam, the security analytics, and automation company announces Exabeam Alert Triage, a new cloud-native application that will help security analysts confidently wrangle the overwhelming number of alerts coming at them each day from a myriad of other third-party vendor tools. Included as a new integrated application for all cloud customers using Exabeam advanced analytics and Exabeam case manager, Alert Triage enriches alerts with context and presents them in a single screen so analysts can m...
Security technology has been a vibrant and successful market for decades now, but sometimes the public is not aware of those successes. Awareness in some cases is limited because security technologies work ‘behind the scenes’ to keep everyone safe. In other cases, the industry may be seen in a negative light, based on misinformation about topics such as surveillance and privacy. How can we get the word out about our industry’s successes? We asked this week’s Expert Panel...
MOBOTIX AG collaborates with Milestone to launch a new video management system. With this launch, both companies anticipate more synergy which will soon be reflected in a new software solution called MOBOTIX HUB. The new MOBOTIX Video Management System MOBOTIX HUB will be available in different versions. From an entry-level solution for smaller applications to enterprise solutions with an unlimited number of cameras, failover, and an even larger portfolio of analytics and integrations. Expandi...
News
OpenEye, the cloud video platform, and Alarm.com have completed a joint integration to offer businesses more robust security and intelligence solutions. The cloud-to-cloud integration links OpenEye’s powerful cloud-managed video platform, OpenEye Web Services (OWS), with Alarm.com’s cloud-based smart business security platform to provide users of both companies’ solutions with enhanced video verification capabilities and advanced real-time alert notifications. The integration automatically pushes sensor and event data from linked Alarm.com for Business systems to OWS so subscribers get actionable alerts, video verification of critical events, and streamlined incident video search capabilities. Audio alarm verification Onsite OWS users can receive Alarm.com intrusion and access event alerts on-screen for active monitoring, while remote managers receive mobile push notifications. With OpenEye’s central station integrations, monitoring centers can provide critical visual and audio alarm verification services. “Our integration with Alarm.com continues the expansion of our partner ecosystem and gives our customers the ability to leverage the strengths of both platforms to provide users with the best security and intelligence solution possible,” says Rick Sheppard CEO and Founder of OpenEye. “Users can now marry our cloud video platform, and the actionable intelligence of OWS, with Alarm.com’s trusted intrusion and access control solutions through their choice of either company’s service portals.” Relevant video event OpenEye Cloud Connect lets Alarm.com for Business users take advantage of the VSaaS platform Alarm.com for Business users have easy access to video from OpenEye’s video systems through this new integration – called OpenEye Cloud Connect – as well as camera recordings associated with access control, sensor, and intrusion devices, directly on their Alarm.com for Business Activity Page. Events on the activity page include a link that opens the OWS Web Client in their browser to view video from linked cameras at the time an event occurred. Alarm.com for Business mobile users can select events with the linked video that automatically opens the OpenEye mobile app showing the relevant video event. OpenEye Cloud Connect lets Alarm.com for Business users take advantage of OpenEye’s cloud-based Video-Surveillance-as-a-Service (VSaaS) platform. Expansion of commercial solutions Subscribers can filter and search for important events on the Alarm.com mobile app or web portal and have one-click access to corresponding OpenEye video footage. Connecting both platforms in the cloud reduces time spent manually searching for video footage of important events and creates a better user experience. “Our teams have worked hard to integrate our platforms and enhance the value of our respective solutions for partners and end-users,” said Jeff Bedell, chief strategy and innovation officer at Alarm.com. “As the shift to video-surveillance-as-a-service grows stronger, both Alarm.com and OpenEye now are well-positioned to meet the increasing needs of our customers. This is a significant step forward in the expansion of our commercial solutions.”
IDIS’s latest tech-explainer eBook – The Benefits of Deep Learning Driven Intelligent Video Analytics – explores how a new generation of AI video solutions is delivering better security, safety, operational efficiency, and business intelligence. The eBook, which can be downloaded now from the IDIS website, reflects the company’s commitment to supporting its systems integrator partners as they focus on delivering advanced video solutions into growth sectors. Modern network cameras In recent years, the terms ‘intelligent’ and ‘artificial intelligence (AI)’ have been applied to many different types of security system, but without agreement on what AI means, says IDIS, so it’s important to understand that not all solutions are designed to the same standard or deliver equal value. The new eBook explains some of the differences between conventional ‘blob’ analytics - found in most modern network cameras and relatively prone to false-alarm triggers caused by environmental factors - and more powerful deep learning technologies. This newest generation AI solutions leverage neural networks made up of multiple layers of algorithms and advanced processing and can be more accurately called ‘intelligent’ video analytics. Deep learning video solutions Metadata search functions also allow users to benefit from advanced interrogation of single and multiple cameras Deep learning’s real value comes from its ability to detect events of interest and distinguish these from video data input which is just ‘noise’. But some caution is still needed, warns IDIS: deep learning video solutions can still disappoint if the engines and algorithms that drive them are not fully trained and able to recognize objects reliably and accurately. By contrast, effective deep learning video analytics can deliver multiple benefits, from preventing ‘alarm overload’ in busy security control rooms, to freeing up personnel resources and enabling security provision to be better focused. Metadata search functions also allow users to benefit from advanced interrogation of single and multiple cameras, speeding up investigations and automatically locating objects or people of interest. Face mask detection The eBook also outlines how AI video can support efficient return-to-work strategies and ensure COVID-secure facilities and workplaces using highly accurate analytics for face mask detection, social distancing adherence, people counting, and occupancy monitoring. Guidance is also provided for systems integrators, demonstrating how the same functionality will deliver value beyond the pandemic, with benefits such as facilities and workspace optimization, and actionable insights, particularly for the retail and hospitality sectors. “The best AI offerings today add value for customers by rapidly increasing productivity and efficiency, and providing useful business intelligence,” says James Min, Managing Director, IDIS Europe. “This new eBook explains how systems integrators can get past the jargon to support end-users, building a compelling business case that both addresses immediate priorities and demonstrates long term return on investment.”
Strategic Security Solutions (S3), the provider of information security consulting services for identity and access management (IAM), governance, risk and compliance, and SAP Security, announces it has formed an advisory board to provide support and guidance for S3’s strategic growth initiatives. The initial members include two widely renowned cybersecurity industry experts, Peter Tran and Michael Brown, Rear Admiral, USN (Retired), who will apply their experience to help S3 identify new strategic and tactical identity security solution opportunities and provide expert guidance on growth execution and customer delivery excellence. Information security challenges “We are proud to welcome two highly esteemed cybersecurity experts to our growing advisory board roster,” said Johanna Renee Baum, CPA, CISA, CEO and founder of S3. “At S3, we define ourselves by the experience and strength of our consultants. Tran and Brown’s technical backgrounds and deep knowledge of the cybersecurity space will bolster our group of experts and the innovative approaches we take to solving complex information security challenges and producing strategic results.” Tran is currently CISO and head of cyber and product security solutions at InferSight Tran is currently CISO and head of cyber and product security solutions at InferSight, responsible for global product security, breach response, enterprise active cyber defense operations and applied counter threat innovation, techniques, tactics, and analysis. He possesses more than 20 years of demonstrated field experience focused on developing, implementing, and growing cutting-edge cyber counter threat and exploitation solutions to address new innovations, applications, and applied cybersecurity defense methods. Cyber defense operations Prior to InferSight, Tran was vice president for Worldpay’s cyber defense operations and security strategy. He was founder, general manager, and senior director for RSA Security’s Advanced Cyber Defense (ACD) practice where he focused on next-generation information security operations designs, tactical field deployments, exploitation discovery and response solutions. Brown is the founder and president of Spinnaker Security LLC and managing partner at Resilient Advisors. Prior to his current position, he was president of RSA Federal LLC and vice president/general manager Global Public Sector of RSA Security LLC, where he oversaw RSA Information Technology, Security and Enterprise Risk Management portfolios. Cybersecurity mission activities Brown joined RSA after a career of more than 31 years in the United States Navy, where he held leadership positions within the Department of Defense (DOD) and Department of Homeland Security (DHS) regarding cybersecurity. Brown joined RSA after a career of more than 31 years in the United States Navy His last position on active duty was as the director, cybersecurity coordination for DOD and DHS, where he was responsible for increasing interdepartmental collaboration in strategic planning for the nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. “I am incredibly excited to be working with S3 as a member of its advisory board,” said Michael Brown. Delivering innovative solutions “The vision and capabilities that S3 brings to today’s complex situations are exactly what is necessary to solve the business and security problems of today and tomorrow. Their wealth of experience in delivering innovative solutions to their customers will allow them to continue to grow and ensure their critical place in the cybersecurity and IAM ecosystem.” “S3 is in a unique position as an industry leader within the IAM solutions space,” said Peter Tran. “Their proven IAM strategic approach, designs, and implementations across multiple technology platforms has proven to stand the test of time for some of the most notable Fortune 500 and Global 1000 companies around the word. I am thrilled to be a member of S3’s advisory board as the demand for IAM solutions continues to accelerate.”
Check Point Software Technologies Ltd, a provider of cybersecurity solutions globally, announces the results of an independently commissioned study conducted by Forrester Consulting which analyses the Total Economic Impact (TEI) and benefits that enterprises deploying Check Point’s CloudGuard Cloud Network Security solution can realize. The study found that CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years through higher staff productivity, reduced breach costs, timesaving for developers, and reduced compliance and audit costs. Hybrid cloud deployments Forrester interviewed a CloudGuard user, a large US-based healthcare company To understand the business benefits and cost savings possible with CloudGuard, Forrester interviewed a CloudGuard user, a large US-based healthcare company with annual revenues of over $10 billion. The company chose CloudGuard to protect its hybrid cloud deployments because it was concerned the native services available from its cloud providers are insufficient to secure the protected health information (PHI) which the organization stores and processes. The study found that in addition to CloudGuard delivering agile, seamless security across the customers' hybrid cloud assets, the cost savings, and benefits compared to cloud providers security tools included: Increased hybrid cloud security: The study states that the frequency and costs associated with cloud data breaches are lower with CloudGuard than with native security provided by cloud vendors. The [customer] is confident that Check Point Security meets the company’s needs, now and into the future. Rapid payback and ongoing ROI: CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years and a net present value of $1.25M. Quantified benefits were higher staff productivity, reduced breach costs, timesaving for developers, and reduced compliance and audit costs. Simplified security management: CloudGuard gives single-console visibility and control across the organization's multi-cloud This enables the creation of a consistent centralized security policy, eliminating duplication errors, reducing maintenance work and training needs. Flexible protection for workloads across multiple clouds: The organization can automatically secure workloads, with auto-provisioning, auto-scaling, and automated policy updates. CloudGuard gives continuous visibility, analysis, and control of the customers’ cloud security posture from CI/CD to production. Real-time security compliance: A key concern for the customer was compliance with regulatory mandates such as HIPAA. CloudGuard provides real-time compliance monitoring, improving quality and automating report production, which dramatically reduces auditing work. Multiple cloud services With CloudGuard, they use the same set of tags across multiple clouds After investing in CloudGuard and shifting multiple workloads to the cloud, the customer is now reaping the benefits of utilizing multiple cloud services while not only achieving the same level of security but also reducing the security management costs and providing productivities to developers, stated Forrester TEI study. CloudGuard has enabled the customer to better control the developers’ application of security rules without hindering them. Getting the security right at the beginning has eliminated rework later. The study also stated that confidence in Check Point security leads to more rapid movement to the cloud. Each cloud [service] has its own language. With CloudGuard, they use the same set of tags across multiple clouds and across different accounts and subscriptions. They would have had to manage everything separately if they had done it natively, stated the customer in the study. The customer also stated: “We don’t need to manage 27 different things across three different clouds to accomplish the same task. We have a single management solution in CloudGuard.” Enterprise cloud deployments “Security is often seen as a barrier to enterprise cloud deployments because managing multiple cloud providers’ security controls adds cost and complexity, and traditional security is not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of product management at Check Point Software. “We believe Forrester’s analysis is consistent with what we hear from our CloudGuard customers: it gives them the most secure threat prevention with industry-leading security effectiveness for their hybrid cloud estates, with easy, automated single-console policy management and enforcement. This strengthens their security posture, boosts efficiency, and delivers a rapid, ongoing ROI. This increased cloud confidence allows our customers to migrate more workloads to the cloud, and faster.”
Having cost a cumulative number of over 65.8 million reported cases and 1.5 million deaths globally and the COVID-19 pandemic has casted a shadow on almost everyone in the world. The Coronavirus disease (COVID-19) Weekly Epidemiological Update and Weekly Operational Update by WHO gives us a hint that the situation might not recover any time soon. Compromising to the reality, people are doing everything to better protect themselves and the loved ones in the new normal. Aside from taking the general advices that authorities give to citizens, such as keeping social distance, meeting people in open space, wearing masks, etc., people are inclined to seeking help from high technologies. Touchless access control During work resumption, people need a way to reduce physical contact as much as possible, and that’s where face recognition enabled touchless access control comes in. Face recognition is unquestionably one technology that has gained so much awareness during the pandemic. The face recognition access control market will grow into US$377 million in 2025, at a CAGR of 11.4% 2018-2025 According to the report Access Control Market with COVID-19 Impact - Global Forecast to 2025 by Marketsandmarkets, the face recognition access control market will grow into US$377 million in 2025, at a CAGR of 11.4% 2018-2025. Dahua Technology, a renowned video-centric smart IoT solution and service provider, releases FACT series Face Recognition Access Control Terminal for people who need to enter premises regularly. Face recognition terminal Featuring fast, accurate, convenient and trusted, it can be installed in commercial buildings, hospitals, schools, etc. Fast - Deploying Dahua’s self-developed award-winning AI algorithms, Dahua FACT series Face Recognition Access Control Terminal features face recognition speed of less than 0.3 second per person. This enables a fast entrance of employees into premises, which comes in handy especially in rush hours. Accurate - Dahua FACT series Face Recognition Access Control Terminal guarantees a 99.5% accuracy and strong adaptability to a number of demanding situations, including intense light, dark night, beard, glasses, etc., enabling a stable performance in various environments. Reducing physical contact Convenient - Enabling touchless access functionality, Dahua FACT series Face Recognition Access Control Terminal delivers significant convenience to employees, faculty, students, medical workers, etc. It also provides an additional layer of protection by reducing their physical contacts in premises they work or attend to. Trusted - Tested according to TÜV Rheinland ETSI TS 103645 standard, Dahua FACT series Face Recognition Access Control Terminal is certified by TÜV Rheinland to be compliant with the General Data Protection Regulation (GDPR). This means Dahua FACT series Face Recognition Access Control Terminal is popular in information security and privacy protection. Access control products For security distributors and installers, traditional access control products are difficult to install and wire, and the configuration operations are complicated. Dahua FACT series Face Recognition Access Control Terminal, supporting standalone mode, saves wiring cost to the most extend. What’s more, the configuration can be done in the local GUI menu through the touch screen. Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve partners and customers Dahua FACT series Face Recognition Access Control Terminal is suitable for applying in commercial buildings, schools, hospitals, etc., delivering convenience as well as an additional layer of protection during work resumption in the new normal. With a mission of “Safer Society, Smarter Living”, Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve partners and customers around the world. Product launch date might be varied depends on countries. Video surveillance industry Zhejiang Dahua Technology Co., Ltd. is a renowned solution provider in the global video surveillance industry. In 2020, Dahua Technology was ranked 2nd in “Security 50” by a&s international. Dahua Technology is committed to providing the highest quality solutions and products with the latest technologies to enable the company’s end users to perform their business successfully. The company has a high-level group of R&D engineers and technical staff working on cutting-edge technologies in camera lens, image sensor, video encoding and transmission, embedded processor, graphic processing, video analytics, software reliability, network security and other technologies.
Johnson Controls, the pioneer in smart and sustainable buildings, and Microsoft Corporation announces a global collaboration to digitally transform how buildings and spaces are conceived, built and managed. Microsoft also announced the general availability of Microsoft Azure Digital Twins. As a key partner for Azure Digital Twins, Johnson Controls’ OpenBlue Digital Twin is a comprehensive platform that will support the entire ecosystem of building and device management technologies with digital cloud technologies. IoT connected solutions Johnson Controls is a Microsoft partner leveraging several Azure services including Active Directory Services, Azure Data Lake, Access Control and Time Series Insights. Microsoft’s Azure Digital Twins is the newest Azure platform service integrated into Johnson Controls OpenBlue platform that aims to enable the creation of next-generation IoT connected solutions that will model the real world. Johnson Control’s platform turns the physical world into computable objects that will enable customers to create detailed digital versions of physical buildings, assets and systems. The use of digital twins plays an important role in helping technicians identify the root cause of issues Digital twins are digital replicas of physical entities capable of providing an in-depth analysis of data and the potential to monitor systems to mitigate risks, manage issues and utilize simulations to test future solutions. The use of digital twins plays an important role in helping technicians identify the root cause of issues accelerating problem solving. Existing building infrastructure Additionally, building managers are able to support COVID-19 safety and security protocols, while ensuring efficient use of energy and other facility resources. Azure Digital Twins enables the creation of knowledge graphs based on digital models of entire environments, whether they are buildings, factories, farms, energy networks, railways, stadiums or entire cities. These digital models empower property managers with actionable insights that drive better products, optimize operations, reduce costs and create breakthrough customer experiences. OpenBlue Digital Twin is a unique platform that is purpose-built with smart buildings and spaces in mind, enabling and unifying all aspects of an intelligent building; security, employee experience, facilities management, sustainability and more. The open platform’s open system seamlessly integrates with existing building infrastructure, regardless of brand, make or model. Analyzing large datasets Our partnership with Microsoft is a vital ingredient in our innovation strategy" “Our partnership with Microsoft is a vital ingredient in our innovation strategy, as the company shares our vision of using technology to transform the environments where people live, work, learn and play,” said Mike Ellis, vice president and chief digital and customer officer at Johnson Controls. “Digital twins are playing an increasingly important role in the design, construction and ongoing operation of healthy buildings and spaces, and can be particularly valuable when analyzing large datasets and predicting patterns and trends to tell our customers things they don’t yet know. Our OpenBlue digital platform, closely connected with Microsoft’s platform and workplace technologies, represents an unbeatable opportunity to help our customers make shared spaces safer, more agile and more sustainable.” Safe and sustainable campus "We have an incredible opportunity to use advances in cloud and compute capabilities to help customers reimagine the physical world," said Scott Guthrie, executive vice president, Cloud + AI, Microsoft. "By integrating the power of Azure Digital Twins with Johnson Controls OpenBlue Digital Twin platform, our collaboration will provide customers with a digital replica and actionable insights to better meet their evolving needs.” Among the numerous pilots currently under development is an ambitious effort at The National University of Singapore (NUS). As part of the university’s ongoing efforts to create a smart, safe and sustainable campus for students and staff, the new alliance’s complementary products and services are coming together to test the foundations of a Digital Twin-powered operations platform. Integrated building management National University of Singapore (NUS) is excited about using Microsoft’s Azure Digital Twins technology" The data-driven platform will enable integrated building management across the campus and serve as the foundation for energy and space optimization, predictive maintenance, and unmanned operations. “National University of Singapore (NUS) is excited about using Microsoft’s Azure Digital Twins technology and Johnson Controls OpenBlue platform, in our digital transformation journey that changes the way we design and manage our buildings and infrastructure, while retaining smart, sustainability and safety principles at the core of the entire campus," said Professor Yong Kwet Yew, senior vice president (campus infrastructure), NUS. Supporting sustainability efforts Working with Microsoft, Johnson Controls will address how people can return to work to maximize space while operating facilities safely, including: Energy Optimization – optimising energy usage within facilities maintenance with a goal of reducing carbon emissions that save money and support sustainability efforts. Access Control and Safety - addressing physical access and safety using live video analytics and spatial intelligence, combining Microsoft cloud services and Johnson Controls security access controls hardware end points. Collaboration for Facility Managers - integrating facility management workflows with workplace collaboration platforms such as Office 365 and Microsoft Teams to increase productivity and collaboration across remote teams. Workspace Optimization - maximising the use of spaces by merging building and occupancy data with experiences to create actionable insights for facility managers and the occupants.


Expert commentary
COVID-19 has already had a huge impact on the global economy. According to Statista, GDP growth globally will drop from around 3% to 2.4% - equivalent to a drop of around $35 trillion worldwide. In sectors like oil and gas, the impact is particularly acute: IHS Markit predicted that the reduction in oil consumption due to COVID-19 has led to a first-half surplus of 1.8 billion barrels of crude oil. The macroeconomic trends around these worldwide sectors point to harsher economic conditions and recession. For companies in the oil and gas sector running complex operations around the world, this will lead directly to tougher trading environments and a lot of necessary belt-tightening when it comes to costs around operations. Indirectly, the potential recession could cause more civil unrest and security threats for them as well. To cope with these potential challenges, companies will have to look at how they can maintain security for their operations and prevent risks as much as possible. Taking a contextual approach to physical security With these two goals in mind, looking at threat intelligence data should be considered. Threat intelligence refers to a set of data that can be used to judge current and future trends around risks, from everyday crime or political changes through to larger events like civil unrest, terrorism or the current pandemic. Based on data around these issues, companies can make better decisions on how they invest and manage their security posture in advance. Behind this overall approach, however, there are a significant number of moving parts that have to be considered. This includes where the data comes from, how it is used, and who is using the data. Companies can make better decisions on how they invest and manage their security posture The first consideration for threat intelligence is where data comes from. Typically, companies with large oilfields or refinery operations will have large investments in physical security to protect these environments, and part of this spend will include intelligence on local market, political and security conditions. Using this forecast data, your security leadership team can ensure that they have the right resources available in advance of any particular problem. This data can come from multiple sources, from social media data and crowdsourced information through to government, police and private company feeds. This mass of information can then be used to inform your planning and decision making around security, and how best to respond. However, one issue for oil and gas companies with distributed operations is how much data they have to manage over time. With so many potential sources of information all feeding back in real time, it’s hard to make sense of what comes in. Similarly, companies with international teams may have different sets and sources of data available to different parts of their organizations - while each team has its own view of what is going on, they may be missing out on contextual data from other sources held by neighbouring teams or by the central security department. Without a complete picture, it is easy to miss out on important information. Making threat intelligence smarter To solve this problem - and to reduce the costs around managing threat intelligence data - centralizing your approach can make it easier to provide that context to all your teams and stakeholders. Rather than letting each team set up and run their own threat intelligence approach, centralizing the data and letting each team use this can reduce costs. More importantly, it can improve the quality of your threat intelligence approach overall. By applying a combination of algorithms and security analysts to evaluate threat intelligence centrally, you can improve the quality of the data that you have coming into the organization in the first place. This approach provides higher quality data for decision making. However, a centralized approach is not enough on its own. Local knowledge and analysis is always useful. Consequently, alongside any centralization approach you have to have better filtering and search capabilities, otherwise you risk teams not being able to get the information that is particularly relevant and timely to them. This approach of bringing together centralized management of data feeds with more powerful tools for local teams to find what they want and get that access in real time represents the best of both worlds. Planning ahead Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022 According to consultancy firm McKinsey, the oil and gas sector faces an enormous challenge over the next few years. Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022, through to a worst case scenario where demand never returns and the industry has to undertake managed decline around some assets and look for new market opportunities in others. Whatever scenario plays out in the real world, security for existing assets will be a continued requirement. Planning ahead using threat intelligence data will be essential whatever happens. To help reduce costs and improve data quality, centralizing this approach will help. Without this mix of global oversight and local detail, companies will find their operations hampered and wrong decisions are made. It’s only by applying threat intelligence data in the right context that security teams will be able to keep up with the challenges of the future.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video Analytics Software When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. The video intelligence software processes and analyses video to detect all the people and objects that appear Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining Public Safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video Surveillance Data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing Situational Awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large Education Campuses Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless Business Operations Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Security beat
Arteco’s VCA video analytics system is their latest new product, signaling a move from machine vision-based analytics to deep learning video analytics. A server – separate from the Arteco video management system (VMS) – manages the algorithms for the analytics. Arteco has been field-testing the product for a year and a half and had planned to launch it officially at ISC West in March (which was postponed). In lieu of the trade show launch, the company has been presenting the product (along with partners) through a series of webinars. The deep learning video analytics product operates out of the box – “just turn it on,” says Steve Birkmeier, Arteco VP of Sales. Functionality is based on “training” of pre-classified objects, such as differentiating between a person, an animal, a vehicle, or just clutter. The deep learning library focuses on people and vehicles. Detection and identification The new system detects everything in the field of view The new system detects everything in the field of view and only identifies what the operator is looking for, thus reducing false alarms. Any identified object is provided with an accuracy reading (e.g., 92% confident it is a human.) The system can be set up from the graphical user interface (GUI). Arteco VCA (video content analysis) also uses analytics rules, such as “if A+B=C, then do D.” Therefore, an abandoned object may elicit a different response than a violated area. With roots in the industrial automation market of the early-2000s, Arteco offers an event-based video management system (VMS) platform. That is, their emphasis is on identifying and providing video at the moment something happens rather than managing a vast amount of video that shows, in effect, nothing of interest. Arteco’s system, providing functionality expected in a full-featured VMS, is designed around the need to react to exceptions and events. Video verification “We can pull in events from any type of system and provide the related video,” says Steve Birkmeier, Arteco VP of Sales. “It can be access control, fire, intrusion, perimeter security, radar or microwave barriers, vape sensors, license plate recognition, or whatever.” An open connector, xml framework enables Arteco to interface with other systems and provide video verification of events. In addition to a focus on event-based video, Arteco also emphasizes ease of use, building on their 20-year history with video analytics. Another point of differentiation is their open architecture that easily and repeatably enables incorporation of third-party “events.” Finally, Arteco’s systems are competitively priced (less expensive), including flexible pricing and licensing structure to maximize value for a customer. In addition to security, there are multiple operational applications that use video verification In addition to security, there are multiple operational applications that use video verification. For example, integration with warehouse management software using metadata from warehouse surveillance video can provide a searchable database. An operator can enter a purchase order number, for instance, and the system provides video associated with that sale. The role of video in physical security Arteco has traditionally been a strong player in the utilities vertical, where event-based video management is useful to keep watch on high-value assets located in remote areas with little physical security. Another strong vertical is car dealerships in the United States, including security and loss prevention applications as well as integration with fleet management (using RFID and/or license plate reading). Arteco’s heat mapping capabilities can help a car dealer analyze customer activity to guide merchandising decisions, in the same way a retail store might. Big-box stores are another application for Arteco’s combination of marketing analytics, security and loss prevention. Arteco’s strength is also proving useful in the emerging, highly regulated cannabis industry. State regulations require that each marijuana plant be tagged, and systems are required to provide total chain of custody records from “seed to sale.” In the case of Arteco, video associated with a specific plant tag is available at each stage of growth, production and sale. Coronavirus and video management The analytics can detect when people are grouped together closer than 2 meters As an Italian company, Arteco has already applied its deep-learning VCA product at city centers in Italy, which was hard hit by the novel coronavirus. The analytics can detect when people are grouped together closer than 2 meters, for example, and can provide an alarm if social distancing requirements related to the coronavirus are not being observed. The system can also detect and confirm the use of face masks at an entrance. Tracking that number – the percentage of customers who comply – in real time might offer additional peace of mind for high-risk customers entering a store, for example. Birkmeier contends the world has been changed forever by the pandemic, although acceptance over time of new technologies being introduced will vary greatly by geographic location. Already, in the last decade or so, acceptance of video surveillance has been greater, even in the U.S. market, he says. ”More often you hear ‘why don’t you have cameras’ rather than ‘I don’t like these camera here,’” he comments.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically Recognizing Gun Threats Actuate offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. The technology is centred around a CNN that aims to replicate how a human brain would process information Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances Law Enforcement Response Tai says Actuate helps to clear up that chaos and confusion. He says: “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with. This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More Than 99% Accuracy In Detecting Weapons Actuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping Customers With AI Tools As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. Our current focus for the company is to get our technology into the hands of as many customers as possible “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
Case studies
Globally renowned security video wall technology and audio visual solutions expert, Ultimate Visual Solutions (UVS) has announced that the company has secured its first contract in Poland, as part of a concerted sales drive across Central and Eastern Europe. The project deal, for a client in the energy sector, is to supply a control room with UVS Lucidity video wall controller technology. This deal takes the number of countries where Ultimate Visual Solutions has worked in or supplied equipment to 17 in the last two years. UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology during lockdown, to a client brought to UVS by the audio-visual distributor, Business International Group. The AV distributor, based in Warsaw, Poland provides professional solutions, devices and audio-visual accessories to a wide range of clients. UVS technology will be at the heart of a new operations center, where it will be providing the monitoring of key Supervisory Control And Data Acquisition (SCADA) systems and other critical data. Monitoring of SCADA systems and critical data Business International Group was introduced to Ultimate Visual Solutions by Pawel Religa, the UVS representative in Central and Eastern Europe, who was recruited to take advantage of the region’s fast-growing audio-visual markets. He was given technical support by UVS’s certified and authorized Eastern Europe pre-sale and after-sale service support partner, Robert Chlebowski of SIGE Poland. Pawel Religa has a wealth of experience in the AV sector, with previous employers including, Edbak (EDBAK Sp. Zo.o.). He is focusing on Russia, Poland and other key parts of the European mainland. Live demonstrations of UVS technology Pawel Religa commented, “The fact that Ultimate Visual Solutions (UVS) were able to provide Business International Group and their end client with very specific online live demonstrations and evaluations of the proposed UVS technology, and using the exact same SCADA application as the end client has implemented, convinced the end client that it was providing the correct solution.” Pawel further adds, “Ultimate Visual Solutions support during the sales, procurement and installation cycle has been excellent and Business Group are looking forward to a long term business relationship.” UVS remote services suite Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility Earlier this year, Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility, in order to provide full video wall technology evaluations for partners and their clients, even in lockdown or self-isolation due to the COVID-19 pandemic. Steve Murphy, Managing Director of Ultimate Visual Solutions (UVS), which is based in the Business First - Burnley Business Centre, said “This contract is the first to come as a result of the many proposals we have been doing during lockdown for Business International Group in Poland, which have benefitted greatly from our ability to provide online demonstrations.” Video wall displays and AV solutions provider Steve Murphy adds, “The investment we made at the beginning of 2020 in our remote demonstration and remote support capability is proving invaluable and has contributed to a very strong finish to 2020.” Ultimate Visual Solutions (UVS), which has its headquarters at the Business First - Burnley Business Centre in Burnley, United Kingdom, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It changed its name from eyevis UK in September 2018, following the acquisition of eyevis GmbH by the Leyard Group.
Situated near the picturesque small town of Soliera in northern Italy, the dairy plant of Italian food company Granarolo is anything but small: More than 600 farmers, 70 trucks for the collection of milk and 720 vehicles handle 850,000 tons of milk every year. Its dairy products such as milk, yogurt, ice cream, cheese, and lately also ham and pasta, supply several million Italian families every day. The plant’s huge production capacity is reflected in the size of the perimeter: The Soliera facility stretches out over 45,000 square meters. Furthermore, it is located near a wooded land which is important when it comes to designing a security system aimed at protecting the plant against intrusion. Video surveillance system Granarolo wanted to replace an old analog video surveillance system by a digital one as its security challenges exceeded the limits of the old installation. The project posed several challenges. The most significant being the vast area of the factory itself, as well as the location of the perimeter near an area that can only be poorly overseen. Since the factory is located in a heavily wooded area, building an appropriate video security system is more challenging because it needs to be safeguarded against false alarms, triggered by ever-changing lights, shadows and the constant movement of trees and plants. Tackling these challenges, Naples-based Bosch partner Gruppo Sirio worked out the modernization of the plant’s security system, with Bosch cameras featuring built-in Intelligent Video Analytics (IVA) at the heart of the system. Detecting suspicious objects Bosch provided a video surveillance system with 48 cameras of the Dinion series With the help of the security cameras’ integrated video analytics, virtual lines were drawn around the area to be protected against intrusion. When these lines are crossed by intruders, the programmed rules automatically generate alarms, alerting on-site security personnel to intervene. Whether the cameras are tasked with detecting suspicious objects or unusual movements in daylight or night-time, constant surveillance with a special focus on sensitive areas ensures security. In total, Bosch provided a video surveillance system with 48 cameras of the Dinion series. The system, which is managed on one central platform, is completely autonomous and entirely separate from any other system or network in the plant. This ensures maximum security even in the event of potential failures of other systems on site. Perimeter protection solution As a result of the modernization process, Granarolo can now rely on a system specifically designed for its needs. The newly established, digital video surveillance and perimeter protection solution supports the security personnel in maintaining maximum levels of security through the entire area. It also guarantees that food safety standards in the protected facility are guarded against outside influences. Ultimately, the system allows the staff to fully focus on keeping the production running at all times, thereby contributing to secure the sensitive chain of the Italian food supply against interruptions.
Monitoring campuses to protect students, parents, and staff means balancing proactive measures with effective response to incidents. Ava Unified Security (previously Vaion) helps one identify unwanted events like vandalism, intrusion, loitering, parking violations, or people involved in suspicious acts so that one can focus on what truly matters: delivering positive academic experiences. Anomaly detection in real-time Powered by Spotlight™, the dynamic video view with instant notifications draws attention to the relevant video feeds with potential risks. Identify intruder break-ins, loitering, guns, or unauthorized vehicles in real-time. Operators can switch between live and playback with the click of a button. Smart Presence™ depicts people as dots on maps and live footage of persons of interest. Combine with access control to monitor hallways for a complete picture of loitering, theft, or even active shooter scenarios. Gain insights on occupancy counting in classrooms and libraries for better energy efficiency. Accurate search and integrated audio analytics Smart Search™ allows operators to search by appearance, events, objects, similarity, or image Smart Search™ allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, such as laptops or vehicles, identifying suspicious people inside or just outside campus, locating missing students now take minutes instead of hours. With the same or fewer resources, operators can provide compelling evidence and mitigate liability risks. Ava Dome and Ava 360 perform perform exceptionally well either indoors or outdoors and in any lighting conditions making them suitable for different settings, such as classrooms, assembly halls, sports halls, or dormitories, and blend discreetly as interior fixtures. The integrated audio analytics identifies sound patterns and sends instant alerts in cases of broken glass, screaming, and gunshots. Key benefits Build from existing investment while retaining privacy Integrate with existing cameras Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Save storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what one needs, when one needs it, without the hassle of complicated licensing Safe and welcoming environment Capture every detail at all times with discreet security cameras Increase situational awareness Enable preventative action through immediate response time Collaboration and flexible licencing Globally access live feeds and recordings Share video links with law enforcement authorities to facilitate ease of investigations Maintain the integrity of records with video watermarking With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Marian University is a school with a mission. Having transitioned from a liberal arts college to a comprehensive university in 2009, it has become one of the private education institutions in Indiana. And that’s not all: the university has ambitious goals to grow its programs and broaden its mandate even further. Currently, the school has over 500 staff members and more than 3,500 students from across the United States and around the world. And by 2025, it aims to double its number of annual graduates. Located just ten minutes away from downtown Indianapolis, Marian University’s close proximity to a major center of American business, finance and culture is a major selling point. Managing increased traffic The city is also experiencing an influx of technology companies, making it the fifth-fastest growing municipality in the country for high-tech jobs. However, as in many booming regions, economic success isn’t evenly distributed. While some areas have experienced revitalization, others have seen social unrest and rising crime rates. As such, while Marian University’s campus has the privilege of sitting near a bustling city, these challenges aren’t far away. That fact — along with the increasing number of staff and students on the premises — motivated the university to upgrade their security systems to help keep both its people and the wider community safe. Marian University’s previous security system wasn’t up to the task of monitoring the premises, staff and students — so how would it manage increased traffic and additional properties as the school met its growth targets? High definition cameras ACC™ software is much more than a centralized source from which to review recorded video The ongoing maintenance and licensing costs were also prohibitive. Administrators were at a loss of what to do until the security integrator they were working with suggested Avigilon. With high definition cameras and built-in analytics that seamlessly integrated with Avigilon Control Center (ACC) video management software, it offered a comprehensive, intelligent and scalable solution. Additionally, the licensing fee was a one-time cost, saving the school both time and money. As the security team at Marian University found out, ACC™ software is much more than a centralized source from which to review recorded video. Not only can security operators analyze the video by zooming in and rewinding in real-time, but Avigilon Appearance Search™ technology leverages AI technology to help them instantly locate specific individuals and vehicles of interest. Advanced video analytics Furthermore, Unusual Motion Detection (UMD) technology uses advanced video analytics to flag events that may require further investigation and filter them in the recorded video timeline, allowing security operators to find and review these instances faster. All of this was made possible with the installation of intelligent Avigilon cameras and network video recorders (NVR) across the campus. “The organization is tremendous to work with,” says Ray Stanley, CIO/Vice President of Marian University. “I have never worked with a security company where I've been able to pick up the phone and have someone to help solve issues and make sure we are using the product the right way so that we see good value for our money. This was true not just in the beginning, their support exists right to this day.” Intelligent security system Avigilon coordinates with local third-party integrators to make sure the system is functioning Instead of sending Marian University setup instructions and leaving the security and IT teams to figure it out for themselves, Avigilon coordinates with local third-party integrators to make sure the system is functioning and actively helps operators learn how to utilize it to its full potential. Personnel will come onsite to work with staff and guarantee they know how to get the most from their various video analytics platforms and solutions. The main buildings at Marian University may be surrounded by quiet woodlands and wetlands, but the campus isn’t as isolated as it appears. Being a mere ten minutes away from the middle of Indianapolis, the school’s property borders several roadways, businesses and residential neighborhoods that all benefit from having an intelligent security system in the vicinity. Keeping the community safe “The great quality video has helped keep the community safe, without a doubt,” says Ray Stanley, CIO/Vice President of Marian University. “In one case, local police were able to identify a suspect involved in an incident at a nearby gas station because of our Avigilon system. Being able to help our surrounding community stay safe is absolutely an added benefit for us.” With its Avigilon solution, the Marian University campus has become an extra set of eyes for law enforcement. UMD and Avigilon Appearance Search technologies mean that criminals who make the mistake of moving across campus have a much higher chance of being detected by the authorities who can then quickly track their route to see where they have been and where they are headed. Potentially-Dangerous behavior It enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis With its user-friendly interface and high-quality video, the security installation not only helps with police work and prosecution, but it enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis, creating a safer environment for students and staff. "For example, we were able to see a suspect driving at a high rate of speed across campus, and with Appearance Search, we were able to see where the vehicle went and identify the suspect,” says Chief Richard Robertson, Marian University Police Department. “That helped us to save a lot of trouble and potential injuries.” Protecting local communities In the United States, Indianapolis looms large not only as the crossroads of the country — two-thirds of Americans can drive to the city in ten hours or less — but also as a hub of innovation and investment. However, safety continues to be a top-of-mind issue as crime increases in certain sections of the city. This is why Marian University chose Avigilon: as the school aims to provide a safe space for students and prepare them for the many opportunities Indianapolis has to offer, there’s also a deep-seated obligation to help protect local communities and public spaces. Avigilon allows it to do both — and even better, the solution will be able to scale with the university as it evolves and expands in the years ahead.
Airports are transportation hubs often located within close proximity to hotels, eateries, retail stores and sports venues. For this reason, large airports can have thousands of people approach their perimeter each day. With such a high throughput of people, security technology that detects and deters external threats is essential. When it comes to intrusion detection systems, there are several technology options, including buried pressure sensor cables, fiber optic sensors and behavioral analytics. However, an effective solution seeing increased adoption recently are thermal imaging cameras with built-in analytics. Lessons can be learned from integration firms like Ojo Technology, who oversaw the deployment of a FLIR perimeter intrusion detection system (PIDS) at Norman Y. Mineta San Jose International Airport (SJC) in 2017. Here are four advantages of thermal cameras that Ken Castle, vice president of business development at Ojo, described based on the SJC deployment. Video analysis and monitoring Thermal cameras produce images based on heat signatures rather than light. Consequently, thermal cameras capture video in total darkness, see through foliage and perform in adverse weather conditions like rain, wind and smoke. Thermal cameras provide a significant advantage for airports. As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images “The combination of darkness and distance demands a different solution, one that can be provided by thermal imaging cameras,” said Castle. “These need no auxiliary illumination, and their field of view can extend for hundreds of feet.” low false alarm rates As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images ideal for video analytics, detection and classification. “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement,” Castle explained when discussing the PIDS project at SJC. Visual proof to provide qualified alerts Deploying thermal cameras in a PIDS project provides video verification for each alert. Thermal cameras provide the data and visual confirmations that are lacking from traditional fiber-based ‘shaker fence’ systems" “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fiber-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle said. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds — none of which pose security threats. Those incidents then need to be independently confirmed by cameras. That takes extra steps and therefore consumes what could be valuable time.” Long-range detection and flexible coverage Airport perimeter solutions must have the ability to monitor vast exterior areas, from the parking lot to the terminal to the tarmac to the hundreds of portals in between. Thermal cameras provide that long-range monitoring capability. Castle reiterated this point when describing the FLIR solution deployed at SJC. “The FLIR perimeter camera system is designed to identify any attempted breaches by individuals who might try to gain access to the tarmac or aircraft from outside of the airport boundaries,” Castle said. “It also provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter. Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced.”
viisights, the developer of innovative behavioral understanding systems for real-time video intelligence based on AI, announced that it has deployed a smart city traffic monitoring system in the city of Ashdod, leveraging the NVIDIA Metropolis intelligent video analytics framework. “This project signifies how smart cities like Ashdod increase safety, mobility and quality of life by state-of-the-art traffic monitoring driven by computer vision-based on AI,” said Asaf Birenzvieg, co-founder and CEO of viisights. “viisights traffic monitoring capabilities are based on our revolutionary video understanding technology that helps in analyzing hundreds to thousands of real-time traffic video streams and alerting on complex traffic situations, including accidents, hazards and predicting and managing traffic congestion. We see this project as an example of how a city can be really smart and as a validation of the growing demand for our behavioral understanding solutions.” Intersection blocked Using NVIDIA GPUs and the DeepStream SDK within NVIDIA Metropolis, viisights’ innovative traffic monitoring system provides highly scalable and cost-effective solutions for real-time analysis of thousands of video streams. viisights video intelligence system deployed in Ashdod provides real-time advanced behavioral understanding of traffic actions and events in live video streams by monitoring intersections, crossroads, roads and streets. This enables municipalities to quickly address events of interest such as accidents, disturbances to traffic (for example, vehicles stopping in a junction or on a sidewalk), road hazards (for example, people getting in and out of vehicles in dangerous areas) and monitor traffic flows and report on various statistics. viisights technology protects public privacy by only analyzing general behavior patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or license plates. Car collision information This cutting-edge, first-of-its-kind technology from viisights assists municipalities to secure traffic flow, prevent blockage and attend to road hazards, while also enhancing their essential role in securing the life and safety of inhabitants; first responders can arrive faster at scenes of life-threatening situations, minimize injuries, and attend to dangers in traffic and more. “We are extremely proud to be at the forefront of smart city technology by being the first city in Israel to define and use this behavior recognition technology for the benefit of Ashdod citizens,” said Gamliel Edri, technologies & CCTV control room department manager for the city of Ashdod Municipality. “The viisights’ system strengthens our ability to ensure the safety and security of our citizens and even save lives. We look forward to broadening our successful collaboration with viisights to other parts of the city.”


Products


Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?