A tipping point is defined as: “The point at which a series of changes becomes significant enough to cause a larger, more important change”. In the same way that IP video changed surveillance a decade ago, our industry is now feeling the impact of recent developments in Artificial Intelligence, Machine Learning, Deep Learning, Big Data, and Intelligent Video Analysis. Keyword definitions Let’s start with a few more definitions. Artificial Intelligence (AI) deals with the sim...
Information can be a scarce commodity in the midst of terrorism or a mass shooting incident. Information can also save lives during the first critical moments of such events. The general public can now download a free smartphone app that provides instantaneous real-time information as a terrorism or mass shooting event is unfolding. TerrorMate crawler software Called TerrorMate, the app began development in 2013, in the wake of several terrorist attacks in France. People in the affected areas...
Security solutions today do more than merely observe and prevent criminal activity. Systems are increasingly tasked with making sense of the world around us. At Intersec 2018, which took place 21st - 23rd January in Dubai, manufacturers set out to show how predictive analytics and artificial intelligence are already being used in real world applications to predict criminal behaviour, manage traffic, and streamline smart city operations. Dubai smart city initiatives Dubai is a particularly...
The air travel industry has evolved from one commercial passenger on the first commercial flight in 1914 to an estimated 100,000 flights per day. According to The International Air Transport Association (IATA), the total number of passengers who flew in 2017 is expected to reach 3.7 billion. But it’s not just people who fly. Each day, more than $18.6 billion of goods travel by air, which represents one-third of all world trade, by value. Meanwhile, the aviation industr...
Round table discussions
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
Featured white papers
FLIR: Key components of advanced perimeter protection
GJD manufacturing features in ‘Creating a Security Culture’ programme
VIVOTEK VAST 2: Change the way you experience VMS
CLIQ® Go - The future-proof way to support your small to medium sized customers
ASIS 2017: Only the Name Has Stayed the Same
HID Global Mobility Solutions
SourceSecurity.com: IFSEC 2017
CLIQ locking system helps to keep Helsinki's lights on
Abloy CLIQ Remote: How to solve a common problem
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. Multimedia cybersecurity campaign The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organisations can protect themselves through cost-efficient and intelligent solutions. End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the MOBOTIX system have digital thorns that protect them from unauthorised access. Protecting people, places and property “Modern video surveillance and access control technologies help protect people, places and property across the world but they are increasingly targeted by criminals aiming to infiltrate, take-over or disable these vital systems,” says Thomas Lausten, Chief Executive Officer of MOBOTIX. “With the Internet of Things trend adding billions of IP connected devices each year, our industry must lead the way in creating secure platforms that can reduce the risk posed by these damaging attacks.”The Cactus Concept protects every element of the design, manufacture and operation of each device As an important company within digital video surveillance, MOBOTIX believes in its “Cactus Concept” that protects every element of the design, manufacture and operation of each device along with end-to-end encryption across the entire usage and management cycle. SySS third party security testing To ensure the highest levels of security, MOBOTIX uses the services of SySS, a highly-regarded and independent third-party security-testing company that examines the security of both software and hardware elements. SySS customers include Basler Versicherungen, Bundeswehr, CreditPlus Bank AG, Daimler, Deutsche Bank, Deutsche Flugsicherung, Festo, Hewlett Packard, Innenministerium/LKA Niedersachsen, SAP, Schaeffler, Schufa, T-Systems and Union Investment. Sebastian Schreiber, SySS CEO said: “MOBOTIX has a contract with us to provide further penetration testing of its technology elements. The initial platform testing on a current camera model revealed very positive results and we will continue security testing as an ongoing process.” “Cyber security has been and will continue to be a core focus for MOBOTIX,” adds Lausten, “and we look forward to working with our peers in the industry, customers and government agencies to protect the very technologies and systems that help make society safer for all.”Read more
Company in profile
Internet of Things (IoT)
- Arcules heightens value of IoT data and cloud video through focus on business optimisation
- Intersec 2018 highlights solutions for retail, harsh environments
- Pulse Secure announces record sales growth and achievements in product innovation and expansion for 2017
- QNAP's 'Virtualization Station' white paper simplifies IT infrastructure and management
- Why the security industry is focusing on protecting soft targets in 2018
- Why access control systems should accommodate older systems rather than replace them in 2018
- Genetec receives US DHS’s SAFETY act Certification for anti-terrorism technology
- How to prevent autonomous vehicles from being used by terrorists