As the dust settles after ASIS 2017 in Dallas, most agree it was a good show. It was different in some respects from previous shows, but several of the changes seemed to work well. Launching the exhibition on Tuesday instead of Monday was a big hit, and who could fault the idea of happy hour drinks on the show floor? Attendance may not have broken records, but end user VIPs were among the crowd, and foot traffic held up fairly well, even on the final, shortened day.

STANLEY Security virtual reality experience

What the show lacked in big, new product announcements, it made up for in an abundance of industry buzzwords, such as virtual reality, Internet of Things, cybersecurity, and artificial intelligence.

Virtual reality (VR) is among the “enhanced” security solutions highlighted by Stanley Security at its ASIS booth. The interactive “virtual reality experience” provides training for critical response situations, such as active shooter, security assessment and suspicious behavior, and fire safety. The trainee wears VR goggles and holds two controller wands to “teleport” and to interact with elements within the environment, which can be customised to an end-user’s specific site.

The system provides realistic training scenarios to improve decision-making and reduce human error – I tried it out and managed to escape a fire. Stanley is partnering with HTX Labs to provide the system, previewed at ASIS 2017 and available in three to six months.

Another theme at the Stanley Security booth was an emphasis on internet of things (IoT) management and monitoring, specifically a system that monitors a system’s health and event status at a very deep level. Continuous automated oversight of a customer’s system reduces downtime, enhances safety, lowers costs, and delivers automated proof of compliance to standards. The system analyses and monitors performance on a constant basis and is customisable. Stanley partners with Viakoo to provide the cloud-based system.

Cybersecurity challenge

Cybersecurity was emphasised at many ASIS booths, reflecting growing concerns in the industry and a realisation that cybersecurity is a shared challenge among manufacturers, integrators and end users. An example was the CyberVigilant system from IndigoVision, which monitors an IP video network and picks up anomalies that point to cybersecurity risks.

The patented system combines IndigoVision’s IP expertise with specific knowledge of a site’s cameras, NVRs and workstations. It can detect anomalies such as unauthorised configuration access attempts, network reconnaissance/scans, device access from unauthorised clients, shell access, use of unauthorized DNS, NTP and SMTP servers; and denial of service (DoS) attacks.

Stanley Security interactive VR experience
The interactive “virtual reality experience” provides training for critical response situations

CyberVigilant is incorporated into IndigoVision’s new Control Center 15.0 software release, which also includes Control Center Mobile and artificial intelligence powered by BriefCam.

Potential impact of deep learning and AI

Software improvements were also a theme, including, for example, Open Options’ release of Version 7 of its DNA Fusion “flagship” access control software, which embraces an open platform using Mercury access control panels. The system integrates with more than 30 technology partners (to date), including manufacturers of intelligent locks, video management systems, critical communications, elevator systems, and other solutions. Features include an updated user interface, and operation reminiscent of the familiar Microsoft look and feel. A differentiator is a “drag-and-drop” capability, allowing customers to “drag” an access level and associate it with an individual cardholder or a group.

The potential impact of deep learning and artificial intelligence (AI) is just now working its way through the market. Video companies like IDIS are evaluating AI and developing systems to implement it, likely in the next few months (in time for ISC West?)

“We want to make sure our AI-based video analytics meet the needs of the market,” says Josh Keaton, IDIS America regional sales manager. He says much of the early implementations of AI are aimed at showcasing a company’s capabilities rather than solving real-world problems.

IDIS’ Deep Learning Analytics (IDLA) engine, still being developed, is built on 2.6 million images of people, buses, and vehicles, and the company will seek to double that number going forward and to broaden the categories.

“The founders of IDIS have a background in video analytics and AI, so we are committed that when our AI hits the market, it will serve the real world,” says Keaton. “The idea of deep learning is that you can look at a scene and natively understand how the pattern has changed,” he adds. “You can’t categorise everything; the camera has to learn.”

Transport, enterprise and smart cities

Some of the companies seeking to leverage the power of the ASIS show did not have booths on the show floor. Some players, such as VidSys, met with end users and integrators in meeting rooms in the adjacent Omni hotel. (VidSys was also a partner in the Motorola booth.) “It’s the largest turnout we have ever had,” said Neil Chung, VidSys vice president, systems and solutions engineering.

IndigoVision CyberVigilant
IDIS’ Deep Learning Analytics (IDLA) engine contributed to the high profile of artificial intelligence (AI) at the show

The converged security and information management (CSIM) company was highlighting a suite of video and big data analytics capabilities added to their system through a partnership with Micro Focus. The AI system works “in the background” to characterise and filter out anomalies (false positives) to alert customers only to situations that require attention. VidSys focuses on large transportation, commercial campus/enterprise customers, and smart cities, where they interface with a variety of sensors.

“The most excitement is over our social media integration and how external events can affect their business,” says Chung. In addition to security and other internal systems, VidSys can monitor outside sources, such as RSS and Twitter feeds through technology partners such as DataMiner. “If an event happens near a customer facility, we can use our business rules to notify them. People are realising that there’s more information outside the systems that they control, and they want to start taking advantage of it.”

The move to road shows

Another company not exhibiting at ASIS 2017 was Lenel Systems International, which is redirecting the marketing funds from exhibiting at ASIS to a series of “road shows” to spread the word about what’s new with the company. I caught up with Ross McKay, Lenel’s Global Director of Product Management, who provided an update.

Lenel’s new OnGuard release (v7.4) is coming in December, including a thin client monitoring app, the newest element in a trend toward operating OnGuard through mobile devices. “We are at a tipping point,” says McKay. “Customers can do the job without being behind a desktop. Guards can do their jobs while mobile.”

The concept of a centralized control center is being questioned, and security operations are becoming more decentralised and device-independent. “The thick client is dying,” he says. “They will coexist for the immediate future.”

OnGuard v7.4

The next release of OnGuard will also proactively support customers’ move to the cloud. Customers want to be able to put physical security servers in the cloud (such as Microsoft Azure). “The thin client and the cloud story – the webisation and the cloudisation of OnGuard -- go hand-in-hand,” says McKay. The changes are driving adoption of OnGuard into a lower tier of customers (small- and medium-sized businesses), although the enterprise will continue to be Lenel’s main market. A full SAAS solution is forthcoming in April 2018.)

Lenel will also be releasing a new version of the Blue Diamond mobile app, which leverages Bluetooth technology to enable a mobile phone to serve as an access control credential. The new version will enable favourites, allow nicknaming of doors, and quick-connect to favorite doors to simplify operation.

Despite the shift in marketing approach, McKay says Lenel continues to be a big supporter of the ASIS show. “ASIS is alive and healthy and will continue to be vibrant, continuing to reinvent itself,” he says. Attendees at this year’s show would likely agree.

Download PDF version

Author profile

Larry Anderson Editor, SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

2018 FIFA World Cup Russia integrates safety, security and service
2018 FIFA World Cup Russia integrates safety, security and service

The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction.  A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.

The benefits and challenges of in-camera audio analytics for surveillance solutions
The benefits and challenges of in-camera audio analytics for surveillance solutions

Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused responses to events Audio analytics processed in the camera, has been a niche and specialised area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Having a SoC allows a manufacturer to reserve space for specialised features, and for audio analytics, a database of reference sounds is needed for comparison Microphones and algorithms Many IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. In-built audio-video analytics Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialised features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring a camera for audio analytics Audio detectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup Noise reductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyses the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio source classificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly Messages and eventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.

How important is packaging in the commercial security market?
How important is packaging in the commercial security market?

High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who are sensitive to green factors or to minimising waste. We asked this week’s Expert Panel Roundtable: Is packaging of products important in the commercial security market? Why or why not?