Download PDF version Contact company

Dahua Technology, global solution provider in the video surveillance industry, officially launched its DeepSense Series IP Cameras that include AI-powered face detection network cameras (DH-IPC-HDBW8242E-Z4FD, DH-IPC-HFW8242E-Z4FD-IRA-LED and DH-IPC-HFW8242E-Z20FD-IRA-LED) and face recognition network cameras (DH-IPC-HDBW8242E-Z4FR, DH-IPC-HFW8242E-Z4FR-IRA-LED, and DH-IPC-HFW8242E-Z20FR-IRA-LED). Driven by AI deep-learning algorithms, they enable accurate face capture and face attributes analysis for real-time monitoring, mainly applied for business parks, schools, airport, banks and shopping mall key areas.

AI-powered face recognition DeepSense Series IPC offers high clarity face image snapshots, even in the most contrasting lighting conditions

Based on Dahua’s AI-powered security technology, as well as industry leading wide dynamic range (WDR) technology, DeepSense Series IPC offers high clarity face image snapshots, even in the most contrasting lighting conditions. Besides, the series supports six different facial attributes extraction from the video and abstracts those different attributes including gender, age, expression (happy, calm, surprised, sad, and angry), glasses, mouth masks, and beard & moustache, which makes searching and tracking subjects of interest more efficient.

By taking pictures instead of recording videos, Dahua’s new IPC effectively cut the bandwidth requirements. And when a blurry or angled picture is detected, it will automatically be discarded, so that only the clearest and the most suitable images are sent for analysis, further saving bandwidth and storage space. Moreover, supported by advanced video encoding standards (H.265 & H.264), it saves up to 70% storage while maintaining high quality video compared to standard video compression standards, greatly reducing the total operation cost for users.

Dahua DeepSense Series IPC Dahua’s DeepSense IPC offers a user-friendly and flexible way for data management, making face comparison more convenient

After exporting the information into the built-in database (up to 10,000 face images), Dahua’s DeepSense IPC offers a user-friendly and flexible way for data management, making face comparison more convenient. Additional functions such as black/white lists and stranger mode, those who are recognised as strangers or blacklisted people will trigger the alarm in advance, further improve the efficiency of monitoring. It allows users to control the similarity threshold, providing targeted face comparison according to users’ specific needs

Dahua Technology leverages the power of AI smart devices to help people understand the world in a better way, and Dahua Technology will continue to lead the application of AI in security industry, enabling a safer society and smarter living for customers and partners around the world.

Download PDF version Download PDF version

In case you missed it

Why is key management so important?
Why is key management so important?

More and more business security practices are going digital. Mechanical keys are still the backbone of most corporate security plans, and it can be very expensive for companies to switch to electronic access control on a large scale. Therefore, enterprises need to choose the most suitable access control system. What is key management? Key management is the process of protecting, tracking, and scheduling mechanical keys. Why is this important? Because the key carries access to sensitive locations and assets within the organisation, when you increase the security of the key, you can enhance the security of these valuable resources. The key management system also controls the cost of using physical keys. The system reduces the overhead caused by key loss or security breaches. Some smaller companies may be able to adopt a paper-and-pencil key management protocol. Larger companies, or those who want to better understand and control keys, usually choose to use an electronic key management system. Key management systems can store and assign keys securely and increase the efficiency of organisation Why use a key management system? The key management system can become the cornerstone of your key control process. At the most basic level, key management systems can accomplish two things that paper and pen systems cannot: they store and assign keys securely, and they increase the efficiency of your organisation's use of keys through automation and analysis. What can key management systems do? 1) Improve access control By better protecting the keys, you can improve the access control to the spaces and devices unlocked by these keys. You can use your key management to simplify the process of providing temporary employees with one-time-key access. In addition, the system can record all their key access records, so that everyone's behavior can be traced. 2) Enhanced accountability traceability The software is a good key management system that can generate reports on key usage, user access requests, access exceptions, and loss. In addition, you can track and audit key usage in real-time. Combined with a comprehensive key control strategy, you will implement better accountability for key use to meet any industry or risk management compliance standards. 3) Reduce costs and prevent losses When an employee loses a key, you will incur direct costs for a replacement key or relocking it when it is lost When an employee loses a key, you will incur direct costs, including purchasing a replacement key or relocking it when it is lost. However, the indirect cost of key loss is usually more significant. This is because employees first spend time looking for the lost key and then process the replacement request, all of which time is not spent on production work. 4) Improve workflow As we discussed, keys are often used in important workflows. The key management system allows you to better control these workflows. A passive electronic lock system, also known as a key-centric access control system, has outstanding advantages in key management. Compared with the electronic access control system, the passive electronic lock system's "passive" characteristics have reduced the update cost for many enterprises.

4 smart ways to use security to power the business of the future
4 smart ways to use security to power the business of the future

In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule.  This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace.  Strong and smart security ecosystem While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future.  Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimise their operations, and secure their network. 1)Protect your people  Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models.  This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly. Integrating platform Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example:  With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building. Leveraging AI and machine learning Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes. When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimise congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively.  All of this is powered by a security ecosystem that can help a business better protect its people while realising other benefits in the process. 2) Safeguard your assets Businesses are concerned about the security of their assets when it comes to the hybrid workforce model Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach.  This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations.  As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely.  Remote management and visibility This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic. These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more.  Loss prevention strategy When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more. For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits. 3) Optimise your operations The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimise their operations – especially now with the challenges posed by price inflation. A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more.  Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs Cloud video surveillance systems For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition. However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilised, and an additional 20% aren’t even aware that it could be used in other ways. AI and analytics The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimise their operations, helping their business to operate more effectively and efficiently.  The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience. 4) Secure your network Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats.  Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behaviour.   Cybersecurity software For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behaviour, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach.  A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defences so that they can avoid downtime and continue to operate with peace of mind.  Prepare your business for the future Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem.  With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimising operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence. 

Crossing the divide - automating security processes across physical, business and IT domains
Crossing the divide - automating security processes across physical, business and IT domains

Security is a critical requirement for all organisations. Getting security right involves the correct mix of people, processes and technology working together. However, many enterprise companies don’t look at the full mix that encompasses information security, and instead split their physical security and business continuity teams away from their IT security departments. According to research by ASIS, around half (52 per cent) of companies have converged two or three out of their physical, IT security and business continuity teams together, with the majority of those opting to bring together their continuity and physical security teams. Of those that have not brought teams together, around 70 per cent have no plans to do so. It's Important to bring all department's security together The reason for this is that cybersecurity is perceived as having a more specialist role within the business and that this prevents companies from bringing their departments together. However, while IT security has its own specialist requirements and skills, it should not be looked at alone. Businesses are looking at how to manage risk more effectively across all their operations, and they have problems when their teams are siloed and don’t have the full picture. The Cybersecurity and Infrastructure Security Agency (CISA) has developed its own guide to this area, based on the growth of the Internet of Things and more connected devices entering both homes and businesses, so this will continue to grow in importance. The rise of automation The pace of change that companies face today, coupled with the impact of the COVID-19 pandemic, means that more organisations are moving to digital services and automating their operations as much as they can. Security is no exception here - according to our research on security and automation, 75 percent of companies say they would need an additional three or more analysts in place to deal with all their incoming alerts in the same day, while 83 percent say their teams face ‘alert fatigue.’ IT security teams are drowning in data, but they feel unable to cope - yet at the same time, they will have to work more closely with other departments as well. Automation is necessary to deal with all these problems, but it should not be looked at in isolation. While IT security teams are keen to invest in automation using technologies like Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR), these investments can be used across both physical and IT security. As IT security teams invest in automation, they can adapt and extend their approach to help risk management and security in the physical world as well. The best approach to be successful around this is to look at areas where real-world and IT security challenges cross over for businesses. To adopt this approach successfully involves understanding business processes better. Fraud detection processes Automation involves using data and analytics to improve how a process operates from beginning to end, including where IT and technology is used to support physical interactions or activities. A good example of this would be a bank’s fraud detection process, where multiple digital and physical transactions have to be monitored and investigated. Bringing together different teams - physical security, business continuity, risk management and IT security - is about how to protect the whole organisation against risk. While the most well-known area for fraud investigation would be credit card transactions, there are multiple different types of transactions to track, from national and international wire transfers to prepaid phone cards and other prepaid cards that can be used for credit purchases. Each of these will have its own workflows and requirements to investigate a transaction, This can include looking at whether transactions are false positives or need further investigation, which is based on a mix of digital documentation for online purchases and physical data from in-person transactions. At the same time, the sophisticated nature of fraud can mean there is a large IT component to any investigation. Members of the IT security team may need to be involved alongside the anti-fraud department. While this investigation is necessary, it pulls analysts away from cybersecurity tasks, which can be especially frustrating where false positives are concerned. Instead, automating the investigation process can help. Consolidating Physical, IT and risk management By consolidating processes and automating the workflow, this pulls physical, IT and risk management together in a smarter and more efficient manner. It also improves productivity for an anti-fraud team as they can remove false positives from the workflow and get automated support for IT analysis. If the team needs more human insight, they can bring this in where they need it rather than requiring it for every investigation. While anti-fraud is one example of where this kind of convergence and collaboration is required, there are other use cases. For instance, industrial control and manufacturing applications that run production lines around the clock are frequently targeted for attacks, either to steal vital data or to disrupt business operations. This crosses over from the realm of IT into the world of operational technology, where systems are very different and the systems used may have been in place for years, even decades. Bringing together different teams - physical security, business continuity, risk management and IT security - is about how to protect the whole organisation against risk. By working together, teams can be more efficient rather than working in their respective silos. This involves better use of data across those teams, which will rely on more automation to be efficient. Using SOAR, security analysts and business risk professionals can cut the amount of time needed to respond to potential problems, reducing the impact and remediating faster. At the same time, it reduces the waste associated with false positives and manual work. The emphasis here should be on how to support the business with better security - by consolidating processes and working more effectively, security teams across the organisation can achieve that goal.