Artificial intelligence (AI)
Forescout Technologies, Inc., the pioneer in device visibility and control, announced insights from 75 real healthcare deployments with more than 10,000 virtual local area networks (VLANs) and 1.5 million devices contained within the Forescout Device Cloud, with a specific focus on 1,500 medical VLANs with more than 430,000 devices. Launched in July 2017, the Forescout Device Cloud is one of the world’s largest crowdsourced device repositories and now contains more than eight million devices from more than 1,000 customers who share anonymised device insights. Diverse and complex IT environments Our findings reveal that healthcare organisations have some of the most diverse and complex IT environments"“The Forescout Device Cloud provides us with game changing data from millions of devices around the world, and what we are releasing today is just the tip of the iceberg,” said Elisa Costante, head of OT and Industrial Technology Innovation at Forescout. “Our findings reveal that healthcare organisations have some of the most diverse and complex IT environments, which are compounded due to compliance risks. Every time a patch is applied, there is concern around voiding a warranty or impacting patient safety. These organisations are dealing with lifesaving devices and extremely sensitive environments.” Increased device intelligence The convergence of IT, IoT and OT makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks. IoT and OT devices are rapidly increasing in numbers, but traditional IT still represents the most vulnerable attack surface. Forescout uses the Device Cloud data to analyse more than 150 attributes per device to bring increased device intelligence and improved auto-classification to its customers. Forescout will leverage the increasing amount of data and intelligence gathered from the Device Cloud to generate future insights on the characterisation and risk posture of connected devices across industries. Forescout Device Cloud Report key findings: The most common devices on medical networks are still traditional computing devices followed by IoT devicesHealthcare OT increases attack surface The most common devices on medical networks are still traditional computing devices (53 percent) followed by IoT devices (39 percent), including VoIP phones, network printers, tablets and smart TVs. OT systems, including medical devices, critical care systems, building automation systems, facilities, utilities and physical security, comprise eight percent of the devices on medical networks. Within the OT device category, the three most common connected medical devices found were patient tracking and identification systems (38 percent), infusion pumps (32 percent) and patient monitors (12 percent). Considering the growing number of vulnerabilities in OT environments, we can see an increase in the attack surface in healthcare environments. Healthcare organisations riddled with devices running legacy Windows operating systems The report highlights that 71 percent of Windows devices within these healthcare deployments are running Windows 7, Windows 2008 or Windows Mobile, with Microsoft support planned to expire on January 14, 2020. Running unsupported operating systems poses a risk that may expose vulnerabilities and has the potential to impact regulatory compliance. Diversity of operating systems and vendor sprawl creates headaches Forescout’s research found that 40 percent of healthcare deployments had more than 20 different operating systemsThe diversity of device vendors and operating systems present on medical networks adds to the complexity and increases security challenges. Forescout’s research found that 40 percent of healthcare deployments had more than 20 different operating systems. When looking at the different types of operating systems found on medical VLANs, 59 percent were Windows operating systems and 41 percent were a mix of other variants, including mobile, embedded firmware and network infrastructure and many more. In addition, more than 30 percent of healthcare deployments had 100 or more device vendors on their network. Patching in healthcare environments, especially acute care facilities, can be challenging and require devices to remain online and available. Some healthcare devices cannot be patched, may require vendor approval or need manual implementation by remote maintenance personnel. Vulnerable protocols are leaving a door open Eighty-five percent of devices on medical networks running Windows OS had Server Block Messaging (SMB) protocol turned on, allowing uncontrolled access for attackers to get beyond the perimeter and move laterally. Device manufacturers sometimes leave network ports open by default — often unbeknownst to IT and security staff.
Allied Universal®, a security and facility services company in North America, announces the launch of HELIAUS® – an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. “We developed HELIAUS® to deliver better results for our clients through advanced workflow automation, robust data capture and visualisation, and artificial intelligence that understands not only what’s likely to happen, but what to do to drive better outcomes,” said Steve Jones, CEO of Allied Universal. “Now, our security officers are better equipped to help reduce incidents, respond faster to emergencies and provide unmatched operational performance accountability.” Dynamic workflow automation The main significance of HELIAUS® is to bring together rich data, artificial intelligence, location-aware workflow automation, and seamless user experience design for security professionals. This new tech solution provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and through dynamic workflow automation, ensures that those recommendations are implemented. The AI uses this information to understand what's likely to happen at a client's site regarding safety" “HELIAUS® also offers an advanced approach to location awareness that uses a combination of GPS, bluetooth beacons, and near-field communication (NFC) tags to quickly and accurately capture real-time location information both indoors and outdoors,” said Mark Mullison, CIO for Allied Universal. “The AI uses this information to understand what's likely to happen at a client's site regarding safety and security incidents and then automatically suggests workflows to our security professionals that drive better outcomes, thus reducing accidents and crime.” Increasing situational awareness In addition, this new workforce management technology brings sophisticated data visualisation capability to allow security operators to understand the who, what, where and when both in real-time and historically, which increases situational awareness and helps users develop powerful insights. “HELIAUS® represents a tremendous step forward in building AI technology that is not just smart like humans, but smart with humans,” said Mark Mullison, CIO for Allied Universal. “When it comes to safety and security, our goal is to deliver at the highest level.” This new smart technology is not just a reporting or incident management system but also an all-encompassing, adaptable workforce management solution to better protect people, brands and assets.
Shepherd Lock, a new keyless smart lock for the home, launched on Kickstarter. Shepherd Lock uses the same technology found in the automotive industry and is the first smart lock that detects lock-picking attempts to protect homes against burglaries. Shepherd Lock is equipped with a keyless entry system, making it convenient to enter the home. The lock’s automotive grade touch™ technology allows users to unlock their door with just a touch. Shepherd Lock also transforms existing lock hardware into a smart sensor that uses artificial intelligence to identify and notify the homeowner of any threat. Intelligent authentication zone “My team and I come from the automotive industry, where we designed keyless entry systems for cars,” said Kabir Maiga, the founder of PassiveBolt Inc., the makers of Shepherd Lock. “Shepherd Lock brings the same true and tested automotive touch technology to people’s homes.” Shepherd Lock creates the smartest door on the market with its Intelligent Door Status™ and Intelligent Authentication Zone™. A Wi-Fi bridge enables the homeowner to control and monitor the lock remotely A Wi-Fi bridge enables the homeowner to control and monitor the lock remotely. Once the bridge is plugged into the wall, it can be paired with the lock using the mobile app. On the app, homeowners can use the lock’s Intelligent Door Status™ technology to check whether their door is open, closed or locked with ease. Similar to automotive keyless entry systems, the Shepherd Lock will only unlock if the user has a keyfob or smartphone key within the Intelligent Authentication Zone™. Single cylinder deadbolt The homeowner can also use the mobile app to manage access to their home. Temporary or permanent encrypted keys can be shared with family members or friends, and homeowners can schedule access time windows to allow people to enter the home. Installation of Shepherd Lock is simple as there is no drilling required. Shepherd Lock is compatible with any single cylinder deadbolt. Keeping the exterior hardware in place, remove the thumb-turn, install the mounting bracket, screw in the module and snap on the magnetic cover. Shepard Lock retrofits the existing hardware, so the homeowner will not need a new set of keys. Powered with four AA batteries, homeowners will never have to worry during storms or power outages that their homes are unsecure.
Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe programme. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a programme of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam’s Smart Factory market is on an upward trajectory,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Newly built manufacturing facilities are being integrated with smart factory systems and there is also a need for ageing manufacturing infrastructure to be upgraded with smart solutions. For this reason, there is a growing appetite for information among prospective buyers which we hope the Smart Factory Conference will fulfill. It will be especially useful for investors, owners of industrial parks, consultants, contractors, architects, suppliers and government officials.” Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, IoT and AI Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, the internet of things, artificial intelligence and cloud computing. Against this backdrop, speakers at the Smart Factory Conference will demonstrate how factories that use new technologies to automate processes such as production and energy management can become more efficient and cost effective. Intelligent video solutions Another discussion point will be intelligent video solutions. With a focus on video analytics, access control and production surveillance, conference speakers will explain how both factory security and production efficiency can be improved. In addition, there will be an exploration of government regulations and the most up-to-date fire safety systems, including alarms, detectors, fireproof materials and extinguishing systems. Smart access control systems Besides the Smart Factory Conference, visitors to Secutech Vietnam 2019 will be able to benefit from two other elements of the fringe programme. The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings. Meanwhile, the Smart Hotel Seminar will update attendees on solutions that improve hotel management and guest experiences, including energy and building management platforms and smart access control systems. Market intelligence platform The Smart Factory Conference is jointly organised by Houselink JSC, Messe Frankfurt New Era Business Media Ltd and Vietnam Advertisement & Fair Exhibition JSC. Houselink JSC is Vietnam’s first developer of an online e-bidding and market intelligence platform for the construction market. The conference will take place on 15 August at Secutech Vietnam 2019, which runs from 14 – 16 August at the Saigon Exhibition and Convention Center. In 2018, the fair set new records, attracting over 13,800 buyers (2017: 12,097) and 310 exhibitors from 20 countries and regions (2017: 270).
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organisation’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The next wave in IP technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analogue-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analogue audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial intelligence: hype vs. reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organisation’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting with the right partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labour, fair wages and sourcing minerals from countries in armed conflict. Go in with a plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger picture.’ Here are some sessions to consider: Artificial Intelligence The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks A session on artificial intelligence asks: ‘Will AI change the face of the Electronic Security Industry?’ The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks. Connectionism, or neuronlike computing, developed out of our understanding of how the human brain works at the neural level. Each neuron in the brain is akin to a simple digital processor, and the brain as a whole is like a computing machine. Has the time come for artificial intelligence and machine learning for security? That’s the focus of another session that will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection. Is AI a technology looking for a problem to solve? Is it mature enough for mainstream usage in security scenarios? Does AI present a ‘double-edged risk’ (i.e., because enterprises and attackers have access to the same tools)? Convergence A combined security approach – unifying physical security and cybersecurity – is a real and immediate need in today’s high-risk and high-threat environment. By leveraging disparate sources of data, organisations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done. A panel session at IFSEC will discuss the concept, reality, and evolution of both physical and cybersecurity teams collaborating in the same Security Operations Centre. Here are some other sessions related to convergence of physical and cybersecurity: How converged security centres respond in real-time to physical and online threats How converged technologies ease prevention and response to unauthorised physical/logical access to corporate facilities and networks How chief security officers can benefit from data analytics and converged platforms to understand the complex physical and cyber risks posed to transport systems. GDPR Whilst the regulations provide a more comprehensive basis in law for the management of personal data The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements for video surveillance systems. That’s the subject of the session ‘GDPR – Video Surveillance: Balancing Privacy and Security.’ Whilst the regulations provide a more comprehensive basis in law for the management of personal data, they are part of a wider legal consideration for security technologies. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect. The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with their respective Codes of Practice provide a bedrock for effective governance. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weigh alongside the benefits. The session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising insider malicious attacks threat As the threat landscape evolves rapidly, CISOs need to step up their game According to the 2017 U.S. State of Cybercrime Survey, 50 percent of organisations experience at least one malicious insider incident per year. And the Verizon 2018 Data Breach Report found that close to 30 percent of confirmed breaches today involve insiders. In August 2018, a tragic crash involving a Seattle airplane stolen by an employee raised awareness for the need for physical insider threat awareness (as well as more psychological screening before employment). As the threat landscape evolves rapidly, CISOs need to step up their game, says Aamir Ghaffar, Director of Solutions Engineering at AlertEnterprise. They should implement security controls that protect their company’s people, physical assets, data, intellectual property, and reputation both inside and out. And they need to do it while simultaneously satisfying industry compliance requirements. In response to our questions, Aamir Ghaffar offered some additional insights on the timely topic of insider threats. Q: We are hearing discussion about the emergence of cyber-physical security systems. What are they and how do they help organisations address insider threats? Threats now originate not only in the physical space but also in cyber environments Ghaffar: The concept of convergence has evolved in response to risk and the overall threat landscape. Threats now originate not only in the physical space but also in cyber environments – this is what is commonly referred to as blended risk. These blended risks require a converged approach and a converged view of security as a whole; connecting data, building new capabilities and gaining new insights to allow security teams to better defend against attacks. Q: How are organisations responding? Ghaffar: They are shifting towards centralisation – from the security operations center all the way to the executive level, where one C-Suite executive manages all security across physical, IT and OT domains. According to Gartner by 2023, 75% of organisations will restructure risk and security governance to address new cyber-physical systems (CPS) and converged IT, OT, Internet of Things (IoT) and physical security needs, which is an increase from fewer than 15% today. Q: How does the shift impact insider threats? Ghaffar: Unifying cyber and physical unlocks powerful new capabilities. For example, cyber-physical teams faced with a threat such as an intrusive device planted within their network environment, can quickly connect the cyber footprint to a physical location – understanding where the threats originate and identify those responsible for bringing it in. Converging physical and cyber identity through platforms that connect physical access control, IT and OT systems is an example of how organisations can better prepare for blended security threats An AI-enabled automated system is the most practical and human error-proof solution today Q: How is AI being used to protect against insider threats? Ghaffar: With increased security convergence we are now collecting such a large volume of data that relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence used with digital identities, is now the most practical and human error-proof solution today. AI and machine learning (ML) technology helps organisations map complex patterns of user behavior, process tens of millions of events within seconds to detect threats in near-real-time and respond swiftly. This benefits security operations personnel to go from distraction to action, allowing them to focus on what really matters, which are their most critical security events. Q: Sometimes the threat is about human error. Oftentimes we think the most harmful insider threats are intentionalGhaffar: Oftentimes we think the most harmful insider threats are intentional; however, unintentional user behavior and negligence could have serious ramifications for an organisation. Organisations should deploy technology that delivers automation and active policy enforcement to prevent employees from making inadvertent yet critical errors. Organisations should also do regular risk assessments – not one and done. Don’t implement a process and think you’re secure. Automated identity and access management technology can provide scheduled access reviews to help detect high-risk user profiles with accumulated or a toxic combination of access, as well as segregation of duties violations due to department change or job transfers. Q: What are the biggest misconceptions about insider threats? Ghaffar: First, that the biggest threats originate outside my company. Or that insider threats are a problem for government agencies and highly sensitive organisations, not “regular” companies like us. A company may also mistakenly think that they have limited assets that could be exposed, or that the assets are of little value; therefore, a large-scale breach is less likely to happen. And even if it does, it probably won’t have a big impact. Risk management leaders should start by developing a compelling visionQ: So, they think “it can’t happen here.”? Ghaffar: Yes, and they think their employees are inherently trustworthy, and that with basic security measures in place, the risk is small. They think that insider threats are always intentional. Or they think “it’s not my job.” Q: What next steps should security leaders take in addressing insider threats in their organisation? Ghaffar: Security and risk management leaders should start by developing a compelling vision and strategy that will resonate with key company stakeholders. They can expand the visibility they have into user activity beyond things that happen on the network. Go beyond a data-centric approach to a people-centric approach through identity behavior analysis. Improving visibility into user activity and taking a more preventive approach are the best ways to manage risk of an incident. Develop an inside-out approach to security. By converging physical, cyber and OT security you’ll gain a holistic view of your enterprise-wide security landscape.
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new programme will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and centre, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the programme of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organisations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defence & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
With a population of more than 40,000, the City of Linden, New Jersey is part of the New York Metropolitan Area. It is located 13 miles southwest of Manhattan and borders Staten Island. In an effort to improve public safety and reduce crime, the city decided to modernise its video surveillance system. The City of Linden (the City) had more than 150 outdated, analogue cameras deployed throughout its buildings and parks. These consisted of an assortment of off-brand devices that lacked sufficient resolution, speed, and frame rates. To provide the highest quality video, the City decided to invest in a new citywide IP camera system. Purpose of video surveillance system Moving to IP cameras would require the City to increase its bandwidth capacity and upgrade its network video recorders (NVRs) to a more efficient, reliable, and secure video storage solution. This video surveillance system would need to: Support megapixel camera quality Be deployed at the network’s edge in various City buildings Stream video back to City Hall yet not be a burden on costs or bandwidth Be secure, simple to deploy, and easily expandable Work with world-class IP cameras and video management systems The City’s Department of Public Safety, led by the Police Department, oversaw the project. They hired Eastern Datacomm, a highly recommended system integrator out of Hackensack, New Jersey, to manage the entire project, from the installation of fibre lines for Internet to deploying the IP cameras and video surveillance appliances. Extra layer of security for clients Razberi makes it simple to manage and secure video surveillance and network-connected device solutionsOne reason the City of Linden chose Eastern Datacomm is because it has standardised on Razberi Technologies video surveillance appliances and software for all installations, providing an extra layer of security for its clients. Razberi makes it simple to manage and secure video surveillance and network-connected device solutions. Razberi appliances are highly reliable and network-optimised for megapixel quality. With the ability to record at the network’s edge and centrally, the Razberi suite of appliances also provide the flexibility that the City requires. A one-click VLAN setup establishes a private, secure network for camera traffic. Razberi’s intelligent video solutions are rightsized for the application including data centre, edge/fog, and rugged applications along with the ability to add cybersecurity protections. The appliances are also open to work with world-class video management solutions (VMS) and IP cameras. Built-in Razberi Monitor health monitoring software ensures the video surveillance system – all the way to each camera – is operating 24x7 without video loss or disruption. Installation of 250 IP cameras A Razberi EndpointDefender appliance is integrated with each Core device to provide Power over Ethernet+ (PoE+)Today, the City of Linden has more than 250 Panasonic IP cameras deployed across 13 locations. The main site is City Hall, which includes the Police Department. Cameras are also installed in four fire houses, two youth centres, the library, and various points around the train station and parking lot. At City Hall, Eastern Datacomm installed four Razberi Core appliances. These robust, server-class appliances centrally record heavier video surveillance workloads. This enables the City to be in compliance with the State of New Jersey’s retention law, which mandates that municipal video recordings be kept for 90 days. In addition, a Razberi EndpointDefender appliance is integrated with each Core device to provide Power over Ethernet+ (PoE+). EndpointDefender includes the Razberi CameraDefense cybersecurity software solution, should the City need it in the future. This extends industry best practice cyber protections all the way to the camera or Internet of Things (IoT) endpoint. ServerSwitchIQ edge appliances The ServerSwitchIQ’s compact size and ease of deployment worked for the City’s remote outdoor security camera locationsIn the City’s other buildings, the integrator deployed 12 Razberi ServerSwitchIQ edge appliances. More than an NVR, these devices combine a PoE+ switch, server, storage, and intelligence. By recording video near the network’s edge closer to the cameras, the appliances enable City workers at each location to monitor and play back video when needed. There is no need to constantly stream video back to City Hall, which reduces the impact of megapixel cameras on the network. The ServerSwitchIQ’s compact size and ease of deployment also worked for the City’s remote outdoor security camera locations. Each is small enough to fit into telco rooms under lock and key while handling the amount of cameras required. The City did not have to deploy servers, cabinets, and other equipment traditionally used for video surveillance systems. Eastern Datacomm monitors the video surveillance system via the Razberi Monitor software, which provides automated, real-time collection of system component properties and status such as storage disks, CPU Temperature, RAID arrays, and network traffic. With 24x7 monitoring and alerts, especially if a camera fails or goes down, Eastern Datacomm can take corrective action immediately. Reducing crime and enhancing quality of life The system is enabling the Police department to fulfil our mission to reduce crime, improve the delivery of Police services"“Our upgraded video surveillance system with the IP cameras and Razberi appliances gives the City of Linden one of the most state-of-the-art video surveillance systems in the country,” said David Hart, Chief of Police, City of Linden Police Department. “The system is enabling the Police department to fulfil our mission to reduce crime, improve the delivery of Police services, and enhance the quality of life for Linden residents. We have already solved some criminal cases using the security system with its reliable, high-quality video footage.” The City of Linden anticipates adding more cameras over time. They are working on a five-year plan to put more cameras in their 39 parks and other buildings. Each Razberi appliance can accommodate up to 24 IP cameras, making the system easily expandable.
The power grid is a modern engineering marvel, providing us widely available and affordable energy for not only our day to day lives, but also highly critical infrastructure elements for which we rely on personally, and as an economy. However, our reliance on the grid also makes it highly susceptible to adverse events, including physical attacks. All parts of the grid can become victims of malicious events, but substations are particularly vulnerable due to their role in power distribution and the nature of their equipment. Power utilities’ security The challenge power utilities worldwide are facing is finding an affordable solution The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-104 specifically calls for implemented security plans which include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Fortunately, there are many solutions to help power utilities address these security concerns, one effective choice is the use of intelligent video. Intelligent video analytics solution Intelligent video, or video analytics, is a popular choice for the protection of critical facilities given its ability to detect, provide instant visual confirmation of the event and subsequent event forensics. The capability of this technology is increasing at a rapid rate, while decreases in hardware cost make such solutions affordable for owners or operators of critical bulk-power system sites. This case study looks at the issue of substation vulnerability and how to best use video to address, keeping in mind requirements of CIP-014. Such a system consists of fixed cameras, pan-tilt-zoom (PTZ) cameras, a deterrence device and data communication capability. Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc. In most cases, substations can benefit from a simple “camera-following” design, which includes surveillance of a potential breach at the fence line, as well as, the ability for early detection for some distance beyond the physical perimeter. Camera-following design In a camera-following design, in addition to its own coverage, each camera is responsible for covering the blind spot of the adjacent camera. That camera is then responsible for covering the blind spot of the next camera, and this pairing continues around the perimeter until the final camera covers the blind spot of the first. This type of coverage design is very effective and affordable for locations with well-defined perimeters, such as substations. Using this layout, the video feed from the fixed cameras are then enabled with video analytics algorithms to alert when predefined conditions are met. This is done by inputting the video signal into a server, edge device or NVR, located at the site, or remote to the location. Intelligent video technology Today’s intelligent video technology provides for very specific alarm criteria Today’s intelligent video technology provides for very specific alarm criteria, which in addition to only alarming when a target enters in a specific region, can also discriminate, or classify, by the type of target: human, vehicle, etc. Furthermore, the alarm can be restricted by specific actions taken by the target, such as loitering in an area, dropping or throwing an object, more than one target entering with a valid badge swipe (tailgating) or even the speed at which a target is entering an area. This level of discrimination provides the ability to address very specific vulnerabilities, as well as, avoid nuisance targets, such as wildlife, debris or moving vegetation. Another key feature with significant value to substation protection is the geospatial aspects available with some video analytic solutions. This capability maps each pixel of video to its real-world latitude, longitude and elevation. This results in further assessment of the target, including the actual location, the real size of the target, the real speed and the current track. It also affords the opportunity to provide a real-time display of this information to the security operator through an easy to understand map-based user interface. Autonomous PTZ cameras Geospatial video analytics provide the benefit of knowing the exact map-based location of the target Another key assessment aspect of this substation protection scheme is the use of autonomous PTZ cameras. These are typically placed at the corners of the perimeter where they can service detections from multiple fixed cameras. As previously mentioned, geospatial video analytics, provide the benefit of knowing the exact map-based location of the target. Knowing the location of the target is extremely valuable to the security officer, but it is also the basis for a feature known as “slew to cue,” whereby PTZ cameras armed with video intelligence can be automatically steered to the same location for instant confirmation of the target. In most cases, “slew to cue” functionality also includes an “intelligent zoom” feature, which uses the target size information from the alarm, the PTZ camera location and the target location to adjust the zoom level of the PTZ for an instant view of the target that can provide identification details (clothing color, car type, etc) without the need for the operator to further adjust the zoom. Target detection and response Once a target is detected, a security approach leveraging intelligent video can continue with a coordinated response Once a target is detected and confirmed, a security approach leveraging the use of intelligent video can continue with a coordinated response to the event. When video analytics is applied to pan-tilt-zoom cameras, it has the ability to automatically follow a defined target, freeing the operator to take other actions, such as coordinating with law enforcement officials. This feature, referred to as camera auto follow or PTZ following, can be automatically engaged as the result of a detection event, or subsequent to a slew to cue action. The system will continue to follow the target until it reaches a pre-defined system time-out, the operator takes manual control, or the camera can no longer view the target. The system can then provide the resulting PTZ video as a component of the detection alarm, for a more complete understanding of the intrusion for the operator to review. Effective deterrence At this point, the system has detected the target, classified its type and verified it has met alarm conditions. As part of the alarm it has also included dynamic indication of its location on a map, autonomously steered a PTZ to the target to allow for gathering of more detailed target information and a PTZ has locked on and is now following the target without any required user interaction. Total elapsed time to this point in the security response is typically less than 5 seconds. Deterrence is often realised as a fence, physical barriers or access controlled gates This level of automated response addresses many vulnerabilities typically identified as part of a CIP-014 security assessment, but with minimal extra cost, it can be extended to help with the aspect of deterrence. Deterrence is often realised as a fence, physical barriers or access controlled gates. These are physical items and should certainly be included in a substation security plan. Intrusion detection However, another form of deterrence, which can be enabled through the use of intelligent video is the idea of audio talk down. This is the use of live or pre-recorded audio, which is activated upon an intrusion to deter the intruder. Different from a general alarm warning audio, audio talk down uses information about the location of the intruder and their actions to select appropriate pre-recorded audio to deter the intruder. Worse case, the understanding that they are being actively monitored may hasten their plan. Video-based security and alarm system A common concern when deploying such a system is the amount of bandwidth required A common concern when deploying such a system is the amount of bandwidth required. Substations are almost always unmanned, which means the intrusion information must have a means to get communicated back to the main monitoring location. From a design aspect, this is typically the case, but it is important to know that it is not a requirement in order to gain security benefits from a video based system. The system described in this case study has the capability to detect, assess, respond and deter without any communication back to a main command and control. Alarms, events and system actions can be logged and stored remotely for review at a later time. In reality, utilities will want to be notified and react in real time. In these cases, video systems can adjust to the available bandwidth – from a low bandwidth situation where a textual alarm is provided with an image of the detection, to a high bandwidth installation where feeds from multiple cameras can be monitored and controlled in real time. Web-based, mobile access In each case, complete alarm information, including meta data, images and video can be readily available to the security operations center, which can then take action based on their security response plan, including contacting and coordinating this alarm data with local law enforcement through web-based access or mobile phones. This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. The study outlines how recent technological advances can autonomously address assessment, response and deterrence This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. Further, the study outlines how recent technological advances allow such a solution to extend beyond the mere detection of events, but can also autonomously address assessment, response and deterrence. Key capabilities of intelligent video include: Advanced Detection – Accurate alarming based on specific targets types and actions Situational Awareness – The ability to quickly convey the critical details of a security event in an easy to understand map-based format. Real-time Target Location – Real-time location information of events and real-time location tracking of potential intruders. Autonomous Sensor Control – Automated steering of cameras to an event location and subsequent hands free video tracking of a suspect. Although each utility and substation may encounter different vulnerabilities, this case study outlines how video can be considered to address NERC guidelines for protecting critical substation assets by providing situational awareness of a potential threat and initiating an appropriate and timely response.
Maintaining an educational environment that is conducive to learning requires, at a minimum, that we keep our school children safe and secure. It’s easier said than done, given the wide range of sizes and types of educational institutions. Campus Security High-profile violence in educational environments highlight the urgency of the need for security and safety systems High-profile violence in educational environments highlight the urgency of the need for security and safety systems, and the challenges extend beyond preventing the active shooter incidents that grab headlines. In the United States, 79% of public schools recorded that one or more incidents of violence, theft, or other crimes had taken place, amounting to 1.4 million crimes. That translates to a rate of 29 crimes per 1,000 students. Security is a 24-hour challenge. Protecting schools involves deployment of a range of security and physical hardening tools. Reducing risk requires that access to school buildings be controlled, while also preserving an ‘open’ campus atmosphere that promotes a learning environment. Schools should be an inviting place for students and families, so technology solutions aimed at restricting access should be low-profile and unobtrusive. School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward to secure individual classrooms and other internal areas. Enhancing video security at schools Video surveillance is a technology that is unobtrusive and can promote security beginning at the outermost boundaries of the school environment – at the perimeter and as automobiles drive onto school grounds. Surveillance can keep a silent and constant watch on people comes and goes. Furthermore, incorporating new artificial intelligence (AI) and deep learning technologies are increasing the real-time capabilities of video surveillance to provide early warning of a possible security threat as it enters a campus. AI and deep learning analyse the content of video feeds and provide usable information to security personnel, including analysis of trends and real-time alarms when an event takes place. Incorporating AI into video security Video feeds are analysed in real-time and alarms can be raised only if there is a problem In addition to controlling perimeter access, video surveillance incorporating AI can also provide other benefits, such as keeping watch on a school campus after hours – before and after school, or even on weekends when extra-curricular activities may be taking place. The systems can monitor traffic flow and ensure that only authorised vehicles enter an area. The benefits of AI-driven video systems also enable greater effectiveness of systems that are not being actively monitored. Video feeds are analysed in real-time and alarms can be raised only if there is a problem. Whenever a vehicle passes into a restricted area on a school’s campus, the video system captures a vehicle image and automatically provides significant data. ANPR systems Automated number plate recognition (ANPR) systems identify the license numbers of cars that enter a school’s parking entrance or gate and can match the numbers to a watch list and provide an alarm. The technology could also be used to monitor compliance with restricted areas; for example, to only allow vehicles that registered for a parking pass to park in a certain lot. A more advanced approach could involve dual identification technologies – vehicle plate and facial recognition of a driver – to add another layer of security. Video systems with illegal parking detection can define a zone for no parking at a school. If any vehicle enters the area, the camera will be triggered to collect evidence. Images are captured of illegally parked vehicles, and the system provides data about when and where it occurred, the vehicle plate number and the parking violation. Traffic cameras with DL technology Traffic cameras with deep learning technology can also identify and classify vehicles Traffic cameras with deep learning technology can also identify and classify vehicles; in effect, to distinguish between small and large vehicles and even detect a vehicle’s make, model and colour. For instance, it is possible to differentiate between cars and buses in ‘buses only’ areas. Currently such cameras are more commonly deployed on public streets and highways, but the capability is there. The system can also capture images and produce alarm data if a vehicle is driven in the wrong direction, such as into an exit-only lane or the wrong way on a roadway. Facial recognition systems Facial recognition can be used at school entrances and gates to promote security of students and staff and to identify known suspects who attempt to enter the building. ‘Blacklist alarm’ technology generates a notification if a known suspect enters. Clarity is paramount when identifying faces, and cameras that provide wide dynamic range (WDR) can offset challenges such as backlighting on a bright day when the light behind a person coming in is brighter than the ambient light inside. People counting cameras Facial recognition systems can also be used inside school buildings. A facial recognition terminal installed at the entrance of a campus building or library can be configured to ensure that only registered students and staff have access to the buildings. People counting cameras can be used in cafeterias and libraries to provide daily or monthly traffic reports and to better understand peak times and arrange workflow accordingly. Unified security solution Tedious and error-prone manual monitoring can now be replaced by more intelligent systems Feeds from all the cameras can be managed, monitored and stored in an authorised security centre, either located on a campus or in a central location that combines camera feeds from multiple campuses in a school district, for example. In general, security staff can access surveillance data in a variety of ways, via a desktop, laptop, or mobile device. Such flexibility makes the job of security personnel easier. A campus police or resource officer can view video on a mobile device while patrolling the campus. Often video surveillance systems at schools are not monitored. School security personnel have more pressing duties than sitting in front of a video monitor, and it is difficult for operators to stay alert for detailed incidents that may be shown on the screen. Tedious and error-prone manual monitoring can now be replaced by more intelligent systems that provide alarms only when there is something to see. Maximising school surveillance capabilities Systems to maximise school surveillance and security include dedicated, high-performance cameras for event capture, embedded network video recorder for event recording and storage, and a centralised video management platform to unify the system. AI and deep learning technologies automate security processes and provide useful real-time information that extends beyond video images. Deploying these technologies at the perimeter can promote better security campus-wide by preventing danger from entering the learning environment.
Round table discussion
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?