Vision-Box, a pioneer in biometrics seamless travel, automated border control, and digital identity solutions, spotlighted Portugal’s tech capabilities at Portugal’s Pavilion during Expo 2020 in Dubai as part of promotional events around the concept - Portugal is on the map of the global TICE suppliers. During the seminar, Pedro Pinto - Head of Global Business Development at Vision-Box, discussed Vision-Box’s experience in doing business in the Middle East, has led high-profil...
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilise. How can video analytics he...
Four out of every ten (41%) of England-based medium and large-sized businesses which are running CCTV systems have already deployed facial recognition analytics in their systems to capture human faces and compare images to human face databases to identify matches for access control, event security, or for public safety purposes. One in six (16%) of CCTV system owners admitted to having access to this capability on their system but not yet going live with it. Over a third of CCTV system owners...
Four out of every ten (41%) of England-based medium and large-sized businesses, which are running CCTV systems, have already deployed facial recognition analytics in their systems, in order to capture human faces and compare images to human face databases, with a view to identifying matches for access control, event security or for public safety purposes. Facial recognition analytics One in six (16%) of CCTV system owners admitted to having access to this capability on their system, but not ye...
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transform...
At ADEX 2021 in Seoul, HENSOLDT will focus on its broad range of sensor technologies, a major part in the airborne solutions domain. The sensor solutions are deployed on various platforms, including helicopters, aircraft and unmanned aerial vehicles. Come and visit us at stand no B114 at ADEX in Seoul. HENSOLDT is presenting its live air picture of its ‘TwInvis’ passive radar during this year's ADEX show. The system uses several transmission sources from various locations. It can al...
Access control and integrated security management vendor Maxxess has expanded its UK and Ireland operations with the appointment of Russell Baker as business development & account manager. Responsibilities Russell will be based out of the company’s European head office in Bracknell, UK, and will handle the substantial increase in demand for the firm’s signature solution, the eFusion™ access control, and security management platform. Building on the success of Maxxess solutions in the corporate, higher education, hospitality, and healthcare sectors, offering enterprise-class access control and integrated security, he will support existing partners and end-users and as well as developing new relationships with systems integrators, consultants and end-users across the UK and Europe. Work experience Russell has over two decades of experience spanning video surveillance, access control, intruder, and systems integration A familiar face in the security industry, Russell has over two decades of experience spanning video surveillance, access control, intruder and systems integration. He started his career at Chubb and went on to sales management roles with security systems integrators and tech vendors including Vicon and Zenitel Group. A longstanding member of the Association of Security Consultants (ASC), Russell has a proven track record in consulting roles as well as sales management. Feedback Lee Copland, Managing Director Maxxess EMEA, said, “We’re delighted to welcome Russell on board. He is well-positioned to leverage the increasing demand for cost-effective, integrated systems that drive operational efficiency by digitising processes and workflows.” “He will build on Maxxess’s existing installed base as well as helping many more organisations upgrade and digitise their infrastructures and bring new technologies on line.” Developing better access solutions Russell Baker commented, “With Maxxess eFusion and eVisitor enabling more affordable integrated site security and safety solutions, I am looking forward to working closely with consultants and systems integrators to develop project opportunities.” “These solutions are now very much in demand as customers look towards better access and people management solutions to support more flexible workplace operations post-pandemic.”
GeoVision has announced the release of GV-Control Center (V4.0), integrated security management software, designed for central monitoring systems. GV-Control Center is designed for enterprise system users, to handle high-volume video data. From real-time monitoring, video playback, event detection pop-up, I/O central monitoring, 3D E-map and communications, GV-Control Center helps security guards to quickly identify threats, and take swift actions. GV-Control Center (V4.0) GeoVision unveils a re-designed user experience on GV-Control Center (V4.0), to streamline its interfaces and aim at building a consistent experience, across the platforms of GV-VMS and GV-Edge Recording Manager. Additionally, GV-Control Center V4.0 introduces the new viewing windows, Face Recognition (FR) Watch and ASManager View, to integrate the monitoring of face recognition, access control and LPR events into the central monitoring operation. The AI (video analytics) events from forefront GV-VMS software and GeoVision AI cameras are also incorporated in the new version.
Algorithm development at Cognitec Systems GmbH (Cognitec) continues to engineer the optimal balance between speed and accuracy of the face matching processes. NIST’s Face Recognition Vendor Test The latest results of the U.S. NIST (National Institute of Standards and Technology) Face Recognition Vendor Test for identification tasks, show the Cognitec algorithm in the best position of all algorithms tested, when relating the template generation time to the false negative identification rate (miss rate), for mug shot databases. The identification test addresses the largest market for face recognition applications The identification test addresses the largest market for face recognition applications, including the detection of duplicates in image databases and fraud detection, during passport and driver’s licence applications. These tests apply a very high matching threshold, where only 0.3 % (3/1000) of probes, without a mate in the gallery, produces a false hit, one of the most difficult face recognition tasks. Accuracy advances in face matching algorithms “We are proud to also see significant accuracy advances, in comparison to the algorithm that we submitted to the last test in early 2021,” said Dr. Thorsten Thies, the Director of Algorithm Development at Cognitec Systems GmbH. Dr. Thorsten Thies adds, “For the test, with 12 million mug shot images, Cognitec achieved rank 24 out of 165 algorithms, with a match rate of 98.5 %. In the test, with 1.6 million mug shots, with a 99.4 % match rate, we ranked 26 out of 299 algorithms. These results show remarkable performance consistency, regardless of database size.” Cognitec-005 face matching algorithm The September 2021 test evaluates face matching algorithms from 85 different vendors. Cognitec Systems GmbH submitted a new algorithm, with a revised face finder, called Cognitec-005 algorithm, in the report.
Seoul Robotics, a 3D computer vision company using AI and deep learning to power the future of autonomy, announces its SENSR™ plug-in integration with Milestone Systems XProtect® VMS. With this plug-in, customers using Milestone VMS will have access to both 2D and 3D visuals within the XProtect dashboard, enabling a deeper understanding of activity within defined spaces while minimising the number of false positives. This is a breakthrough plug-in for the XProtect platform, making 3D computer vision and its corresponding 3D sensors like LiDAR more affordable and accessible to camera integrators while bringing a heightened dimension of visibility. Video-based security systems SENSR is non-proprietary and highly flexible, compatible with more than 75 different brands and models of sensors, and can operate with multiple types of sensors in one cohesive system. Now, with this plug-in, these systems can be seamlessly incorporated into XProtect 2D video-based security systems, combining both 2D and 3D insights into one dashboard. This integration enables users to create highly customised ‘zones,’ a defined area for sensors and cameras to track and detect objects, occupancy, movement, and speed. These zones and movements are reflected on a map in the XProtect platform so system managers can view live activity, change zones, and calibrate LiDAR sensors. If a violation is detected, the system will automatically set off an alarm and alert the appropriate contacts. Customers can also access and download intuitive reports of behavioural data – both historical and real-time – in the XProtect dashboard. Most advanced version Seoul Robotics introduced SENSR 2.2, the advanced version of its patented 3D perception software “At Milestone, we pride ourselves on our industry-leading video management system for security, and one critical component to this is having an open platform that is accessible and customisable for customers,” said Haider Muhammed, Community Sales Middle East, North Africa & Turkey at Milestone Systems. “Seoul Robotics is the ideal 3D deep learning partner because they also rely on an open software platform. By leveraging the SENSR plug-in along with the Milestone XProtect VMS, our customers will be able to simultaneously gather 2D and 3D insights to ensure safety and security.” Earlier this year, Seoul Robotics introduced SENSR 2.2, the most advanced version of its patented 3D perception software to date. SENSR 2.2 is the first 3D perception software on the market leveraging deep learning and can detect and track over 500 objects simultaneously and with an accuracy range of within 10 cm, including objects that are partially obstructed, fast-moving, or clustered together. Providing valuable insights These capabilities can provide valuable insights into capacity, movement, and speed. “Seoul Robotics was founded with the goal of bringing 3D data to the masses by making it scalable and affordable to adopt. Now that SENSR is integrated with XProtect, we are further accelerating the adoption of 3D systems in industries like security that will benefit from this additional dimension of data and solve complex problems,” said HanBin Lee, CEO of Seoul Robotics. “Deep learning enables the most comprehensive and accurate 3D insights, and we are proud to be the first 3D deep learning partner for Milestone.” Seoul Robotics will be showcasing this 3D plug-in at GITEX Future Stars on Oct. 17-20, 2021. Visit GITEX Future Stars, Hall 6, Booth Z6-447I to learn more about Seoul Robotics’ expansive portfolio of turnkey LiDAR solutions for automotive, security, smart cities, transportation infrastructure, crowd analytics, IoT, and industrial applications.
From September 28 and 29, 2021, the International Security Expo 2021, the world’s premier government, industry, academia and end-user security event, returned for the first time in nearly two years. International Security Expo 2021 Co-located with the newly-launched International Cyber Expo 2021, the events welcomed thousands of security professionals, from all corners of the industry, including senior representatives from Heathrow Airport, British Army, Bank of England, Tesco Stores Ltd, BAE Systems, Chester Zoo, CPNI, Dell, Neptune Energy, Post Office, NaCTSO, DASA and the Embassy of Argentina. Furthermore, recently appointed Minister for Security and Borders, Rt. Hon Damian Hinds MP, was also in attendance and carried out a keynote speech, clearly demonstrating the importance of the event to the security sector. Global audience in attendance Reconnecting the market from far and wide, the international audience was made up of attendees from 36 countries Reconnecting the market from far and wide, the international audience was made up of attendees from 36 countries, including Israel, Italy, Sweden, Switzerland, Spain, Canada, Hong Kong, Singapore, Belgium and Australia. This included senior delegates from NATO - HQ AIRCOM, Germany, Government of Gibraltar, US Army RCCTO, New Jersey State Association of Chiefs of Police and the Embassy of the State of Kuwait. Reconnect and source new products The overwhelming feedback from visitors and exhibitors alike, proved a strong desire for the opportunity to reconnect, source new products and take advantage of in-person learning opportunities. Speaking about the appeal of the events, Harry Forsyth, Risk and Intelligence Analyst, Kings Secure Technologies, said “Both International Security Expo and International Cyber Expo are excellent events to reconnect with people in the industry, watch some great talks and broaden my horizons. The quality of the products exhibited was noticeable.” Covering a range of physical and cyber security solutions Fellow visitor, Rob Cochrane CSMP MBA, Security & Risk Consultant and Security Manager at Ferrero, also attended the show, to get a better understanding of what is currently on offer, across the market. Rob Cochrane said, “The show is great and has delivered everything I need. It's very broad, in terms of its sell, as there is plenty of material from physical measures to cyber solutions.” Rachael Shattock, the Group Event Director at Nineteen Group, said “The overwhelmingly positive feedback from visitors and exhibitors alike is testament to the reputation of the show, and the value it gives to all those who attend. We were delighted to see so many visitors and exhibitors, excited to be back at the show, reuniting with their peers.” Rachael adds, “The energy in the hall spoke for itself and the breadth of product launches further demonstrates how the industry has continued to focus on research and development, constantly innovating to improve our safety and security. We are already looking forward to a bigger and better event in 2022 and welcoming back many of our international exhibitions, and visitors, who were unable to attend, due to the COVID-19 pandemic.” Government supported international security event The specialist Government Zone was a key part of the exhibition The specialist Government Zone was a key part of the exhibition and demonstrated significant support from the UK Government and associated agencies. It provided a central meeting point for visitors, to network and discover the latest projects and plans for the future from exhibitors, including Accelerated Capability Environment (ACE), Border Force, British Transport Police, The Civil Aviation Authority (CAA), Counter Terrorism Policing, Defence and Security Accelerator (DASA), The Joint Security and Resilience Centre (JSaRC), The National Counter Terrorism Security Office (NaCTSO), The National Security Technology and Innovation Exchange (NSTIX), Police Crime Prevention Initiatives (PCPI), Research and Intelligence Support Centre (RISC), Security Industry Authority UK and UK Defence & Security Exports (UKDSE). Demonstrating the increasingly sophisticated smuggling techniques used for international drug trafficking, Border Force carried out a live demonstration of a seized Ford Kuga that uses a sophisticated magnet system to open a concealment area, within the rear of the vehicle. Firearms, security devices and door entry apparatus on exhibit Elsewhere, British Transport Police provided attendees with the opportunity to witness an experienced dog handler and a trained Explosive Search Dog demonstrate the capability and effectiveness of responding to these threats. Officers on the stand also highlighted a selection of equipment including firearms, less lethal devices, door entry apparatus and medical supplies, used to actively deter, detect and disrupt terrorist and criminal activity, across the railway network in London and other major cities. High-profile government officials offer insightful sessions In addition to exhibiting, several high-profile government officials took to the stage, to present insightful sessions, across the two days of the exhibition, including Mark Goldsack, Director DIT, UKDSE, Angela Essel, Head of JSaRC - Joint Security and Resilience Centre (JSaRC), Tracy Buckingham, Deputy Director Security and Cyber Security Exports - DIT UKDSE, Kevin Knappett, Cell Broadcast Delivery Lead Digital Infrastructure Directorate UK Government, DCMS UK GOV, and Shaun Hipgrave, Director Prepare, Protect, CBRNE & Science Directorate - Homeland Security Group, Home Office. Helping attendees understand the role of the government in advising and providing strategic support, Mark Goldsack, Director, UK Defence and Security Exports, spoke about the market intelligence available, for those businesses looking to do business abroad. He shared insights on the role of the UKDSE, in order to promote and encourage trade, provide information and analysis on the business landscape, in regions around the world, as well as to provide access to a network of trade advisors to UK businesses. Diverse make-up of the security industry critical to success Following Mark Goldsack’s session, Shaun Hipgrave, Director, Protect & Prepare, CBRNE and Science Directorate, HSG, Home Office, took to the stage. He highlighted the key priorities and areas of responsibility for Homeland Security in the United Kingdom, ranging from Borders and Aviation Security, CBRNE S&T, Protect & Prepare, as well as JSaRC, and stressed how the diverse make-up of the security industry was critical to its success. On day two of the event, there was a real buzz on the show floor, as it was announced that Rt. Hon Damian Hinds MP, recently appointed UK Minister for Security and Borders, would open the second day, with an exclusive keynote speech. Innovation, the key in ever-changing security threats Events, such as the International Security Expo and International Cyber Expo, bring the security community together During his address, Damian Hinds highlighted how events, such as the International Security Expo and International Cyber Expo, bring the security community together, to inspire and be inspired. He commented, “In the security field, you have to keep on innovating, because the threat, what we’re up against, keeps on shape-shifting and changing.” He reflected on the industry’s resilience, during the COVID-19 pandemic, its remarkable ability to innovate and the importance of a close working relationship, so as to achieve a safer and more secure society. Speaking post his keynote session, Damian Hinds added, “I think it’s really important for people to come together, to be able to learn from each other, to see what is happening and make connections and to work out how we can all work together to improve our safety and security.” Global Counter Terror and Serious & Organised Crime Summit The event’s free-to-attend and CPD certified educational programme saw over 90 inspiring sessions and 120 speakers deliver insightful sessions, across five theatres. The Global Counter Terror and Serious & Organised Crime Summit was packed out throughout the two-day event, with eager listeners regularly spilling out the door. One of the most popular sessions was delivered by Nick Bailey, retired Detective Sergeant involved in the Salisbury Novichok poisoning. Nick took attendees on an emotional journey, by talking through the events of March 4, 2018 and the impact it has had on his mental health, describing himself as ‘a different person, broken physically and mentally’. Session on coming to terms with trauma Discussing the uniqueness of it being a state-sponsored attack, he spoke to attendees about coming to terms with trauma, resilience and the damaging effect of losing control of many aspects of everyday life, which he has had to face. In another session, Philip Ingram MBE, Former Senior Intelligence & Security Officer and Editor in Chief, Figen Murray, Protect Duty Campaigner, and Aaron Edwards, Senior Lecturer at Royal Military Academy Sandhurst, sat on a panel to discuss the blurred lines between terrorism and organised crime. Session on terrorism and organised crime Moderating the session, Roy McComb, Director of Inquisitio Consulting Ltd and Former Deputy Director of the National Crime Agency immediately opened the session for attendees, to address questions to the panel, which ranged from - Are we spending too much money on terror and organised crime at the expense of other issues?, Should we negotiate with terrorists?, and How do we cut off the financial stream to terror and organised crime? Sponsored by Adani and Patriot One Technologies Inc., at the International Security Conference, speakers from British Transport Police, City of London, Imperial War Museums, HVM Advisors and more, provided attendees with insights, across CNI, transport and aviation, with day two turning to the night-time economy, public sector and major events. ‘The State of Aviation Security’ session In a session titled, ‘The State of Aviation Security’, Philip Baum reflected on the role of mental health In a session titled, ‘The State of Aviation Security’, Philip Baum of Green Light Limited and Coventry University reflected on the role of mental health, as ‘a major challenge to the industry’. Philip Baum spoke about the importance of behavioural analysis, describing this as, “The first and foremost measure we ought to be implementing to mitigate future threats, before reflecting on the new challenges brought about by the pandemic and introduction of social distancing in airport security screening.” Disaster & Resilience Conference Across the hall, in the Disaster & Resilience Conference, sponsored by Everbridge, senior leaders from Unilever, Joint Security and Resilience Centre (JSaRC), Ministry of Defence, Public Health England, and London Fire Brigade took to the stage to offer the audience actionable insights on responding to a crisis. In one session, Tony Thompson, Fellow, Institute of Civil Protection and Emergency Management helped attendees address how they should monitor and respond to events in real-time, use integrated technology solutions to drive greater efficiencies and cost savings, and finally deliver a unified security platform. Global Cyber Summit The inaugural Global Cyber Summit also welcomed major names in the field of cyber security. Tracy Buckingham, Deputy Director of Security & Cyber Exports at UKTI DSE spoke about the UK’s role in cyber and security capabilities, on the global stage and how collaboration between government, industry and academia, a trio she described as ‘the cornerstone of the UK’s approach to cyber security’, is vital to the strength of the UK’s cyber security industry. Elsewhere, Professor Ciaran Martin CB, Oxford University, and Former Chief Executive Officer (CEO), National Cyber Security Centre, delivered a session on the current cyber threats and priorities. Underpinning Martin’s speech was the belief that people have unconsciously polluted the cyber environment, resulting in the need for a rethink, to make it a safer place to inhabit. During his session, he explored five key areas that required change, namely, people, money, rules, technology, and skills. Platform for product innovation and latest launches With globally renowned exhibitors coming together under one roof, visitors perused the stands of the likes of Adani, Marshalls, Audax Global Solutions, Bastion Security Products, Leidos, Patriot One, Rapiscan Systems, HS Security Group, PointWire, Pitagone, Smiths Detection Group, Tripwire, Heras, Leonardo, Apstec systems, Jacobs, Astrophysics, Intqual and Mitie to source a wide range of security products and solutions. The show floor was recognised as a hotbed for innovation, with many exhibitors taking the opportunity to launch new products. Apstec Systems showcased version 4 of its Human Security Radar that combines a sleek design, smaller footprint For example, Apstec Systems showcased version 4 of its Human Security Radar (HSR V4) that combines a sleek design, smaller footprint and improved mobility with enhanced AI, additional detection capabilities and flexible integration. Meanwhile, Everbridge showcased its Global Critical Event Management (CEM) certification programme, with formalised standards for assessing an organisation’s enterprise resilience. As well as showcasing its range of protective street furniture options, Marshalls Landscape Protection (Marshalls) used the event to launch its new seating range, Verso. The full range has been tested to IWA14-1 using a 1.5 tonne M1 vehicle and a 7.2 tonne N2A vehicle travelling at 30mph. It can be used to create a variety of configurations that blends seamlessly into all environments. Lochrin Combi SL2 fencing system on exhibit Meanwhile, Lochrin Bain introduced its industry disrupting B3 (SR2) rated fencing system, Lochrin Combi SL2. The fence offers the same attack delay times as other systems of the same level, but no specialist tooling or training for installers, and security professionals. Elsewhere, Bastion Security Products announced the launch of its new single and double steel doorsets, which feature BastionCORE attack resistant materials, to mitigate cut through and cylinder guard removal attacks. Rebecca Hughes, Country Marketing Manager (UK) at Heras, said “Heras was delighted to be a Premier Partner Exhibitor at the ISE and support an event, where the UK security industry could come together, showcase the latest innovations in physical and cyber security, and discuss key issues, where effective security can be beneficial for UK plc.” Rebecca Hughes adds, “We are delighted that our new innovations were so well received at the show and generated strong interest. We expect this to translate into a strong order book.” Solutions to meet new cyber security risks The inaugural International Cyber Expo also played host to new launches, for example, a solution from Senetas Corporation that allows employees to download files from the web without risk or hidden threat. Votiro Secure File Gateway leverages patented Positive Selection technology for anti-malware and anti-ransomware protection, while preserving 100% file functionality and user workflow. Chris Pinder, Chief Operating Officer, IASME Consortium, said “This has been a great show for IASME. We’ve had both the quantity and quality of visitors we’d hoped for, with a great range of people representing our client base. We are looking forward to following up on some promising leads and interesting contacts.” Catherine Craig, Channel Manager at 3M added, “We’ve had consistently good engagement and conversations on the stand. It’s been so helpful to be able to tap into a wide range of different markets and people all in one place. It’s been a great show and we’ve already signed up to return in 2022.” Products under the spotlight Attendees also snapped up the opportunity to take a deep dive into the latest new launches Attendees also snapped up the opportunity to take a deep dive into the latest new launches in the Product Innovation Theatre. Here, exhibitors, including Exeon Analytics, Census Labs, Robin Radar, 3M Privacy Solutions, Heras, Safetyflex Barriers and Smiths Detection, took to the stage to deliver a range of insightful sessions. For example, Christoforos Papachristou, Strategic Account Manager for Census Labs provided attendees with insights on how the Internet of Security Things, a network of sensors, wearables, and IoT devices that use cloud and edge computing, create a cohesive security force. On day two, Jeremy Tettmar, Sales Manager, Safetyflex Barriers revealed the next generation of crash rated street furniture from ultra-slim profile, shallow mount anti-terrorist bollards to cost-effective, large perimeter Hostile Vehicle Mitigation (HVM) equipment. Live and interactive demonstrations Visitors were also able to witness these products and more in action across a number of live, interactive demonstrations and within specialist zones. The LPCB Live Testing Lab gave visitors the opportunity to witness a team of professional forced-entry specialists, attempt to break through physical security products, including mesh fencing systems from the likes of ARX and Fastline, key safes from Burton Safes, glazing units from Selectaglaze, hinged gates from Lochrin Bain, turnstiles from Frontier Pitts and Eagle Automation, and more. At the International Cyber Expo, the realities of a cyber-attack also came alive with a number of interactive features. CrisisCast in collaboration with Cyberprism carried out a theatrical live cyber-attack on a high-tech revolving stage. Cyberprism’s role in a live cyber-attack situation We’ve had some great conversations and will be leaving the show with some really strong leads" Brian Mitchell, Lead Producer, CrisisCast, said “It’s been great to see both visitors and fellow exhibitors embrace the essential role that storytelling has, in engaging with audiences and demonstrating the role that Cyberprism plays ,during a live cyber-attack. Presenting an immersive demonstration, which brings to life the real-time battle between defender and attacker, has been a great way to impress clients with how the software works. We’ve had some great conversations and will be leaving the show with some really strong leads.” Visitors were able to engage in the dialogue from both sides of the attack and understand the psychology and motivating factors from two perspectives at one - the attackers and the entity’s boardroom. Elsewhere, Cyber Griffin offered attendees a NCSC certified, immersive training experience through its award-winning tabletop exercise designed to explore the decisions that people make to protect their businesses from modern-day threats. The perfect place to network The event’s international hosted buyer meeting programme enabled senior buyers, from around the globe, to come together and do business, regardless of travel restrictions. In conjunction with the Department of International Trade’s UK Defence & Security Exports, the free-of-charge personalised match-making service gave qualified buyers, an exclusive space away from the show floor, to speak to hand-picked solution providers. The sessions ran both virtually and physically to meeting all needs. Rachael Shattock, Group Event Director at Nineteen Group, added “I can’t describe how fantastic it feels to reunite the whole security industry face-to-face, after over 18 months without a physical event, and provide a platform to network, learn and discover the latest security solutions from the world’s leading suppliers. This year is also particularly special as we successfully launched the first International Cyber Expo with its own dedicated Global Cyber Summit conference programme, interactive activities, and a raft of top suppliers.” International Security Expo and International Cyber Expo will return to Olympia London, in London, United Kingdom, from September 27 - 28, 2022.
SMART SHOOTER, a world-class designer, developer, and manufacturer of innovative fire control systems (FCS) that significantly increase the accuracy of small arms, will present its SMASH 2000 Plus and SMASH Hopper Light Remote-Controlled Weapon Station (LRCWS) at the Milipol 2021 exhibition in Paris, France. Image processing and fire control software As a world pioneer in applying advanced image processing and fire control software into a ruggedised rifle-mounted optic, Smart Shooter has developed the SMASH family of fire control systems that are designed to handle HLS, border security, and critical infrastructure protection challenges in a cost-effective way, while, for example, ensuring that no bystander gets hit during a cross-border engagement. The SMASH systems can be integrated into C2 networks or surveillance sensors deployed along the border or the infrastructure perimeter for optimal target location and identification. Precise and quick threat elimination SMASH FCS ensures precise and quick elimination of threats with minimal exposure and risk to the operator"Michal Mor, SMART SHOOTER CEO, "Preventing unlawful cross-border activities, fighting criminal organisations and protecting critical infrastructure is of great importance in protecting one’s sovereign integrity.” “The challenge is detecting and recognising illegal cross-border activities and threats to strategic infrastructures while focusing on prevention, and we are happy to say that the SMASH fire control systems are ideal for this mission. Handheld operated or controlled from a safe distance, the SMASH FCS ensures precise and quick elimination of threats with minimal exposure and risk to the operator." The company will present both handhelds operated and remotely controlled fire control solutions at the Milipol exhibition. SMASH 2000 Plus SMASH 2000 Plus - a rifle mounted FCS for individual dismounted operations: SMASH 2000 Plus is a combat-proven rifle-mounted Fire Control system that ensures the first-round hit in both day and night conditions while reducing engagement time and enhancing force lethality and survivability. SMASH 2000 Plus includes the SMASH fire control solution’s full feature set, with an additional advanced Counter-UAS mode Designed to provide the end-user a decisive tactical edge in almost every operational scenario, SMASH 2000 Plus includes the SMASH fire control solution’s full feature set, with an additional advanced Counter-UAS mode that provides accurate Hard Kill capability against drones or any static or moving ground targets. SMASH HOPPER SMASH HOPPER – a Light Remote-Controlled Weapon Station: SMASH HOPPER is a modular and rapidly deployable Light Remote-Controlled Weapon Station (LRCWS) that provides “One Shot – One Hit” capability while remotely controlled by an operator from a safe distance. Weighing approximately 15 Kg, SMASH HOPPER is ideal for deployment on various lightweight manned and unmanned vehicles and platforms, with a wide range of applications. Offering day and night capability with automatic scanning and target detection, SMASH Hopper is ideal for multiple mission scenarios, including border security, force protection, Counter UAS and anti-drone, remote ambush, and other low-profile operations in complex urban environments.
Recently, the European Parliament called for a ban on police use of facial recognition. In the US, too, some cities have restricted police use of facial recognition. The first question that comes to mind is - why ban police from using technology that is allowed to private companies? Point of difference The key difference between the way police use facial recognition and the way commercial facial recognition products work is that: The police get a picture of a suspect from a crime scene and want to find out: "Who is the person in the picture?" That requires as wide a database as possible. Optimally - photos and identities of all the people in the world. Commercial facial recognition products such as those used by supermarkets, football stadiums, or casinos answer different questions: "Is the person in the picture on the employees' list? Is the person in the picture on a watch-list of known shoplifters?" To answer these questions doesn't require a broad database but rather a defined list of employees or a watch-list of specific people against whom there is an arrest warrant or a restraining order. Use of facial recognition AnyVision helps organisations leverage facial recognition ethically to identify known persons of interest "Facial Recognition Apps Should Be Provided to the Police with an Empty Database". This is exactly the subject of the open letter sent by AnyVision, to the British Biometrics and Surveillance Camera Commissioner, Prof. Fraser Sampson, titled: "Facial Recognition Apps Should Be Provided to the Police with an Empty Database". AnyVision recently raised $235M from Softbank and another leading VCs is a visual AI platform company that helps organisations across the globe leverage facial recognition ethically to identify known persons of interest, including shoplifters, felons, and security threats. Ethical use of facial recognition AnyVision CEO Avi Golan wrote, "The ethical use of facial recognition is a thorny one and requires a nuanced discussion. Part of that discussion has to explain how facial recognition works, but, just as important, the discussion must also involve how the technology is used by police departments and what checks and balances are built into their processes.” “We recommend building their watchlists from the ground up based on known felons, persons of interest, and missing persons. Some facial recognition solution providers have scrapped billions of photos and identities of people from social networks, usually without their consent." "Unfortunately, this method of facial recognition has justifiably angered privacy groups and data protection agencies around the globe and damaged the public trust in accuracy and reliability of facial recognition systems.” Preventing invasion of citizen’s privacy We believe an unjustified invasion of citizens' privacy can be prevented, false arrests can be reduced" “We believe that lists of suspects should be limited and justified. In this way, unjustified invasion of citizens' privacy can be prevented, false arrests can be reduced and public confidence in technology can be increased.” Golan added: "AnyVision is willing to share its industry insights and best practices from our vast research experience with leading global players, including name-brand retailers, global hospitality and entertainment companies, and law enforcement agencies from around the world.” Balancing public order and crime prevention “If the regulations set forth by Surveillance Camera Code of Practice are committed to the principles outlined above, then law enforcement agencies can strike the right balance between the need to maintain public order and prevent crime with the rights of every person to privacy and non-discrimination before the law." Recently Clearview AI CEO told Wired; the company has scraped 10 billion photos from the web - 3 times more than was previously known.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
The concept of security has substantially upgraded because of technological advancements. We have seen a shift from mechanical locks to electronic locks and door access control systems which are more relied upon nowadays for watertight security and safety. But, choosing the system that is the best for you requires understanding how both these technologies work. In this article, you will get a clear idea of: How electronic locks are better than traditional locks The difference between access control systems and new locking mechanisms Why biometric technology is the best access control system What are traditional locks? These are mechanical locks having strong metal deadbolts, knob locks, levers, etc. They always require a matching physical key. Mechanical locks are easy to install and can protect houses and small offices. However, their keys can be copied easily. Anyone with a key can open a mechanical lock, no matter if it isn’t the owner. Insight: The only advantage of mechanical locks is they’re very modestly priced, so if your security requirements aren’t very complex, mechanical locks can serve you well. The new-age electronic locks Electronic or digital door locks give you increased control over who can enter your premises, extending greater security and accessibility. They are operated using cards or biometrics. Cards cannot be copied without the owner or the manufacturer’s knowledge. Some smart digital locks also provide information on who accessed your door and when, and any attempts of forced entry. Insight: Although more costly than traditional locks, electronic locks are a better option and investment. What is access control? Access control is a comprehensive system of security that covers all the doors or access points of your premises, only allows entry to people who are registered in the system, exercises surveillance in terms of IDing each user requesting access, and maintains detailed records of all transactions done on the system. The elements required for installing and operating an access control system are: The access reader – This is installed on or beside the door or the access point, is connected to the electric lock, and acts upon the instructions programmed into it by the administrator. The access key – An RFID reader uses an RFID card key, and a biometric reader uses a biometric identifier (fingerprint, palmprint, etc.). The control panel – This stores all the information of the access keys, employees, visitors, etc. and reads commands from the key and sends it to the reader. Electronic lock – The access control door locks are controlled by the control panel. Access control systems go beyond electronic locks as they bring your entire premises under one security framework for convenient monitoring. Why biometric access control systems are the best bet Biometrics – the science of evaluating features of the human body to establish your identity. Biometric technology has been earning immense approval all over the world in the last two decades. From quick access to managing records of visitors, biometrics does it all, making it the best access control system in use. As a general practice, companies looking to install biometric security solutions should consider the following points to make their decision easier and more accurate: The purpose for which the system is to be installed. The group of employees who will be using it. The area and scale where it is going to function. Understanding biometric access control mechanisms According to reports, biometric verification was first encouraged by law enforcement agencies in the 1800s to identify criminals. Later, it was adopted by businesses and large companies for recording the attendance of their employees and maintaining records. Today, technological advancements have developed biometric access control & security systems that can analyze an array of biometric identifiers: Facial Recognition Fingerprint Recognition Voice Recognition Iris Recognition Retinal Scans The easiest to install and the most common biometric ACS (access control system) is fingerprint recognition. They’re highly preferred by organizations of all scales and sizes and are easy for employees to operate as well. Next in line is facial recognition, which is slightly expensive due to its equipment and tech, but highly adopted, nevertheless. This has become possible due to facial unlocking systems flooding the smartphone market and making this technology more normalized, plus the onset of the covid-19 pandemic that surged the demands for contactless solutions everywhere. Insight: For this reason, many biometric access control system manufacturers develop scalable devices that can accommodate multiple identifiers as per the client’s necessities. A unique benefit of the voice recognition component in access control mechanisms is ‘convenience with fun’. We cannot deny the expediency of "Hello Google", "Hey Siri" and "Alexa" in Google Assistant and Apple's voice recognition facilities. Voice recognition is a comparatively costlier access control mechanism and so small companies hesitate to employ it. Insight: Voice recognition is a developing technology; it can become cost-efficient in the future. Both iris recognition and retinal scans are ocular-based biometric identification technologies that seem similar but are actually quite different. A retina scan is performed by casting a beam of low-energy infrared light into a person’s eye as they look through a scanner’s eyepiece at close range. Iris scanning uses camera technology to obtain a detail-rich image mapping out the intricate structure of the iris. Overview: Retina scanning is more invasive than iris scanning because the retina is positioned at the back of the eye. Iris scans take a picture of the iris from a distance, whereas retina scanning takes a picture of the iris by putting the person's eye close to the scanner. Insight: Companies looking to install these 2 systems should consider the users as retina scanning works the best for in-person authentication, and iris scanning can be done digitally. How does access control transcend all other locking systems? The number of benefits that modern access control systems offer is quite evident. They encompass all features of traditional as well as electronic locks and amplify security to a significant level. Moreover, biometric access control raises the bar by eliminating the risks of keys/ proximity cards getting stolen and enforcing identity-based access so that only the one who is authorized can enter.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalisation in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialogue over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritisation to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customised accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
Honeywell announces it was selected to lead the Bengaluru Safe City project under the Nirbhaya Fund by the Government of India’s Ministry of Home Affairs. The project aims to create a safe, secure and empowering environment for women and girls in public places to enable them to pursue all opportunities without the threat of gender-based violence or harassment. The Bengaluru Safe City project is valued at INR 496.57 crore ($67 million USD). Advanced video analytics Honeywell will create an integrated Command & Control Center to manage a state-of-the-art video system that features more than 7,000 video cameras deployed at more than 3,000 locations across the city. The video system will provide advanced video analytics, including facial recognition, a ‘Dial 100’ application, and drones. Honeywell will also upgrade the city police department’s existing Suraksha app to help improve incident response rate and citizen engagement. Bengaluru is among eight cities selected for India’s Safe City project, which involves the identification of hot spots for crimes against women and the deployment of various components, including infrastructure, technology adoption, and capacity building in the community through awareness programs. Making informed decisions Honeywell helps develop future-ready cities with its wide portfolio of smart city offerings" “Globally, Honeywell helps develop future-ready cities with its wide portfolio of smart city offerings, including a focus on connected safety and security technology,” said Matthew Britt, Smart Cities General Manager, Honeywell Building Technologies. “Our technology-led integrator approach combined with our global expertise in delivering complex integrated solutions can help city administrators make informed decisions and improve safety for citizens in near real-time, with the goal of turning Bengaluru into a city that’s safer, smarter and more resilient.” The Bengaluru Safe City project will be implemented in phases. Honeywell will operate and maintain the security infrastructure for five years. Smart city systems Honeywell’s smart city systems connect more than 100,000 IoT sensors and touch the lives of more than 100 million people. The company’s solutions help create actionable insights that city authorities and municipalities can use to improve their situational awareness, economic development and quality of life for residents. Honeywell has delivered similar projects under India’s Smart Cities Mission across multiple states, including Odisha, Madhya Pradesh, Maharashtra, Haryana, Uttar Pradesh, and Gujarat, to name a few.
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution. Identity and facemask verification solution As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe. As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security. Alcatraz AI’s Rock facial authentication solution Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces. Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS. BrainBox AI, leading the green building revolution “BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.” “BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
A host of industry-pioneering fire protection solutions from UK manufacturer, Advanced, have been installed to protect approximately 140,000 sq ft of Grade A office space at Westferry House, Canary Wharf. As a cornerstone office building situated at the western gateway to Europe’s largest and most successful business district, Westferry House consists of 11 storeys, complete with its retail promenade on the ground floor. At the core of the active fire protection for the building are six Advanced MxPro 5 fire alarm control panels installed alongside Apollo Soteria multi-sensors. Installing custom-made fire panel Responsible for all aspects of the installation, as well as the future maintenance of the system, are Advanced partners, Pacific Security Systems Ltd. The Kent-based fire and security specialists installed the MxPro 5 fire panels alongside Advanced’s remote-control terminal and repeater panel, TouchControl, to provide a discreet and aesthetically pleasing means of viewing the fire system in the building’s recently refurbished reception area. Advanced’s team was commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel Advanced’s AdSpecials team was also commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel to control the pressurisation and extraction fans and dampers on all floors of the building. The annunciator also integrates with the building’s VA/PA system to provide manual control of messages on all floors. Reliable and user-friendly solutions Kirk Short, Director at Pacific Security Systems, said, “As long-time installers of Advanced with many successful projects, large and small, under our belts, we know its solutions are both reliable and user friendly. The bespoke equipment we required for the fire system upgrade at Westferry House is of an excellent standard, and we found the AdSpecials team very easy to work with throughout the entire design process.” Advanced’s AdSpecials team works with customers requiring bespoke fire panels to design and manufacture unique fire system solutions, whatever the installation challenge. Versatile TouchControl solution Amanda Hope, UK Fire Business Development Manager at Advanced, said, “Canary Wharf attracts some of the World’s most respected and successful companies, and it was fantastic to learn that our solutions have been installed in such a prestigious commercial office space.” “Westferry House is just a stone’s throw from the Landmark Pinnacle – the UK’s tallest residential building – another iconic site protected by Advanced’s MxPro 5 panels. Westferry House is also a fantastic example of where our TouchControl solution comes into its own, providing additional monitoring and control in a sleek and versatile format that complements the building’s stylish reception space.” Touchscreen repeater TouchControl is a high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps TouchControl is the low-profile, high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps and zone plans while harmonising with a wide range of interiors. When in standby, it can be used to display branding, advertisements, and information, but will instantly revert to fire operation when a fire condition occurs. Advanced, owned by FTSE 100 Company Halma PLC, protects a wide range of prestigious and high-profile sites across the globe – from London’s Shard to Abu Dhabi International Airport and the Hong Kong – Zhuhai – Macau Bridge Fire protection solutions Advanced is a world pioneer in the development and manufacture of fire protection solutions. Advanced’s reputation for performance, quality, and ease of use see its products specified in locations around the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging, false alarm management, and reduction systems as well as emergency lighting. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe. Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud. Allowing genuine access via MFA Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting? Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities. This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly. Need for secure and accurate user experience The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over. Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020. "The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
Adani Group is an Indian multi-national conglomerate, with its headquarters located in Ahmedabad, Gujarat, in India. The group’s diversified businesses include resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with the Mundra port, located in Gujarat, the largest commercial port in India. Having multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units in India. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders, across 25+ business units. Attendance and shift record maintenance Adani Group is widely engaged in multiple business units and ports, with strength of 50,000+ workers, who are engaged under 900+ contractors employed at various locations. Maintaining and managing the entire attendance details, diverse shifts and leave policies for the various locations and numerous workers at a central place was critical for the multi-national conglomerate. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management to deal with on a regular basis. To provide approved and appropriate induction of each worker, at a defined level, monitor progress status of each work order and its segregation, based on reports were quite challenging. COSEC Contract Workers Management solution Report generation to eliminate the fraudulent and erroneous payment of wages, at contractors' end, had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was to improve overall productivity. After a comprehensive discussion, with regards to the problems and requirements of the Adani Group’s management, Matrix offered its COSEC Contract Workers Management solution for their 50,000+ workers, who are working under 900+ contractors, spread across the enterprise’s four locations in India. Centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution for various branches that are spread across multiple locations, which automates all processes right from recording entries and exits, up to processing salaries. The COSEC Contract Workers Management solution facilitates enrolment of the worker credentials, along with photographs, documents and induction details. It helps contractors to manage workers efficiently, using contractors’ self-service portal. The solution provides multiple connectivity possibilities, via Ethernet, Wi-Fi and Mobile broadband. Seamless integration with SAP The solution also eases the tracking of work order progress. It offers seamless integration with SAP, using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations, via Email and SMS. Results: Enhanced security with effective worker’s enrolment process, abiding by various induction levels. Increase in productivity of administration by 20%. Easy decision making, due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring, with reduced time spent by the security department. Error-free man hours’ computation for quick & effective wages’ calculation. Minimised manual interventions. Products offered by Matrix include: COSEC CENTRA LE - Application software platform, expandable up to one million users. COSEC LE CWM - Contract Workers Management module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF card-based door controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare card, and NFC-based door controller. COSEC VEGA FAX - Fingerprint and RF card-based premium door controller with Touch Sense LCD, IP65, Wi-Fi and POE connectivity options. COSEC DOOR FOP - Fingerprint and RF card-based premium door controller with LCD and keypad.
Four out of every five (82%) of existing CCTV and video monitoring systems are set to be extended to help keep schools and colleges ‘COVID Safe’, found a new education sector study of 91 education organisations based in the UK, US, Sweden, and Norway, carried out by video security as a service (VSaaS) provider AVA Security in March 2021. Many schools and colleges have already adapted their video monitoring systems to support COVID safety measures. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 6 months. Adopting video monitoring/CCTV technologies The AVA Security Education Sector Trends Report 2021 just out, provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 6 months. New COVID Safe-specific video analytics 29% were using their existing video systems to help provide temperature level health checks at some building entrances Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the 6 months. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels inside retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 6 months. Mask and face recognition systems Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 6 months. However, the Education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22% of schools and colleges have deployed facial recognition to date, although this is set to more than double to 29% over the next 6 months. The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely before the end of 2021. Cybersecurity becomes a key IT priority There has been an increased focus on cybersecurity to protect access to vital data and online learning resources As IT, operations, and security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few months, the University of Hertfordshire experienced a major cyberattack that led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. VSaaS selection criteria For the 82% of all education respondents actively considering Video Security as a Service (VSaaS) options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS in 2021, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ Reduced costs and ease of use The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people. While 24% of education sector decision-makers considering VSaaS, said the provider needed not to be headquartered in mainland China. Integration with existing camera systems A net 80% of video monitoring system decision-makers in the education sector also considered it important A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment. A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Video analytics An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and colour searching’. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimising the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection Education sector video monitoring system decision-makers are considering VSaaS and weighing up criteria for selection" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Video security solutions Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Round table discussion
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?
Protecting dormitory residents and assetsDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download