Graylog, a global provider of next-generation log management and SIEM solutions, is announcing Graylog Security, Thursday, October 21st, at their annual user conference, Graylog GO. Designed to overcome legacy Security Information & Event Management (SIEM) challenges, Graylog’s scalable, flexible cybersecurity platform makes security analysts’ jobs easier and faster. With SIEM, Anomaly Detection, and User Entity Behavior Analytics (UEBA) capabilities, Graylog’s security so...
To mark European Cybersecurity Month 2021, 2N, the global pioneer in IP access control systems, has strengthened its guidance to help consumers and building managers prevent cyber-attacks. The move is a response to evidence that the threat of cyber-crime is increasing, and that access control remains a common area of vulnerability. Increased spending on cybersecurity Earlier this year, Hiscox published its Cyber Readiness Report 2021. It was based on a survey of more than 6,000 companies based...
BlueVoyant, a cybersecurity company, announces a strategic partnership with SentinelOne, an autonomous cybersecurity platform company. The partnership will see BlueVoyant unite its unrivalled cybersecurity expertise with the advanced, automated endpoint detection and response capabilities of SentinelOne’s Singularity Complete Suite to deliver exceptional Managed Detection and Response (MDR) services to clients. The cyber threat environment continues to intensify as organisations implement...
GeoVision has announced the release of GV-Control Center (V4.0), integrated security management software, designed for central monitoring systems. GV-Control Center is designed for enterprise system users, to handle high-volume video data. From real-time monitoring, video playback, event detection pop-up, I/O central monitoring, 3D E-map and communications, GV-Control Center helps security guards to quickly identify threats, and take swift actions. GV-Control Center (V4.0) GeoVision unveils a...
On the occasion of the Milipol 2021 (Milipol Paris 2021) exhibition, the event dedicated to homeland security and safety (taking place from Oct. 19-22, 2021, in Paris, France), Deveryware will introduce its range of security solutions, to support investigators and enhance homeland security. As the European expert in investigation technologies and global security services, Deveryware will present its innovations, specially designed to facilitate police and the Gendarmerie’s investigations....
SonicWall, a pioneer in physical, virtual and cloud-focused cybersecurity solutions, is emphasising the return of customer choice for securing and scaling a mix of cloud, hybrid and traditional environments. “Too many times organisations have been forced to change the way they operate in order to secure access to their networks, data, devices and people,” said SonicWall President and CEO Bill Conner. “We’ve been busy innovating cloud and virtual solutions that help organ...
Automating the issuance of all enterprise public or private trusted digital certificates through a single platform reduces the risk of certificate mismanagement and associated outages. HID Global, a pioneer in trusted identity solutions, has simplified certificate automation for any Microsoft Active Directory-managed network devices with its PKI-as-a-Service (PKIaaS) platform. Customers can seamlessly issue, renew, replace or revoke certificates automatically with Microsoft Autoenrollment now that any device on the network can easily be connected with HID’s cloud-based PKIaaS via the Microsoft Autoenrollment connector. Cloud-based PKIaaS platform HID Global, through its cloud-based, HID PKIaaS platform that delivers the industry’s broadest range of automation capabilities for managing privately issued and publicly trusted certificates. The platform eliminates manual, risk-prone processes for tracking, installing, and renewing certificates, and provides one secure and convenient cloud-based platform for all certificate needs. Out-of-the-box integration PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage certificates HID Global has simplified how to integrate Microsoft Active Directory-managed network devices with its cloud-based PKIaaS to automate their certificate lifecycles. The HID’s PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage all device certificates across the entire enterprise, either manually or through an active directory or a mobile device management platform, and whether they are issued automatically or manually. Identity and access management solutions Microsoft Active Directory has a 44 percent share of the market for identity and access management solutions. Providing out-of-the-box integration and automation support for it in HID PKIaaS eliminates the need for agent-based certificate distribution and automation. In addition to Microsoft Autoenrollment, HID PKIaaS supports various pre-built integrations with standards-based certificate management protocols including Simple Certificate Enrollment Protocol (SCEP), Enrollment over Secure Transport (EST), and Automated Certificate Management Environment (ACME). It also provides robust RESTful Application Programming Interfaces (APIs) to integrate with any other third-party tools for certificate orchestration and automation. Auto-Enrollment connector PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory HID PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory for any certificate request that makes an outbound connection to HID’s PKIaaS platform for certificate issuance or updates. There is no need to update any firewall configuration for an inbound connection since it only makes an outbound connection at port 443. There is also no agent or other configuration change required at the individual device level, enabling customers to leverage existing technology deployments and infrastructure. About digital certificate and PKIaaS offerings HID PKIaaS offers trust for the enterprise and its computers, network devices, IoT systems, and e-commerce transactions. Use cases range from securing websites and email communications to digitising paper-based processes using digital certificates and securing network endpoints or connected machines. The HID PKIaaS offering with native support for the Microsoft Autoenrollment protocol is available as a low-cost subscription service with a guaranteed uptime Service Level Agreement (SLA).
Cloud-based access control is growing in popularity as more organisations are looking to adopt a flexible, convenient, and scalable security solution. Over the last few years, the presence of the cloud has generated significant changes in the range of access control, and for good reasons! Cloud-based access control not only produces reliable, real-time control of the organisation but can also be fully integrated with third-party systems to help mitigate and limit risks within the organisation. Access control solutions The cloud ultimately eliminates old hardware and improves on new security protocols with minimal effort from the end-user. One of the major benefits of cloud-based access control is that it frequently leverages the power of data. Implementing a cloud-based system empowers employees to gather more data beforehand, and better prepares them to monitor their business effectively. “Cloud-based access control solutions are becoming increasingly popular. For organisations searching to upgrade their security infrastructure, remember, it’s important to select a flexible system that will integrate seamlessly with other third-party systems and support mobile access. Not only will this help to ‘future-proof’ the access control system, but it ultimately creates a safer and easier-to-use solution that can be relied on for years to come.” - Kim Loy, Chief Product Officer, ACRE.
Cloud video surveillance company Cloudview has appointed Silicon Valley sales enablement leader Mark Gibson to be its new Head of Sales. Experience Mark has gained extensive experience in international sales and business development and has been consulting with leading technology companies since 2004. He has helped to develop many high tech startups in California, EMEA, and the Nordics specialising in AI applications for anti-money laundering and cybersecurity, and has spent time running his sales and marketing consultancy, focussing on the B2B technology sector. Ensuring the growth of sales staff As Head of Sales at Cloudview, he will be helping develop sales staff to achieve their full potential to capitalise on the market opportunity. The only constant in selling today is changing, so I aim to help build a learning organisation at Cloudview" “The only constant in selling today is changing, so I aim to help build a learning organisation at Cloudview, where every employee is allowed to advance in their career. Salespeople wanting a career in selling must adopt a lifelong learning approach as there is so much to learn and know.” “I am delighted to be joining Cloudview at such an exciting time when event-based Video Surveillance as a Service is showing significant market traction, and buying behaviour is crossing the chasm from early adopters to the mainstream.” Feedback Keith Cornell, Cloudview’s CEO, said he was very excited about Mark joining the company. “Mark’s background in IT sales and marketing, together with his coaching and consultancy experience, makes him ideal for this new role.” “I know he will be using his skills and experience to galvanise and inspire our sales team, and to introduce cutting-edge sales techniques and technology.” Personal front Mark is married and lives in London with his wife and daughter. Outside his work, he enjoys playing golf and wine appreciation.
Matrix, an acclaimed industry-leading manufacturer of Telecom and Security solutions is enthusiastically gearing up to showcase its plethora of pioneering solutions at the GITEX Technology Week 21. The event is being conducted at the Dubai World Trade Centre, Dubai from 17th-21st October’21. Since its inception, the exhibition has always been a witness of first-hand technologies that are tailored to redefine the way the high-end technological world functions. Launching telecom solutions Matrix has chosen this technologically rich platform to launch its latest and innovative Telecom solutions. The communication giant will unveil its state-of-the-art Gigabit IP Phone – SPARSH VP210 at the event. The exclusive range of modernistic Unified Communication Servers, intelligent Gateways, ergonomic User Terminals, and advanced IP-PBXs will also be brought into the limelight at the event. Smart IP desk phone SPARSH VP210 – the smart IP desk phone is designed after understanding the core needs of futuristic corporate professionals. Equipped with functionalities such as Power over Ethernet, fully duplex speakers, and 50+ business IP calling features, 128 x 64 graphical LCD, LED for a call, message wait indicator, intuitive user interface with icon, the user terminal redefines the conventional desktop telephony experience. Card-based hybrid solution With a versatile user interface and deployments, market dominance comes easily to this hybrid solution Apart from this, Matrix will wholeheartedly sport its avant-garde hybrid tech marvel - ETERNITY PENX. The card-based IP-PBX is sculpted to provide a much more market-demanded platform that combines the best of UC and PBX technologies. With its versatile user interface and deployments, market dominance comes easily to this next-gen hybrid communication solution. Voice over IP solution Matrix will also be divulging its best-in-class IP-based unified communication solutions, inclusive of a range of hardware and software. With IP-at-core and its hardware-independent nature, ANANT Unified Communication Server forms the basis of a Voice over IP solution for modern-day business enterprises that adapts to existing infrastructure setup with ease. It is a unique office UC solution for small-medium & large enterprises with up to 5000 users. It connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration. Other than this, Matrix will be boasting its proficient SOHO corporate communication solutions along with Smart IP Deskphones for business professionals to offer enhanced enterprise communication quality. Facial recognition-based door controller This time, at GITEX, making an entrance will be the latest launch in the domain of Access Control and Time Attendance, Matrix COSEC ARGO FACE, an intelligent new age door controller with face recognition as a credential. With features such as live face detection and deep face learning, it makes security more tamper-proof With this device, it becomes easy to deploy for various solutions such as visitor management, cafeteria management, contract workers management, and job processing & costing. With features complementing security such as live face detection, adaptive face enrollment, and deep face learning, it makes security more tamper-proof. With a high-end storage capacity of 50,000 users, 2, 00,000 face templates, & 5, 00,000 events, it suffices the need of every organisation. Alongside this, Matrix would be propounding its core competencies, access control solutions for SMEs and SMBs, helping them in growing their vision to become pioneering enterprises. Video Management Software solution Apart from this, Matrix is showcasing its upcoming range of Enterprise Network Video Recorder - a turnkey video management software solution for medium and large enterprises. Designed with cutting-edge hardware technology and redundant server features it is an ideal solution for enterprises looking for a persistent solution. Not to miss, the device has a 1Gbps throughput capacity with 4K decoding. Also, smart features like perceptive monitoring and smart investigation lead to proactive security. All in all, these flexible and reliable enterprise NVRs are ideal for modern organisations looking for proficient, persistent, and preventive security. VMS and IP camera Matrix IP cameras back-illuminated CMOS sensor technology results in clear images even in light as low as 0.01 Lux Besides this, it would be also showcasing a range of IP cameras and video management systems that provide centralised security for modern enterprises. Matrix IP cameras back-illuminated CMOS sensor technology results in exceptionally clear images even in light as low as 0.01 Lux. Apart from this, the cameras are designed with cutting-edge technology and a sturdy build. Adhering to (IP66) Ingress protection standards, the cameras can perform even in harsh weather conditions. Lastly, in compliance with the (IK10) impact protection standard, the cameras can withstand impact up to 20 joules. An ideal place to launch solutions “GITEX Technology Week is an ideal launchpad for our latest solutions. We are expecting lengthy interactions with key decision-makers of different industry verticals to understand their needs and devise solutions revolving around the same”, commented Kaushal Kadakia, Marketing Manager. Matrix awaits people’s presence at Stand Number Z3-D30: Zabeel Hall at GITEX Technology Week from 17th- 21st October at Dubai World Trade Centre, Dubai for a healthy business discussion.
Delta, a provider of power and thermal management solutions, announces its board of directors has approved the purchase of 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence pioneer March Networks® from Infinova International Ltd. for USD 114 million (approximately NTD 3,163,500 thousand) through its subsidiary Delta International Holding Limited B.V. The deal is expected to strengthen Delta's presence in the growing video surveillance market and complement its building automation solutions. Video surveillance technologies Ping Cheng, Delta's Chief Executive Officer, said, "Security being an integral element of smart cities is boosting the global demand for video surveillance technologies. March Networks is a proven leader in providing end-to-end solutions to some of the world's leading financial institutions, retailers, transit agencies, and commercial customers.” Security being an integral element of smart cities is boosting the global demand for video surveillance" “We are confident that the collaboration between March Networks and Delta will expand our overall market opportunity and increase Delta's exposure to the growing video market beyond our surveillance subsidiary VIVOTEK. March Networks' cloud-based video solutions and business intelligence technologies set it apart and are also a perfect fit with our commitment to developing smart green solutions for a sustainable future." Aggressive growth plans March Networks President and CEO, Peter Strom, said, "Delta's financial strength and scale – with around $10 billion USD in annual revenues, over 80,000 employees, and deep M&A capability – will serve as an ideal platform for March Networks to accelerate its strategic plan of offering cloud-based video surveillance-as-a-service (VSaaS) and video-based business intelligence solutions to enterprises worldwide." He added that March Networks' customers and partners should expect no change to the high-quality products and services they've come to expect from March Networks as it embarks on its aggressive growth plans. Following the closing of the transaction, it is expected that March Networks will continue to operate from its Canadian headquarters and the March Networks executive management team will continue to lead the organisation.
Security contractors can no longer afford to simply complete a project and move on to the next job without creating recurring service revenues and an ongoing commitment to the customer. iDter, which stands for intelligent and immediate deterrence of crime, recently launched a complete commercial security solution and partnership programme with the ability to generate RMR streams through its unique technology footprint. A fully integrated and automated security solution, iDter is proven to foil 98% of intrusions without the delays of human intervention. Deep-learning technology iDter, part of Kuna Systems Corporation, offers its solution through a qualified network of commercial security integrators, structured/data cable contractors and licensed electrical contractors and is currently seeking additional members for its dealer community. iDter has implemented Artificial Intelligence (AI) deep-learning technology using CNN The heart of the product is an intelligent, quad-core Niō guardian node exclusive to iDter that is designed to identify intrusion and take immediate and effective deterrent actions that surprise intruders and defy predictability. iDter has implemented Artificial Intelligence (AI) deep-learning technology using convolutional neural networks (CNN) and holds some 35 U.S. patents through parent Kuna Systems Corporation. With iDter intrusions are detected, immediately verified on video and alerts with event recordings sent to the client’s iPhone, iPad or Android phone. Ensuring deterrence actions iDter live monitors events to ensure the deterrence actions were successful, and if not, a video verified alarm is sent to a UL Listed, Five-Diamond Certified central station to dispatch authorities through 911 operators. Customers receive access to reports of security incidents and deterrence effectiveness with performance metrics and statistics, such as the total number of incidents, the preventative responses triggered, recordings of the incident and responses and the central station engagement and dispatching activity. “iDter has recognised the need in the security marketplace for an automated and immediate deterrent solution,” said Greg Ayres, Vice President of Sales and Marketing at iDter. “It’s a complete, integrated platform focused on providing documented security results for the property owner and RMR creation for the security dealer.” Immediate deterrent responses The iDter solution begins with Niō nodes installed around the premises, in place of Wall-Pack lighting “With iDter, integrators can provide regular, documented security results to their clients adding substantial value, thus making the relationship sticky. Dealers can grow their business with predictable revenue streams and a proven, end-to-end deterrent solution.” The iDter solution begins with Niō nodes installed around the premises, in place of Wall-Pack lighting. The Niō nodes are positioned to detect intrusion with a powerful 4K HD resolution camera with wide-angle lens, multiple motion detectors, omni-directional microphone and quad-core intelligence. The Niō nodes also deter with a rich set of immediate deterrent responses, such as the instantaneous illumination by 10,000 lumens of multi-directional LED floodlights, blinding strobes of red and blue LEDs, piercing sirens, situation-appropriate voice-down warning messages and intimidating sound effects. Equipment rental sites The nodes are networked to the iDter cloud through WiFi/ethernet communications and include a 256GB SD memory card for onboard, 24/7 HD or 4K camera recordings for online forensic analysis. iDter features Amazon Web Services (AWS) cloud video storage and video-verified monitoring with UL 827 dispatch to PSAP. iDter products are fully NDAA compliant, ETL listed, FCC certified and carry an IP-65 environmental rating. The solution is ready for easy deployment and RMR generation at commercial facilities, including construction sites, equipment rental sites, auto repair and dealerships, hotels and malls, educational campuses, agriculture and cannabis facilities, oil and gas and any other location with open-air assets that need immediate deterrent protection. It can be used as a standalone security system or to augment guard services at the protected premises.
Video surveillance systems are producing more unstructured data than ever before. A dramatic decrease in camera costs in recent years has led many businesses to invest in comprehensive surveillance coverage, with more cameras generating more data. Plus, advances in technology mean that the newest (8K) cameras are generating approximately 800% more data than their predecessors (standard definition). Traditional entry-level solutions like network video recorders (NVRs) simply aren’t built to handle massive amounts of data in an efficient, resilient and cost-effective manner. This has left many security pioneers grappling with a data storage conundrum. Should they continue adding more NVR boxes? Or is there another, better, route? Retaining video data In short, yes. To future proof their video surveillance infrastructure, an increasing number of businesses are adopting an end-to-end surveillance architecture with well-integrated, purpose-built platforms for handling video data through its lifecycle. This presents significant advantages in terms of security, compliance and scalability, as well as unlocking new possibilities for data enrichment. All of this with a lower total cost of ownership than traditional solutions. Security teams would typically delete recorded surveillance footage after a few days or weeks Previously, security teams would typically delete recorded surveillance footage after a few days or weeks. However, thanks to increasingly stringent legal and compliance demands, many are now required to retain video data for months or even years. There’s no doubt that this can potentially benefit investigations and increase prosecutions, but it also puts significant pressure on businesses’ storage infrastructure. Data lifecycle management This necessitates a more intelligent approach to data lifecycle management. Rather than simply storing video data in a single location until it’s wiped, an end-to-end video surveillance solution can intelligently migrate data to different storage platforms and media as it ages. So, how does this work? Video is recorded and analysed on a combination of NVR, hyperconverged infrastructure (HCI) and application servers. Then, it’s moved to resilient file storage for a pre-determined period, where it can be immediately retrieved and accessed for review. Finally, based on policies set by heads of security, data is moved from file storage to highly secure, low-cost archive storage such as an object, tape or cloud. Data is moved from file storage to highly secure, low-cost archive storage Long-term storage This process is known as tiering. It allows businesses to use reliable, inexpensive long-term storage for most of their data, whilst still enabling security pioneers to retrieve video data when the need arises, such as during a compliance audit, or to review footage following a security breach. In a nutshell, it offers them the best of both worlds. Scaling your video surveillance infrastructure can be a headache. Businesses that rely on NVRs – even high-end units with 64 or even 96 hard drives – are finding themselves running out of capacity increasingly quickly. In order to scale, security pioneers then have to procure new boxes. With NVRs, this inevitably involves a degree of guesswork. Should they go for the largest possible option, and risk over provisioning? Or perhaps a smaller option, and risk running out of capacity again? Common management console Security pioneers can easily add or remove storage capacity or compute resources – separately or together As businesses add new cameras or replace existing ones, many end up with inadequate surveillance infrastructure made up of multiple NVR boxes along with several application servers for running other surveillance functions such as access control, security photo databases, analytics, etc. This patchwork approach leaves security pioneers scrambling for capacity, maintaining various hardware footprints, repeating updates and checks across multiple systems, and taking up valuable time that could be better spent elsewhere. By contrast, flexible HCI surveillance platforms aggregate the storage and ecosystem applications to run on the same infrastructure and combine viewing under a common management console, avoiding ‘swivel chair’ management workflows. Plus, they offer seamless scalability. Security pioneers can easily add or remove storage capacity or compute resources – separately or together. Data storage solutions Over time, this ensures a lower total cost of ownership. First and foremost, it removes the risk of over provisioning and helps to control hardware sprawl. This in turn leads to hardware maintenance savings and lower power use. Many security pioneers are now looking beyond simple data storage solutions for their video surveillance footage. Meta tags can provide context around data, making it easier to find and access when needed Instead, they’re asking themselves how analysing this data can enable their teams to work faster, more efficiently and productively. Implementing an end-to-end video surveillance architecture enables users to take advantage of AI and machine learning applications which can tag and enrich video surveillance data. These have several key benefits. Firstly, meta tags can provide context around data, making it easier to find and access when needed. Object storage platform For instance, if security teams are notified of a suspicious red truck, they can quickly find data with this tag, rather than manually searching through hours of data, which can feel like looking for a needle in a haystack. Plus, meta tags can be used to mark data for future analysis. This means that as algorithms are run over time, policies can be set to automatically store data in the right location. For example, if a video is determined to contain cars driving in and out of your premises, it would be moved to long-term archiving such as an object storage platform for compliance purposes. If, on the other hand, it contained 24 hours of an empty parking lot, it could be wiped. These same meta tags may be used to eventually expire the compliance data in the archive after it is no longer needed based on policy. Video surveillance architecture Continuing to rely on traditional systems like NVRs will fast become unsustainable for businesses Even if your organisation isn’t using machine learning or artificial intelligence-powered applications to enhance your data today, it probably will be one, three, or even five years down the line. Implementing a flexible end-to-end video surveillance solution prepares you for this possibility. With new advances in technology, the quantity of data captured by video surveillance systems will continue rising throughout the coming decade. As such, continuing to rely on traditional systems like NVRs will fast become unsustainable for businesses. Looking forward, when moving to an end-to-end video surveillance architecture, security pioneers should make sure to evaluate options from different vendors. For true futureproofing, it’s a good idea to opt for a flexible, modular solution, which allow different elements to be upgraded to more advanced technologies when they become available.
Cloud-based technology can reduce IT costs, streamline application management and make infrastructure more flexible and scalable. So, it’s no surprise that cloud video surveillance solutions (also known as video surveillance as a service or VSaaS) are gaining momentum in a big way. In fact, according to recent reports, the VSaaS market is forecasted to increase at a compound annual growth rate of 10.4% by 2025. But some company owners may wonder – what services does a cloud model deliver and is such a solution right for my business? This article aims to help you determine what cloud video surveillance solution is right for your business and the benefits you can enjoy if you decide to deploy a VSaaS solution. Full cloud-based recording vs cloud-managed First, a bit of clarification on cloud video surveillance models, as definitions can vary from provider to provider. A full cloud-based recording solution is one in which both video recording and management are done offsite (for example, cameras streaming directly to the cloud). While this model can be a good option for some, many large enterprise businesses simply don’t have the bandwidth capacity or network resources required to upload all of their videos to the cloud. Even with the bandwidth capacity, this can be a cost-prohibitive model when hundreds or thousands of IP cameras are involved. A full cloud-based recording solution is one in which both video recording and management are done offsite But that doesn’t mean enterprise businesses can’t take advantage of cloud-managed video surveillance. With this solution, video recording and storage happen on your premises (with network video recorders (NVRs) or a video management system (VMS)), but the video management aspect is handled in the cloud by a third-party provider, usually as a subscription-based service. The provider hosts the central video server overseeing your on-premises devices. Some providers also allow you to back up portions of the video to the cloud, so you can store and share video evidence or select clips needed for investigations. This model combines the performance benefits of local recording with the convenience and cost savings of the cloud. Centralised video surveillance solution Perhaps the greatest benefit of using this type of cloud-managed video surveillance solution is centralisation. Because all of your devices are centrally managed in the cloud, you don’t have to travel to a distant location to update a recorder or camera’s software – it’s all done remotely by the provider from a central location. This can save you both time and money, especially since it’s necessary to consistently monitor the configuration settings on cameras and NVRs to ensure they’re correct and functioning properly. If your hardware malfunctions and it isn’t detected immediately, instances of lost video can occur. And business owners know that losing video evidence of theft or fraud could have significant consequences to the efficiency and effectiveness of an investigation. Round the clock monitoring Some providers monitor for changes in cameras’ field of view, so if a camera is blocked or moved, you’ll be alerted With a cloud-managed model, you can rest assured that if a camera goes down or another technical issue arises, the provider will know and will handle it immediately so you can avoid unnecessary truck rolls, which can be costly. Some providers will even monitor for changes in your cameras’ field of view, so if a camera is blocked or moved, you’ll be alerted right away. This type of around-the-clock monitoring eliminates your need for an in-house data centre and the IT staff necessary to maintain the video system. This is particularly important if you don’t have the infrastructure or the personnel to host your own video networking equipment. You can also save time with the deployment of your video surveillance solution since your provider will get your system up and running quickly. There’s no need to worry about setting up or configuring the central server or any application software – it’s all taken care of by your provider. Flexible and cost-effective In many cloud-managed solutions, you can also skip the large upfront capital cost of a video surveillance investment and pay a monthly fee for all of these services. This is particularly helpful if it’s difficult for your organisation to make large capital investments. You may or may not have to invest in onsite devices (cameras and NVRs), depending on the provider you choose. Some providers will allow you to finance your hardware, while others will want you to purchase it upfront. Many cloud providers also offer robust web clients for viewing video and conducting investigations remotely Many cloud providers also offer robust web clients for viewing video and conducting investigations remotely. These do not require any local downloads, which saves you time and money by avoiding the need for additional IT resources. It also alleviates worrying about whether or not you have the latest version, as the clients are automatically updated. And if you don’t want to spend a lot of time on video analysis, some cloud-managed models offer predefined reports on what’s most important to you. For example, a list of potentially suspicious transactions matched with video – so you can quickly scan to investigate. Getting the right solution Determining whether a cloud-managed video surveillance solution is right for your business is a big decision involving many factors, including your business’s size, bandwidth, and network infrastructure, and overall budget for physical security. By considering the points above, the hope is that you can more easily determine which model is best for your business.
Martyn’s Law (also known as ‘Protect Duty’) could forever change the landscape of event security if changes to legislation are passed. Some would argue it already has. In 2017, just as concertgoers were leaving the Manchester Arena, a terrorist detonated an improvised explosive device in a suicide attack killing 22 and injuring more than 250. The mother of one of the victims, Martyn Hett, has tirelessly campaigned for tighter security and a duty of care to be placed upon venues to protect their patrons. As a result, Martyn’s Law (‘Protect Duty’) has been proposed in UK legislation to protect the public from terrorism. At the same time, other global trends have indicated the need for action on this front. Labour-intensive task The Global Terrorism Index 2020, for instance, reported a steep increase in far-right attacks in North America, Western Europe, and Oceania, stating a 250% rise since 2014, with a 709% increase in deaths over the same period. But, how do we implement the measures proposed by Martyn’s law without intruding on our lives through mass surveillance? The Global Terrorism Index 2020, reported a steep increase in far-right attacks in North America Traditionally, cameras and CCTV have been the go-to solution for monitoring. However, maintaining a comprehensive view of locations with complex layouts or venues that host large crowds and gatherings can be a challenging and labour-intensive task for operatives. Camera outputs have been designed to be interpreted by people, which, in turn, requires a significant human resource that’s liable to inconsistent levels of accuracy in complex environments where getting things wrong can have a catastrophic impact. Highly accurate insights Fortunately, technology is evolving. AI-based perception strategies are being developed alongside advancements in 3D data capture technologies – including lidar, radar, and ToF cameras - that are capable of transforming surveillance with enhanced layers of autonomy and intelligence. As a result, smart, automated systems will be able to work alongside the security workforce to provide an always-on, omniscient view of the environment, delivering highly accurate insights and actionable data. And, with the right approach, this can be achieved without undue impact on our rights as private citizens. While much of this innovation isn’t new, it has been held back from at-scale adoption due to the gaps that remain between the data that’s captured and the machine’s ability to process it into an actionable insight. High traffic environments It’s crucial that they are able to detect all individuals and track their behaviour as they interact In security, for example, this gap is most present when it comes to addressing occlusion (in other words, recognising objects that move in and out of view of the sensors scanning a space). For security systems to provide the high levels of accuracy required in high traffic environments, such as concert venues, it’s crucial that they are able to detect all individuals and track their behaviour as they interact with a space and those within it. This, of course, is possible using multiple sensor modes. However, without the right perception platform to interpret the data being captured, the risk of missing crucial events as a result of the machine misinterpreting a partially concealed individual as an inanimate object, for instance, is significant. Identifiable personal data This gap is narrowing, and thanks to the first wave of sensor innovators, this shift in dependence from video read by people to 3D data point clouds read by machines have meant that we are now able to capture much richer information and data sets that can precisely detect and classify objects and behaviours – without capturing biometric and identifiable personal data. But what we need to fully close the gap are perception strategies and approaches that can adapt to the ever-changing nature of real-world environments. This gap is narrowing, and thanks to the first wave of sensor innovators Until now, this has been a lengthy and costly process requiring those implementing or developing solutions to start from scratch in developing software, algorithms, and training data every time the context or sensor mode is changed. But, by combining proven 3D sensor technologies like lidar with the deep learning first approach, this needed to be the case. Edge processing platform That’s why we are developing an adaptive edge processing platform for lidar that’s capable of understanding the past and present behaviour of people and objects within a given area. Through deep learning, it can predict the near-future behaviour of each object with some degree of certainty, thereby accurately and consistently generating real-time data and tracking the movement of people in the secured environment at scale. This approach has value beyond security. Facilities teams, for example, can extract a wealth of information beyond the primary function of security to support other priorities such as cleaning (tracking facility usage so that schedules can be adjusted), while retailers can optimise advertising and display efforts by identifying areas of high footfall. Likewise, health and safety teams can gather much deeper insights into the way spaces are used to enhance processes and measures to protect their users. Programming limitless scenarios Martyn’s Law will leave them with no option but to rethink their approach to security and safety As we’ve explained, perception is reaching new levels of sophistication through deep learning. By continually programming limitless scenarios, our approach can provide consistently accurate and rich data that users can trust. This will ultimately change the way we manage environments at a time when liability comes with ever-increasing consequences. For venue providers, Martyn’s Law will leave them with no option but to rethink their approach to security and safety. But, with new, smarter, more accurate tools at their disposal that will enable them to predict and protect, rather than just react, risks – both human and commercial – can be addressed. Meanwhile, the public can take comfort in knowing that measures to keep them safe needn’t mean sacrificing their privacy.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organisations gain insight and optimise their business processes. Seeking to fulfil Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-user communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-first approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organisation and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organisation around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behaviour, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
A host of industry-pioneering fire protection solutions from UK manufacturer, Advanced, have been installed to protect approximately 140,000 sq ft of Grade A office space at Westferry House, Canary Wharf. As a cornerstone office building situated at the western gateway to Europe’s largest and most successful business district, Westferry House consists of 11 storeys, complete with its retail promenade on the ground floor. At the core of the active fire protection for the building are six Advanced MxPro 5 fire alarm control panels installed alongside Apollo Soteria multi-sensors. Installing custom-made fire panel Responsible for all aspects of the installation, as well as the future maintenance of the system, are Advanced partners, Pacific Security Systems Ltd. The Kent-based fire and security specialists installed the MxPro 5 fire panels alongside Advanced’s remote-control terminal and repeater panel, TouchControl, to provide a discreet and aesthetically pleasing means of viewing the fire system in the building’s recently refurbished reception area. Advanced’s team was commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel Advanced’s AdSpecials team was also commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel to control the pressurisation and extraction fans and dampers on all floors of the building. The annunciator also integrates with the building’s VA/PA system to provide manual control of messages on all floors. Reliable and user-friendly solutions Kirk Short, Director at Pacific Security Systems, said, “As long-time installers of Advanced with many successful projects, large and small, under our belts, we know its solutions are both reliable and user friendly. The bespoke equipment we required for the fire system upgrade at Westferry House is of an excellent standard, and we found the AdSpecials team very easy to work with throughout the entire design process.” Advanced’s AdSpecials team works with customers requiring bespoke fire panels to design and manufacture unique fire system solutions, whatever the installation challenge. Versatile TouchControl solution Amanda Hope, UK Fire Business Development Manager at Advanced, said, “Canary Wharf attracts some of the World’s most respected and successful companies, and it was fantastic to learn that our solutions have been installed in such a prestigious commercial office space.” “Westferry House is just a stone’s throw from the Landmark Pinnacle – the UK’s tallest residential building – another iconic site protected by Advanced’s MxPro 5 panels. Westferry House is also a fantastic example of where our TouchControl solution comes into its own, providing additional monitoring and control in a sleek and versatile format that complements the building’s stylish reception space.” Touchscreen repeater TouchControl is a high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps TouchControl is the low-profile, high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps and zone plans while harmonising with a wide range of interiors. When in standby, it can be used to display branding, advertisements, and information, but will instantly revert to fire operation when a fire condition occurs. Advanced, owned by FTSE 100 Company Halma PLC, protects a wide range of prestigious and high-profile sites across the globe – from London’s Shard to Abu Dhabi International Airport and the Hong Kong – Zhuhai – Macau Bridge Fire protection solutions Advanced is a world pioneer in the development and manufacture of fire protection solutions. Advanced’s reputation for performance, quality, and ease of use see its products specified in locations around the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging, false alarm management, and reduction systems as well as emergency lighting. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
IOTICS is creating a digital twin of Portsmouth International Port as part of an ambitious 1.5m project to demonstrate an achievable modular green hydrogen generation system within the Port. The Shipping, Hydrogen & Port Ecosystems UK (SHAPE UK) project is part of the Clean Maritime Demonstration Competition, funded by the Department for Transport and delivered in partnership with Innovate UK. Carbon neutral port Portsmouth International Port is the UK's largest and most successful municipal port, operated by Portsmouth City Council, and is one of the sites of the new Solent Freeport. It is committed to becoming the first carbon-neutral UK port by 2030 and the first zero-emission port by 2050. “As a port operating in the heart of a major city, and that is owned by the people of Portsmouth, we must do everything we can to minimise our impact as we continue to grow in the coming years,” said Jerry Clarke, Senior Project Manager at Portsmouth International Port. Virtualising activities Connected Places Catapult and Portsmouth University will leverage data to enhance and optimise operations IOTICS and its partners will create a digital twin of the port, interoperating with existing and emerging data from the port infrastructure and its activities as well as gathering data from the working hydrogen electrolyser. The IOTICS-enabled semantically defined digital twins, interoperating with data sources uncovered by KnowNow and deployed by Barter4Things will be an amalgamation to virtualise both dockside and offshore activities. Connected Places Catapult and Portsmouth University will leverage data from the digital twins within the port ecosystem to enhance and optimise operations with decision-support tools. Digital twin approach The digital twin approach will create a scalable model that is translatable for other ecosystems, use cases, and locations, offering a flexible foundation for further development. Sophie Peachey, Head of Customer Success at IOTICS said, “This project gives us many options to showcase the value of a digital twin approach by reusing data across different use cases." We will be looking at the business benefits for deploying renewable and clean fuels" "We will be looking at the business benefits for deploying renewable and clean fuels as well as the logistics of refuelling onshore equipment and sea-going vessels in a busy port. We’ll also be setting up the foundations of ways to look at environmental impacts of switching to clean fuel sources." Reducing carbon emissions Dr. David Hutchinson, a Reader in Environmental Innovation and Innovation and Impact Development Manager for the Faculty of Technology at the University of Portsmouth, said, “The Government has a very ambitious environmental target within the maritime sector." "SHAPE UK represents a milestone in the move to innovative low-cost green hydrogen generation and storage systems that bring significant reduction in carbon emissions and air pollution in and around Portsmouth and other UK ports.” He added, “The port is keen to act as a living lab so there will be a great student experience element, which will be particularly relevant for students in our Faculty of Technology, such as those on the renewable energy degree.”
Ipsotek, an Atos company and a pioneer in Artificial Intelligence-powered video analytics, has announced the fulfillment of its contract with Sydney Trains, the operator of rail services across the metropolitan Sydney area, to increase security capabilities at 13 railway stations. Following a competitive tendering process, Ipsotek was selected by Sydney Trains, to deliver an AI-based video analytics solution. This has seen the train operator, Sydney Trains, integrate a range of Ipsotek’s AI-powered video analytics solutions with its security cameras, to identify incidences of tunnel and track intrusion at its 13 stations, located across the metropolitan Sydney area. AI-based video analytics solution Ipsotek’s AI solutions are at the core of Atos Computer Vision Platform, a unique end-to-end computer vision platform that offers pre-trained & customisable AI models, powered by the BullSequana server range, enabled by NVIDIA GPUs and enriched by worldwide expert labs. Mark Edmonds, the Manager of Security Capability for Transport at Sydney Trains, commented “Sydney Trains chose Ipsotek, after an extensive comparison of a number of products. Ipsotek’s proven track record in the AI Video Analytics space, its partnership with Genetec and its work with Innovate UK’s Small Business Research Initiative (SBRI) for railway-focused AI applications, made it a well-deserved choice.” Enhancing security at Sydney Trains’ stations The project with Sydney Trains is the second transportation project in the region for Ipsotek Chris Bishop, Sales Director APAC & Marketing Director at Ipsotek, said “As a British SME, competing against some of the industry’s big-named companies, we are delighted to have been chosen by Sydney Trains, to deliver this project. It represents a welcome validation of our expertise within the transportation and more specifically, the rail sector and we are proud to have supported Sydney Trains with its commitment, to delivering enhanced security practices across its network.” The project with Sydney Trains is the second transportation project in the region for Ipsotek, which is working with accelerated computing solutions firm, NVIDIA on implementation. Ipsotek, member of NVIDIA Metropolis partner group Ipsotek is a member of the NVIDIA Metropolis partner programme, which brings together a computing platform and extensive ecosystem of specialists, to help create smarter spaces and solve some of the world’s most pressing problems, which involve operational efficiency and public safety. Sudarshan Ramachandran, the Country Manager, Enterprise, ANZ at NVIDIA, commented “As an NVIDIA Metropolis partner, Ipsotek delivers incredibly valuable capabilities, solving deeply challenging video-analytics problems using AI and the NVIDIA GPU accelerated computing stack.” AI video analytics for public transport Ipsotek’s project with Sydney Trains follows the company’s previous success in delivering an initial programme of work via the Innovate UK SBRI initiative, for the development of AI video analytics, to enhance the rail experience for passengers and staff in the UK.
Starr Corporation, located in American Falls, Idaho, United States, needed a way to track people’s time for time cards for a project that was to last a year long. It contacted Anviz for assistance. The customer, a food manufacturer, saw what they were doing for the construction site and wanted to have all subcontractors use the system, as to date there are 10,000 users and 200 some companies using the system. The challenge: For about a year-long length of the project, who comes to the construction site and who leaves. At any moment pull up a report of who is on-site ordered by the company. There are 200+ contractors and subcontractors on this project. The solution: It organised it so that company was the project name; departments were the various companies working on that project. Key benefits: Accuracy of capturing people and ability of reporting. Comments “The monthly attendance hours that CrossChex Cloud report to me took me 20 minutes to prepare to the bill while it typically takes me 2 hours without it,” said Brad Shroeder Pocatello, Idaho Manager.
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people, living in nursing facilities, die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those patients who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Rise in nursing home patient falls Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the chances of falling when compared to seniors who live in a regular residential community. It has been a prevalent challenge to detect falls quickly and effectively, especially when these occur in residents’ bedrooms. In the United Kingdom, the Care Quality Commission has recognised that the use of CCTV may be one of the best ways to ensure safety and quality of care. However, using video surveillance also brings into question other security issues, such as privacy and data protection. Dahua’s WizMind technologies WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals This is where Dahua Technology’s WizMind technologies come into play. WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals, such as retail, energy, finance, transportation and of course, health and social care. Specific to the health and social care sector are deep-learning algorithms, to protect the privacy of the face and body in real-time, and stereo analysis, which combines dual-lens cameras with three-dimensional scene analysis, in order to detect sudden physical movement, such as falls. Stereo video analysis The growth of AI applications has enabled the greater availability of 3D scene analysis solutions, thereby enabling objects and people to be analysed in three dimensions. Dahua Technology’s stereo analysis uses two lenses, in order to capture separate images of the same scene. It then computes the ‘optical parallax’ of spatial points in the two images, providing 3D information of the scene. The stereo vision mimics the depth of view that comes from humans having two eyes, known as binocular vision. Combined with deep-learning algorithm Combined with a deep-learning algorithm, stereo analysis can recognise event patterns, such as falls and other movement-based behaviours, such as people approaching, the detection of an abnormal number of people in an area, and violent behaviour. In nursing and care homes, stereo analysis cameras can help staff monitor residents, in case of emergency and respond to residents’ problems, such as tripping and falls. The cameras can view all three dimensions of subjects and together with its deep-learning algorithm, can immediately alert staff to any unusual or sudden movement, such as would be evident in a fall. Cameras in communal areas and bedrooms With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents, which may otherwise stay undiscovered for hours. An example of such a scenario is a nursing home in Singapore, which has a capacity of around 400 beds and is divided into 14 separate living environments, with each designed to be a home-like living area. Dahua cameras with intelligent fall detection technology Dahua cameras, such as IPC-HDW8341X-BV-3D with intelligent fall detection technology were installed, including the provision of 167 stereo analysis cameras inside each bedroom. These trigger an alarm, in the case of incidents, such as a fall, allowing immediate response by staff. Not only does this enhance the well-being and safety of residents, but it also can reduce the nursing home’s labour costs. In addition, Stereo Analysis can also be applied in other application scenarios. An underground unmanned bicycle parking garage in Amsterdam, for instance, has installed Dahua Technology’s behaviour analysis cameras, to detect abnormal events and prevent accidents, such as people tripping and falling, or suspicious individuals wandering around the area. Privacy Protection 2.0 technology While monitoring their situation inside the nursing home, Dahua also adopts Privacy Protection 2.0 technology that features masking of human face and body, to protect the residents’ privacy. It involves the restriction of what can be seen in video images and applies equally to live, and recorded images. Digital masking takes place on the front-end device (e.g. network camera). Dahua’s Privacy Protection 2.0 provides real-time occlusion of the body and face and enables users to access recorded videos, without having to overlay faces with mosaic masks. It also offers additional occlusion options, such as irregular polygons, mosaics and coloured blocks, and allows code exporting based on specified targets, ensuring the privacy of subjects. Privacy and security in evidence collection Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities Benefits offered include non-pixelated human targets, allowing for privacy and security in evidence collection. The technology also allows for face and human attributes analysis, without breaching people’s privacy, making it ideal for nursing homes. Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities. It allows the close monitoring of residents or patients to help ensure their well-being and safety, while at the same time protecting the privacy of often vulnerable individuals. Dahua TechMonth As part of the Dahua TechMonth, this blog highlights how Dahua’s stereo analysis technology, combined with privacy protection, can provide a valuable tool to help staff respond to incidents quickly and efficiently, including falls, without infringing on people’s data protection rights. In the next blog, Dahua Technology will be discussing the WizMind application of human metadata, enabling users to maximise situational awareness and analysis of events.
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Access control readers ACT365 has a modern and user-friendly design and a limitless number of users ACT365’s readers were well-suited to this installation because they are made of a robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. Self-service terminal For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
Round table discussion
“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Expert Panel Roundtable: What is “deep learning?” How well does the security industry understand its full potential?
Crime prevention is a basic goal of security, even if a security system merely convinces a criminal to seek out a different target. However, many of today’s security technologies are most useful after the fact, to provide forensic information about a crime that has already taken place. Solving a crime presents a whole new level of challenge. Surely, prevention is the best approach. We asked this week’s Expert Panel Roundtable: How successful is the security industry in crime prevention and reducing crime rates?
In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download