Facial recognition systems
Global surveillance business Synectics announces that its Synergy 3 command and control software now integrates with NEC’s NeoFace Watch facial recognition system to support person of interest (POI) tracking. Synergy 3 is an open architecture command and control platform that monitors, manages, and records surveillance video, alarms, and events from multiple subsystems, and non-security transactional data. Synergy 3 is the system of choice for many of the world’s most challenging su...
GET Group North America, a provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, announced the availability of the CoreID Identity Management System (IDMS). Seamlessly combining biometric capture capabilities with back-end database functionality, Core ID can be used to issue and track physical or digital credentials throughout the credential’s lifecycle, as well as to manage enrolment workflows and ensure only the appropriate enrol...
Dahua Technology, a solution provider in the global video surveillance industry, has launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product...
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it...
Vigilant Solutions - an AI and data analytics company that provides technology to public safety - announced it has entered the body worn camera market by acquiring Edesix Ltd, a global provider of wearable security hardware and software, and the United Kingdom's number one manufacturer of body worn cameras. The acquisition strengthens Vigilant's position as a market leader in image capture solutions by adding body worn camera images via hardware and software and in-car camera technology to its...
Security Essen 2018, held in Messe Essen, Germany, promised attendees a newly modernised trade show with a simplified layout and more interactive experience. Compared to previous years, halls were reorganised by technology area, with aisles laid out to make more direct pathways for attendees. The fair welcomed 950 exhibitors and more than 36,000 trade visitors from the global security market. Several manufacturers mentioned that footfall had been lighter than expected, but that the show had del...
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF physical security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardisation organisations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 compression formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognises the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
Getac has announced the launch of the new F110-Ex fully-rugged tablet, as an enhancement to its popular F110 model, designed to deliver unrivalled efficiency, reliability and safety to workers in hazardous environments. In many industrial sectors, extreme temperatures, poor weather conditions and close contact with dangerous substances are all factors to contend with daily. Workers need devices they can rely on for efficient field maintenance, accurate safety checks and equipment monitoring tasks. IT failure not only has a significant impact on productivity, it also puts lives at risk. Functionality in extreme conditions The F110-Ex features intrinsic safety design limiting electrical and thermal energy output to a level below that required to ignite hazardous atmospheric mixtures The new F110-Ex fully-rugged tablet has been designed with this in mind. Featuring an 11.6-inch sunlight readable display and weighing just 1.49kg, it is both versatile and compact providing reliable operation in the field. MIL-STD810G and IP65 water and dust resistance certifications ensure seamless operation in wet, dirty environments, while an operating temperature range of -21°C to +60°C ensures full functionality in even the most extreme conditions. The F110-Ex features intrinsic safety design limiting electrical and thermal energy output to a level below that required to ignite hazardous atmospheric mixtures. Like all of Getac’s Ex fully-rugged tablets it is certified to ATEX, UL913 and IECEx standards, for complete operator safety. Powering digital transformation Advances in AI and IoT technologies are powering digital transformation across all industrial sectors and the F110-Ex allows those businesses working in hazardous environments to fully benefit from productivity and process improvements and migrate legacy paper-based documentation to live and even cloud solutions.Full data protection is provided by Windows 10, with an optional face recognition camera compatible with Windows Hello Chris Bye, President at Getac U.K. Ltd, comments, “The F110-Ex enables users to safely collect and send digital data, capture images and even engage in video communication in high-risk environments, helping enterprises complete the last mile of digital transformation.” Exceptional performance and security Equipped with the 7th generation Intel Kaby Lake Core processors and multi-factor security mechanisms, the F110-Ex provides exceptional computing power and secure authentication. Full data protection is provided by Windows 10, with an optional face recognition camera compatible with Windows Hello, as well as bar code scanner and (LF/HF) RFID reader. As one of the world’s leading rugged tablet solution providers (source VDC 2018), Getac offers a comprehensive portfolio of vertically integrated solutions for all types of extreme operating conditions. In addition to the new F110-Ex, Getac’s fully rugged tablet portfolio includes the EX80, ZX70, T800 and other ATEX-certified models, all delivering exceptional ruggedness and performance for hazardous industries.
Security and Safety Things GmbH (SAST) announced their vision for a revolutionary IoT platform in the security camera segment. SAST is currently building a global ecosystem for the development of innovative security camera applications. Although the open and secure IoT platform is initially for the security camera industry, the platform will be extended to support additional IoT domains in the future. The platform will be launched in mid-2019. “SAST introduces a new standard for the development of innovative business applications in the security and safety segment. SAST is creating a free operating system and a secure and scalable global marketplace to deploy and manage software solutions. SAST is closely cooperating with the recently announced Open Security and Safety Alliance to ensure an innovative and compatible platform for its members,” said Hartmut Schaper, CEO of SAST. Platform for next generation of security cameras Increasing internet connectivity and computing power at the edge is fostering the rise of edge-based video analytics The founding of SAST is in direct response to current innovative trends for IP security cameras. Increasing internet connectivity and computing power at the edge is fostering the rise of edge-based video analytics. Within this global market, SAST anticipates specialised software applications to emerge as a significant growth segment during the next five years. A specific growth driver for these software applications are next-generation microprocessors, including so-called neuron chip sets. Benefits include among others: High-value analytics applications Artificial Intelligence unlocking new security camera functionality, e.g. facial recognition Possibility to install apps via updates or new app uploads, without changing the camera Applications include building and airport security SAST will provide a unique B2B-software ecosystem within the security camera market. The SAST-related App Store will allow developers to build applications on an open software standard, and to market them via the SAST App Store, similar to today’s app stores for smartphone applications. Focus applications currently include: Building security. Vertical specific applications for airports (e.g. face recognition, perimeter control) and retail (e.g. queue management, flow analysis) based on Artificial Intelligence Applications beyond security, such as business intelligence and lifecycle monitoring (e.g. predictive maintenance and condition monitoring) Implementing strict guidelines and security checks SAST will implement strict quality guidelines and security checks for new apps, as well as a stringent approval process. As a further commitment to innovation, SAST plans to hire additional employees during the first half of 2019, with a high focus on software developers and IT skills. SAST is set up as a wholly owned subsidiary of Robert Bosch GmbH and is part of the group’s strategic move into new, digital growth areas. Going forward, SAST plans to onboard additional investors to further open up to external stakeholders, and to accelerate the success of its ecosystem.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Digital identity verification provider, Blockpass, confirmed that they have signed a deal to invest in and partner with video verification solutions provider Fully-Verified. The move underlines Blockpass' commitment to becoming the premier Know-Your-Customer (KYC) and Anti-Money Laundering (AML) verification solutions provider. The deal also allows Blockpass exclusive access to the solutions provided by Fully-Verified. Banking-grade identity verifications Blockpass offers shared regulatory compliance services for humans, companies, objects and devices. As an identity system that supports verification of humans (KYC), objects (KYO) and connected devices (KYD), Blockpass will enable the development of new applications that rely on a trusted connection between multiple entities. Fully-Verified provides banking-grade identity verifications on live video, backed by human verification specialists Fully-Verified provides banking-grade identity verifications on live video, backed by human verification specialists, automated document scanning, and face recognition. The company was created as answer to its founders collectively losing over $150,000 to various types of fraud in their eCommerce businesses. Digital identity creation "Integrating the Fully-Verified video verification solution into the Blockpass application means that as a business, we are taking the quality of our product offering to the next level. Video verification is the future of digital identity creation, and it is with great pride we bring the Fully-Verified team and product into our ecosystem," said Adam Vaziri, CEO of Blockpass. "We are extremely happy to be part of the Blockpass ecosystem. Connecting our identity verifications with a blockchain based solution for storing identity details, allows for an extra level of comfort and security for the end users," said Lucas Kwiatkowski, CEO of Fully-Verified.
Panasonic System Solutions Company of North America, Security Group, brings to market FacePRO, its deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time, at the Global Security Exchange (GSX) 2018 Expo in Las Vegas, September 25-27, 2018. Visitors to GSX Booth can demo Panasonic’s core engine that boasts the world’s highest face recognition performance. FacePRO high-precision facial recognition software can identify faces that are difficult to recognise with conventional technologies, including faces at an angle of up to 45 degrees to the left or right or 30 degrees up or down, even those partially hidden by sunglasses. Deep learning technology FacePRO software provides real-time processing and the highest precision in facial recognition thanks to its new deep learning technology" “Panasonic continues to develop comprehensive, end-to-end security hardware and software solutions to help those organisations and institutions looking to improve safety and security. Our FacePRO software provides real-time processing and the highest precision in facial recognition thanks to its new deep learning technology.” said Domingo Martinez, Product Marketing, Panasonic System Solutions Company of North America. “We are excited to show the GSX audience the capabilities of the FacePRO technology.” The new software, which fits into the Panasonic unified and secure ecosystem, features the ‘iA (intelligent Auto) mode’ that automatically adjusts settings for the camera to shoot optimal images best suited for facial recognition. When used with Panasonic's i-PRO EXTREME series network cameras installed with the included ‘Best Shot License Key’, only the ‘Best Shots’ will be sent to the server for facial recognition. High-precision recognition The combination of Panasonic core devices and the facial recognition software maximises performance to achieve high-precision recognition. The company plans to add a function to recognise partially covered faces with a surgical mask, which is difficult with conventional systems, by the end of this year. Cost can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function Additionally, using this software with cameras equipped with the iA function enables image analysis to be performed on the camera instead of the server to send only the best images to the server. This will result in reducing server and network loads, which leads to overall system cost reductions. When 10 or more network cameras are connected to the system, the cost can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function. FacePRO's Key Features include: High precision: The world’s highest facial recognition engine as evaluated by NIST (IJB-A face challenge) - iA function and Best Shot images maximise facial recognition engine performance and provide high recognition precision System cost reduction: Sends only “Best Shot” images to reduce server and network load System expandability: Registers up to 30,000 faces (Available as an option) Integrated management with i-PRO monitoring system enables integrated management of a facial recognition system and monitoring system with the same GUI.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
According to Save The Rhino statistics, over 1000 rhinos are killed annually in South Africa. These harrowing poaching statistics display a gloomy future for survival of this beautiful species. While many attempts have been undertaken over the past ten years to combat the devastating results of poaching, the country has not yet seen a steady decline in numbers year-on-year. It is with this knowledge that AxxonSoft’s Global Marketing Director, Colleen Glaeser, who is based in South Africa, decided to create a strategical and proactive anti-poaching approach, utilising the tools at her disposal, assisting a country in dire need of assistance. While Deep Learning, using Artificial Intelligence and neural network analytics in its algorithm, is not new to the security and surveillance industry, Colleen and the team at AxxonSoft global took the technology a step further, developing and implementing the software to help differentiate between humans and animals. Identifying actual poaching threats AxxonSoft’s surveillance software, which leverages Artificial Intelligence and Deep Learning technology now alerts the operators in the control room to an immediate poaching threat The implementation of this technology in game reserves and parks across South Africa has certainly been a game-changer regarding the war against poaching. For two reasons namely; this neural network solution can identify actual poaching threats (distinguishing poachers from their prey) while providing a proactive surveillance solution as opposed to a reactive one. Predominately utilised for face and license plate recognition, Deep Learning technology has never been adapted to tell the difference between humans and animals. Prior to the incorporation of Deep Learning in anti-poaching surveillance, software often failed control rooms and response units in that false alarms were on many occasions, set off by animals, insects and weather. Control rooms were not able to tell the difference between an actual threat and a false alarm, which often resulted in exhausting resources as teams were dispatched for animals who had touched the fence while grazing in their natural habitat. AxxonSoft’s leading surveillance software, which leverages Artificial Intelligence and Deep Learning technology now alerts the operators in the control room to an immediate poaching threat as poachers try and breach the fence perimeter to enter the reserve or park. Proactive surveillance solution AxxonSoft’s Deep Learning technology provides a proactive solution to surveillance whereas previous systems were somewhat archaic and reactive in their response to real threats Global Marketing Director for AxxonSoft, Colleen Glaeser says, “Our Deep Learning technology has been extremely successful thus far in telling the difference between animals and humans as the neural network algorithm can identify, through certain indicators, whether a human or animal has set off the alarm. If the software detects a human, the operations team is immediately notified and a dispatch team is sent to the scene in question.” Furthermore, AxxonSoft’s Deep Learning technology provides a proactive solution to surveillance whereas previous systems were somewhat archaic and reactive in their response to real threats. Due to expansive terrain and limited resources, rangers and antipoaching units often get to the scene of the crime too late. With the AxxonSoft technology, as soon as the breach occurs, cameras will identify if the breach has been caused by an animal or human, and the control room is immediately notified as to where the occurrence has taken place in the reserve or park. The dispatch team is given the necessary information and they head to the site where the occurrence has taken place. Real-time identification of threats By utilising this technology, we have been able to take a proactive approach, identifying the threat in a real time situation" The beauty about Deep Learning and Neural Network analysis is in its ability to learn and understand the conditions which lead up to an event, and that ultimately allows us to prepare for threats or potential breaches when the known conditions are met. “AxxonSoft’s technology has proved very successful in preventing killings as the team is able to get to the scene of the crime quickly. “By utilising this technology, we have been able to take a proactive approach, identifying the threat in a real time situation. The AxxonSoft team and I really believe this anti-poaching solution can aid in the war against poaching and drastically bring down the upsetting statistics. I can attest to the fact that we have seen great success in curbing poaching,” concludes Glaeser.
AxxonSoft technology speaks to product simplicity, ease-of-use and advanced functionality during the FIFA World Cup in Russia. Within the framework of preparation for the 2018 FIFA World Cup in Russia, AxxonSoft's tech support customised settings on more than 1,350 video channels at 3 stadiums and at a central monitoring station to meet the Ministry of Internal Affairs' needs through a centralised monitoring system. AxxonSoft, in collaboration with this global high calibre event, launched this state-of-the-art technology system within just 1 month, utilising team members to rollout. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security Situational video analytics AxxonSoft's Intellect software managed a total of 960 video surveillance channels at Samara Arena, Mordovia Arena, and RZD Arena — the latter of which was used as a training base for referees. 250 of those channels employed AxxonSoft's situational video analytics to monitor the stadiums, 41 license plate recognition channels to monitor vehicle traffic, and 9 facial recognition channels to monitor for individuals prohibited from accessing the stadiums. Video monitoring was also integrated with access control, fire and security alarm systems. The Ministry of Internal Affairs' central monitoring station, powered by AxxonSoft's Intellect PSIM platform, pooled over 390 video channels from all 11 World Cup host cities with video feeds displayed on an interactive map. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security for participants and guests of the World Cup. Integrated access control software The World Cup stadium security project included requests to integrate access control software, as well as develop a screen manager to adaptably manage camera layout and the video wall. These functions were successfully implemented at the World Cup stadiums and will be incorporated in Intellect 4.11.0. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators The Intellect PSIM platform was employed in various areas of 10 out of the 12 stadiums where 49 World Cup matches were played. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators who attended the games. AxxonSoft software was also widely used at training camps, fan zones, transportation infrastructure, and other sites where teams and fans arrived and moved around the country. Advanced stadium security technology “The team at AxxonSoft were really excited to be part of a project of this calibre. We were able to demonstrate product simplicity, ease-of-use and advanced functionality through our stadium security technology. The FIFA World Cup was a great success in Russia and just proves how we can work together with top agencies and companies to provide a safe environment for all,” says Global Marketing Director for AxxonSoft, Colleen Glaeser. FIFA president Gianni Infantino called the 2018 World Cup the best in its history. In addition to commenting on match attendance and television viewership numbers, Infantino gave high praise to the quality of infrastructure and security.
Ask a student, or pretty much anyone, what they think about “access control” and you’ll get a shrug. Conversely, all of us are enthusiastic about security and convenience. Students across Europe are discovering SMARTair wireless access control gives them both. Adding SMARTair access control to a door involves just replacing a standard cylinder or escutcheon with a digital, smartphone- or smart-card–operated electronic lock. It’s hassle-free to make the switch to SMARTair. And with a system design focused on user experience, SMARTair takes some of the everyday pain out of student life. Wherever you fit SMARTair, it’s easy to configure access cards to enable payments in the canteen or at vending machines; for changing room locker locks; and for the photocopier or library loans. You can’t do that with a metal key. MIFARE RFID cards At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys. CUNEF fitted escutcheons to monitor and ease access to different areas of the university for 1,600 students, without the need for expensive wired door locks. If a student loses their card, there’s no threat to campus security. A manager issues a new credential which automatically cancels the lost card — much faster than changing a lock. When Mezzino took ownership of Rialto Court — apartments for students attending Durham University and Teesside University — they replaced a mechanical master key system with SMARTair. From the company’s point of view, the high annual tenant turnover and a need for scheduled cleaning and summer shutdown were becoming difficult to manage with physical keys. Students also reaped the benefits of their new, user-friendly access system. They have the confidence no previous resident of their flat has copied a physical key. At Funway Academic Resort in Madrid, student rooms are also locked with SMARTair escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students each have their own safe locked with a SMARTair cabinet lock. The Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair escutcheons — and open with the same smart-card. SMARTair Openow solution The recent launch of the SMARTair Openow solution puts credentials on a mobile phoneThere’s more to come from SMARTair. The recent launch of the SMARTair Openow solution puts credentials on a mobile phone. With SMARTair and the Openow app, students can open their rooms and authorised doors with a smartphone. If you have your phone, you’re already carrying your keys. Student services or facilities managers issue virtual keys over-the-air — and can revoke them whenever they choose — so there’s no need for a key-card handover meeting, at the beginning or end of term. A time-limited virtual key arrives ahead of the first day and automatically expires when it’s time to vacate your halls. Mobile credentials Mobile credentials will be a big hit. Student life goes on inside the handset, as much as IRL (“In Real Life”, for the uninitiated). Last year’s Deloitte Mobile Consumer Survey found a fifth of 18- to 24-year-olds even check their phone for messages in the middle of the night*. From a security standpoint, phone-based credentials have another advantage. Checking our phones is “habitual”, “unconscious” and “repetitive”, according to one study**. We know very quickly if it is missing. How soon would you notice a missing plastic card, especially if you were enjoying yourself on a night out? Biometric security Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door. Fingerprint, and even face and iris, scanners are commonplace on smartphones. ”Generation Z students were raised as digital natives,” says Felix Moran, SMARTair Product Manager at ASSA ABLOY. ”They expect convenience as a standard feature, not a mechanical solution used in Ancient Egypt. In Europe’s increasingly international, marketized higher education ecosystem, attracting these tech-savvy students is critical, as is keeping them satisfied with the campus experience.” SMARTair TS1000 software The complete SMARTair solution includes wireless escutcheons, cylinders, wall readers, locker locks and more; the intuitive SMARTair TS1000 software; and the enhanced new Openow app functionality. It works out the box and is easy to install — and even easier to operate.
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about 22% of which is recovered by law enforcement agencies. Other nations have similar results. Acts of violence are committed in about four percent of the robberies, with employees suffering the most injuries; other countries are not immune and the rate varies around the world. Small banks and branch offices of banks are typically targeted nearly 47 times more often than main offices are in large institutions worldwide. The continuing deployment of IP megapixel camera technology is leading to more identifications and apprehensions of criminal suspects thanks to improved image quality delivering outstanding live video and forensic recording. Panoramic megapixel cameras provide undistorted, high-quality video with 180-360° coverage, non-stop indoors and out. Bank & finance applications Deter internal and external theft Overall security with enough detail for customer and staff ID and vehicle/license plate ID Megapixel provides the ability for facial detail Improve staff productivity Resolve staff and customer disputes Protect staff, customers, equipment and assets Ability to cover more with less (instead of manpower to control PTZs, panoramic cameras can cover it all of the time) Increased detail equals better forensics and reduced time from police and security professionals in post event investigations Monitor daily business Forensic documentation to build cases Provide security, situational awareness, life safety Prevent fraudulent claims Quantifiable return on investment What Arecont Vision's customers say Omar Valdemar, CPP, VP – Manager, Security Solutions, City National Bank, comments: “When City National Bank began integrating high quality megapixel security system solutions, Arecont Vision was among many cameras that were tested. Arecont Vision’s high resolution and WDR technology made their cameras instrumental tools in City National’s security design.”Alex De Barros of AV Enforce (integrator for ABSA Bank, South Africa) says: “Arecont Vision outperforms all the current competitors. The price compared to analogue cameras is better considering the fact that you gain so much. We were able to capture images for the bank that were never achieved before.”
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the ill and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern Connecticut. A challenging safety diagnosis Avigilon has made us more efficient as we don’t have to spend much time sifting through large amounts of video” Charlotte Hungerford Hospital prides itself on supporting patient and staff safety in all hospital areas and locations. Several years ago, they found themselves with an outdated security system that lacked quality video coverage and recording capabilities. CHH struggled with reliable video playback and faced frequent system crashes. As a result, the hospital’s security operators were often unable to provide accurate evidence during forensic investigations and many liability claims and hospital incidents went unresolved. CHH needed a cost-effective, comprehensive security solution that could protect patients and staff across multiple locations while still being flexible enough to scale with the hospital’s growing needs. Avigilon AI & Analytics technology With a desire to improve its legacy surveillance system, CHH looked to Avigilon’s advanced artificial intelligence (AI) technology and video analytics to meet their security needs. CHH began a multi-phase upgrade that included installing over 100 Avigilon cameras with self-learning video analytics, deploying AI-based Avigilon Appearance Search technology and using impulse radar technology with the Avigilon Presence Detector (APD) Sensor. Avigilon Appearance Search technology – a sophisticated deep learning AI search engine – helps CHH quickly locate a specific person or vehicle of interest across all cameras both inside the hospital and care centers as well as outside parking lots. This technology provides CHH’s operators with enhanced situational awareness, enabling fast event response and helping to save time and effort during critical investigations. To protect areas of the hospital where cameras cannot be installed, CHH installed the Avigilon Presence Detector (APD), a discreet impulse radar device with self-learning radar analytics that scans, learns, and continuously adapts to its environment. Avigilon Presence Detector sensors Our Security Department’s mission at Charlotte Hungerford Hospital is the safety of our patients, visitors, and employees” Capable of detecting persons who aren’t moving or are hidden, the APD sensors help improve situational awareness for CHH staff, and are used in areas where cameras are not permitted, such as restrooms or change rooms. When integrated with Avigilon Control Center (ACC) video management software, APD sensors alert CHH operators of human presence while still maintaining privacy. Avigilon H4 cameras were used throughout the hospital to provide exceptional image quality and built-in self-learning video analytics, which provides accurate detection and notification of movement of people and vehicles. CHH also deployed HD Multi-sensor cameras which provide up to four camera views per camera installation, using only one camera license and network drop. This allows CHH’s staff to efficiently cover all angles in order to detect, verify, and act on potential security events across the hospital’s premises. Avigilon H4 and HD multi-sensor cameras At the core of CHH is a desire to help the community and still serve as the beacon of compassion it was founded to be 100 years ago. With these values in mind, the hospital’s mission when it comes to security is the safety of patients, visitors, and employees. Avigilon’s AI solutions have helped achieve this by moving the CHH system from legacy to advanced and providing effective monitoring around the clock while also helping to create operational efficiencies. Since deploying ACC software, CHH’s operators spend significantly less time reviewing recorded video, allowing them to focus on proactive event response. Working with Avigilon, Charlotte Hungerford Hospital has a roadmap for continued growth and exceptional patient safety.