Human identification system
STid, a creator of the world’s most awarded access control reader, announced the release of its new SPECTRE nano reader, which is expected to set a new standard in perimeter access control and simplified visitor management. The multi-technology reader quickly recognises employees, visitors, vendors, and their vehicles - simultaneously – for smooth, hands-free access control without compromising security. A great solution for facilities like car parks, industrial sites, campuses, an...
Road planners, traffic regulation enforcement authorities, and police are now able to take advantage of AI technology to identify the make, model, and colour of vehicles, as well as recognise car number plates. The Wisenet Road AI edge-based solution which runs on-board selected Wisenet P series 4K cameras uses AI video analytics to identify over 600 vehicle models manufactured across 70 brands. ANPR and MMCR technologies Wisenet Road AI combines Automatic Number Plate Recognition (ANPR) and...
Algorithm development at Cognitec Systems GmbH (Cognitec) continues to engineer the optimal balance between speed and accuracy of the face matching processes. NIST’s Face Recognition Vendor Test The latest results of the U.S. NIST (National Institute of Standards and Technology) Face Recognition Vendor Test for identification tasks, show the Cognitec algorithm in the best position of all algorithms tested, when relating the template generation time to the false negative identification ra...
Soloinsight Inc., a workflow automation platform company, will be featured at this year’s CREtech event in New York City. The company’s CEO, Carter Kennedy, will be a panelist for the show’s ‘The Ever-Evolving and Future of Access Control’ session on Wednesday, October 13th at 11 am EST. As a company that was recently awarded the Security Industry Association’s (SIA) new product showcase award in the hosted solutions/managed services category, Soloinsight is...
The majority of companies (68%) have experienced an incident involving a lone worker in the past three years, with a fifth of these incidents described as severe or very severe, according to research from lone worker solution, StaySafe. In addition, nearly a quarter of staff feels unsafe at least once a year. StaySafe surveyed over 1,300 lone workers and health and safety executives in the ‘The Lone Worker Landscape Report 2021’. Levels of protection This research aims, for the fi...
The UK National Quantum Technologies Showcase will return live at the Business Design Centre, in London, United Kingdom, on November 5, 2021. Bob Cockshott, the UQ National Quantum Technologies Programme Lead at KTN, said “The UK is a world leader in the research, development and critically, the commercialisation of quantum technologies, and the Quantum Showcase is where the sector gets to show its progress, to the government and industry.” UK National Quantum Technologies Showcase...
PSA, the consortium of professional systems integrators, announces the addition of viisights to its approved technology partners. viisights adds behavioural recognition systems for real-time video intelligence to the PSA offerings. “PSA is excited to be able to offer such an in-depth and advanced AI service to our integrators,” said Chris Salazar-Mangrum, PSA’s vice president of technology partners. Video surveillance systems “viisights is providing a technology that takes video surveillance to the next level and allows our integrators to advance their clients’ video analytics results. Our partnership with viisights is an example of how we aim to elevate the industries we serve through our relationships with industry-leading products and solution providers.” viisights is providing a technology that takes video surveillance to the next level" viisights developed technology that allows video surveillance systems to provide information on what subjects in the captured video feed are doing. Its system analyses real-time data to determine unique information for behavioural results of objects. These results assist in reviewing past and harmful activity as well as help to predict potential risks and hazards. viisights’ products and solutions have been utilised in a wide variety of markets such as smart cities, transportation hubs, enterprise and educational campuses, critical infrastructures and banking and financial sectors. Affordable video analytics “Partnering with PSA is a very important step to expand and establish our US presence,” said Pat Aiello, viisights’ Vice President of sales and business development in North America. “With PSA, we will quickly introduce to the market highly advanced, complete and affordable video analytics for helping with daily security, safety and environmental challenges.” A benchmark in video intelligence, viisights' behavioural analytics provide systems integrators with a new and unique selling proposition for existing and potential customers that will lead to business growth. viisights personnel will be at ISC East in November to discuss these opportunities in one-on-one meetings with potential technology partners and systems integrators. Video intelligence systems viisights leverages artificial intelligence to facilitate human-like pattern prediction" The company offers extensive support for integrators including project registration, price protection to protect and secure bids, engineering, design and implementation support, installation documentation and setup tools, training and certification for technical staff, application consulting for specialised projects, software demo licences and more. “viisights leverages artificial intelligence to facilitate human-like pattern prediction, creating fully autonomous video intelligence systems,” said Asaf Birenzvieg, CEO at viisights. “We go further than simple object recognition by analysing full-motion video for objects and their behaviour in the context that they operate in. Our real-time behavioural analytics transform video streams into actionable insights by autonomously recognising behaviours that demand immediate attention, allowing customers to be more proactive.” Protecting public privacy In this first phase, viisights will be offering PSA integrators to resell its flagship product, viisights wise, which is sold for on-premises configuration. Later in 2022, viisights is planning to release wise fully as a SaaS product. It is important to note that viisights technology protects public privacy by only analysing general behaviour patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or licence plates.
Artemis Shielding is pleased to announce a partnership to provide its lead-free, non-toxic security curtains for Integrated Defense and Security Solutions’ (IDSS) award-winning DETECT™ 1000 computed tomography (CT) checkpoint baggage scanner. IDSS incorporated the Artemis Shielding patented technology to shield operators and the public from harmful radiation during security scanning in airports around the world. All Artemis Shielding security curtains and solutions are lead-free, non-toxic and provide superior shielding protection. Accurately identify threats The IDSS DETECT™ 1000 was developed to improve the security and passenger experience “We are very pleased to partner with IDSS to provide security curtains for their elite scanner,” said Artemis Shielding Chief Executive Officer Buddy Lockwood. “We share a commitment to innovative solutions that provide a safer environment and better experience for our customers.” “Incorporating the Artemis Shielding in our award winning DETECTTM 1000 scanner enhances our patented Dynamic Flow Throughput radiation containment technology further improving throughput by reducing the number of items pulled from bins while utilising technology that reduces hazardous waste into the environment,” indicated Jeffrey Hamel, IDSS Chief Executive Officer and President. The IDSS DETECT™ 1000 was developed to improve the security and passenger experience at the checkpoint. Used in major airports around the world, its cutting-edge CT technology provides superior image quality and advanced AI algorithms to accurately identify threats, while improving throughput at the checkpoints in addition to the overall customer experience.
Learn how the federal government is using iris biometrics for the collection of personal identity and authentication data by joining Iris ID, the global pioneer in iris recognition technology for 20 years, at Connect: ID 2021, Oct. 5-6 at the Walter E. Washington Convention Centre, Washington, D.C. Agencies such as the Department of Homeland Security and the FBI are vetting iris-based technology for uses such as identifying people crossing U.S. borders and processing passengers at airport security checkpoints. Contactless authentication technology "In addition to its unrivaled accuracy, iris-based identity authentication technology is contactless, an important consideration during the current COVID-19 pandemic," said Mohammed Murad, Vice President, Global Sales and Business Development Iris ID. "Also, the cost of iris-based cameras is now the same as those capturing only faces for identification purposes." Iris ID will be demonstrating revolutionary new distance technology, which provides a dual high-quality, ISO standards-compliant iris and face capture solution, which will be displayed at Iris ID's booth #307. Tim Meyerhoff, Director, North America, Iris ID, and Jason Thompson, Assistant Chief, U.S. Border Patrol, will discuss current U.S.-Mexico border identity verification methods in a live presentation, "Biometrics on the Border," set for 3:30 p.m. Oct. 5.
Ping Identity Holding Corp., (‘Ping Identity’), the intelligent identity solution for the enterprise, acquires Singular Key, a provider of no-code identity and security orchestration. Singular Key streamlines the integration of identity services, providing a no-code method of creating workflows across multiple identity technologies and platforms, including identity verification, fraud, risk, access management, privileged access, and identity governance into a unified identity fabric. With identity orchestration, enterprises can easily design and maintain dynamic user journeys for identity and access management across the entire lifecycle of identity. Identity integration hub Singular Key’s intelligent security layering approach streamlines identity workflows to eliminate complexity and speed deployment without the need for coding, which ultimately delivers business agility and flexibility. Singular Key will be available through the PingOne cloud platform, enabling Ping Identity’s current and future customers to optimise end-to-end user journeys across third-party and Ping systems. Singular Key’s no-code identity orchestration makes integrating identity and other enterprise apps simple" “Identity security is often complicated by a tangled mess of poorly integrated cloud, legacy software and API services,” said Andre Durand, CEO and Founder of Ping Identity. “Singular Key’s no-code identity orchestration makes integrating identity and other enterprise apps simple, allowing customers to achieve better end-user experiences in less time.” Singular Key’s automated identity integration hub outclasses other orchestration capabilities with 100+ out-of-the-box third-party integrations for identity, authentication, and fraud services. Improving deployment speed This enables enterprises to integrate a variety of identity services across a magnitude of vendors for identity verification, authentication, authorisation, provisioning, governance, privileged access, risk and fraud services without dependence on DevOps or custom integrations. Singular Key technology improves deployment speed, accelerates cloud migration, reduces cost, and lowers the risk associated with vendor lock-in. “Simplifying and integrating identity workflows to trust users’ identities and devices with confidence is a critical part of a good customer, employee and partner experience,” said Jatin Maniar, Co-Founder and CEO of Singular Key. “Joining forces with Ping Identity, a company that is the identity infrastructure backbone for the world’s largest global businesses is the perfect fit for our team, and allows us to better serve our customers and partners.”
Check Point Research (CPR) sees a global boom in the black market for fake vaccine certificates on Telegram, following US President Biden’s vaccine mandate announcements made last week. The black market expands to serve 28 countries, nine of which are new: Austria, Brazil, Latvia, Lithuania, Malta, Portugal, Singapore, Thailand, UAE Price for fake vaccine certificates jumps globally, including in the US, where the price doubled from $100 to $200 Number of sellers and subscribers increases by 10x and 12x, respectively. Vendors have innovated on sales techniques by using bots that create certificates on the spot Reach expands to 28 countries The black market for fake vaccine certificates has expanded to serve 28 countries, nine of which are new, including Austria, Brazil, Latvia, Lithuania, Malta, Portugal, Singapore, Thailand, UAE. The full list of countries can be seen in the appendix below. Price jumps Prices globally range from US$85-US$200. Following Biden’s vaccine mandate announcement, the price for the CDC vaccine card in the US doubled, from $100 to $200. Number of sellers Increases by 10x On August 10, CPR saw roughly 1000 vendors on Telegram. CPR sees north of 10,000 vendors claiming to offer fake vaccine certificates, marking a 10x increase. Number of subscribers increases by 12x With some groups even peaking at a follower size as large as 300,000, a number CPR has not previously spotted On Telegram, the vendors who sell fake vaccine certificates organise themselves in groups. The groups each have a subscriber base, indicative of demand. Before Biden’s announcement, CPR observed groups having around 25,000 subscribers. Biden’s announcement resulted in an immediate acceleration in the number of subscribers and followers, with some groups even peaking at a follower size as large as 300,000, a number CPR has not previously spotted. New technique: Bots CPR has spotted a new technique that sellers are using to sell more: bots. For example, in Austria, CPR found a Telegram bot that creates fake certificates for free. All one needs to do is fill in the relevant details and a .pdf file will be shared with them containing all their filled data, such as in the case attached- a negative PCR test. A shift of black market to Telegram Oded Vanunu, Head of Products Vulnerabilities Research at Check Point Software, said “We’ve been studying the black market for fraudulent coronavirus services all year. In January, the black market took place mostly on the Darknet, where one needed special software to access it. Back then, the market was likely designed for dealers, people who can distribute the fake goods in mass quantities within specific geographies.” The black market for fake coronavirus vaccination cards will continue to thrive as more policy requiring proof gets rolled out” “Over the past nine months, we witnessed mass consumerisation of the black market by a macro-shift of the black market to Telegram. Telegram appeals to vendors by its anonymity, reach and scale. As the Biden White House announced further vaccination guidelines, Check Point Research took a fresh look at the black market since our last update on August 10, 2021. The growth of the black market for fake vaccination cards has been exponential.” “The price for a fake CDC card has doubled. The reach of the black market expanded to include nine other countries. We estimate that the number of sellers on this back market has gone up by 10x. The number of subscribers of sellers, who organise themselves in Telegram groups, has grown by a multiple of twelve. We expect that the black market for fake coronavirus vaccination cards will continue to thrive as more policy requiring vaccination proof gets rolled out.”
From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behaviour, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimising heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or mobile-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.
Ensuring employee health and safety remains a key priority for organisations this year, especially as we see COVID-19 cases continue to rise in different areas of the world. As an ongoing challenge, COVID-19 has shifted the priorities of many organisations. In fact, “improving health and safety for employees” is the top strategic goal this year of manufacturing and logistics organisations in the U.S. and U.K., according to research conducted by Forrester on behalf of STANLEY Security. But as we think about reopening and as hybrid workforce models and “workspace-on-demand” approaches rise in popularity, leaders need to consider implementing the right technologies to help ensure a safe return to the office. This means investing in health, safety, and security solutions that can help leaders protect their people. The intersection of security technology and health and safety There’s no doubt that the scope of security has expanded in the wake of the global pandemic. What was once an area governed by a select few security or IT professionals within a business has now become a crucial company investment involving many key stakeholders. The role of security has expanded to encompass a broader range of health and safety challenges for businesses Additionally, the role of security has expanded to encompass a broader range of health and safety challenges for businesses. Fortunately, security technologies have made significant strides and many solutions, both existing and new, have been thrust forward to address today’s biggest business challenges. Investment in security technology It’s important to note that businesses are eager to adopt tech that can help them protect their people. Nearly half (46%) of organisations surveyed by Forrester report that they’re considering an increasing investment in technology solutions that ensure employee safety. Technologies like touchless access control, visitor management systems, occupancy monitoring, and installed/wearable proximity sensors are among some of the many security technologies these organisations have implemented or are planning to implement yet this year. Facilitating a safe return to work But what does the future look like? When it comes to the post-pandemic workplace, organisations are taking a hard look at their return-to-work strategy. Flexible or hybrid workforce models require a suite of security solutions to help ensure a safer, healthier environment More than half (53%) of organisations surveyed by Forrester are looking to introduce a flexible work schedule for their employees as they make decisions about returning to work and keeping employees safe post-pandemic. Such flexible – or hybrid – workforce models require a suite of security solutions to help ensure a safer, healthier environment for all who traverse a facility or work on-site. One of the central safety and security challenges raised by these hybrid models is tracking who is present in the building at any one time – and where or how they interact. Leveraging security technology With staggered schedules and what may seem like a steady stream of people passing through, it can be difficult to know who’s an employee and who’s a visitor. Access control will be key to monitoring and managing the flow of people on-site and preventing unauthorised access. When access control systems are properly integrated with visitor management solutions, businesses can unlock further benefits and efficiencies. For instance, integrated visitor management systems can allow for pre-registration of visitors and employees – granting mobile credentials before people arrive on-site – and automated health screening surveys can be sent out in advance to help mitigate risk. Once someone reaches the premises, these systems can also be used to detect the person’s temperature and scan for a face mask, if needed. We will likely see these types of visitor management and advanced screening solutions continue to rise in popularity, as 47% of organisations surveyed by Forrester report that they’re considering requiring employee health screening post-pandemic. Defining the office of the future A modern, dynamic workforce model will require an agile approach to office management. It’s imperative to strike the right balance between making people feel welcome and reassuring Businesses want to create an environment in which people feel comfortable and confident – a space where employees can collaborate and be creative. It’s imperative to strike the right balance between making people feel welcome and reassuring them that the necessary security measures are in place to ensure not only their safety but also their health. In many cases, this balancing act has created an unintended consequence: Everyone now feels like a visitor to a building. Protocols and processes With employees required to undergo the same screening processes and protocols as a guest, we’ve seen a transformation in the on-site experience. This further underscores the need for seamless, automated, and tightly integrated security solutions that can improve the employee and visitor experience, while helping to ensure health and safety. Ultimately, the future of the office is not about what a space looks like, but how people feel in it. This means adopting a “safety-always” culture, underpinned by the right technology, to ensure people that their safety remains a business’ top priority.
Video surveillance systems are producing more unstructured data than ever before. A dramatic decrease in camera costs in recent years has led many businesses to invest in comprehensive surveillance coverage, with more cameras generating more data. Plus, advances in technology mean that the newest (8K) cameras are generating approximately 800% more data than their predecessors (standard definition). Traditional entry-level solutions like network video recorders (NVRs) simply aren’t built to handle massive amounts of data in an efficient, resilient and cost-effective manner. This has left many security pioneers grappling with a data storage conundrum. Should they continue adding more NVR boxes? Or is there another, better, route? Retaining video data In short, yes. To future proof their video surveillance infrastructure, an increasing number of businesses are adopting an end-to-end surveillance architecture with well-integrated, purpose-built platforms for handling video data through its lifecycle. This presents significant advantages in terms of security, compliance and scalability, as well as unlocking new possibilities for data enrichment. All of this with a lower total cost of ownership than traditional solutions. Security teams would typically delete recorded surveillance footage after a few days or weeks Previously, security teams would typically delete recorded surveillance footage after a few days or weeks. However, thanks to increasingly stringent legal and compliance demands, many are now required to retain video data for months or even years. There’s no doubt that this can potentially benefit investigations and increase prosecutions, but it also puts significant pressure on businesses’ storage infrastructure. Data lifecycle management This necessitates a more intelligent approach to data lifecycle management. Rather than simply storing video data in a single location until it’s wiped, an end-to-end video surveillance solution can intelligently migrate data to different storage platforms and media as it ages. So, how does this work? Video is recorded and analysed on a combination of NVR, hyperconverged infrastructure (HCI) and application servers. Then, it’s moved to resilient file storage for a pre-determined period, where it can be immediately retrieved and accessed for review. Finally, based on policies set by heads of security, data is moved from file storage to highly secure, low-cost archive storage such as an object, tape or cloud. Data is moved from file storage to highly secure, low-cost archive storage Long-term storage This process is known as tiering. It allows businesses to use reliable, inexpensive long-term storage for most of their data, whilst still enabling security pioneers to retrieve video data when the need arises, such as during a compliance audit, or to review footage following a security breach. In a nutshell, it offers them the best of both worlds. Scaling your video surveillance infrastructure can be a headache. Businesses that rely on NVRs – even high-end units with 64 or even 96 hard drives – are finding themselves running out of capacity increasingly quickly. In order to scale, security pioneers then have to procure new boxes. With NVRs, this inevitably involves a degree of guesswork. Should they go for the largest possible option, and risk over provisioning? Or perhaps a smaller option, and risk running out of capacity again? Common management console Security pioneers can easily add or remove storage capacity or compute resources – separately or together As businesses add new cameras or replace existing ones, many end up with inadequate surveillance infrastructure made up of multiple NVR boxes along with several application servers for running other surveillance functions such as access control, security photo databases, analytics, etc. This patchwork approach leaves security pioneers scrambling for capacity, maintaining various hardware footprints, repeating updates and checks across multiple systems, and taking up valuable time that could be better spent elsewhere. By contrast, flexible HCI surveillance platforms aggregate the storage and ecosystem applications to run on the same infrastructure and combine viewing under a common management console, avoiding ‘swivel chair’ management workflows. Plus, they offer seamless scalability. Security pioneers can easily add or remove storage capacity or compute resources – separately or together. Data storage solutions Over time, this ensures a lower total cost of ownership. First and foremost, it removes the risk of over provisioning and helps to control hardware sprawl. This in turn leads to hardware maintenance savings and lower power use. Many security pioneers are now looking beyond simple data storage solutions for their video surveillance footage. Meta tags can provide context around data, making it easier to find and access when needed Instead, they’re asking themselves how analysing this data can enable their teams to work faster, more efficiently and productively. Implementing an end-to-end video surveillance architecture enables users to take advantage of AI and machine learning applications which can tag and enrich video surveillance data. These have several key benefits. Firstly, meta tags can provide context around data, making it easier to find and access when needed. Object storage platform For instance, if security teams are notified of a suspicious red truck, they can quickly find data with this tag, rather than manually searching through hours of data, which can feel like looking for a needle in a haystack. Plus, meta tags can be used to mark data for future analysis. This means that as algorithms are run over time, policies can be set to automatically store data in the right location. For example, if a video is determined to contain cars driving in and out of your premises, it would be moved to long-term archiving such as an object storage platform for compliance purposes. If, on the other hand, it contained 24 hours of an empty parking lot, it could be wiped. These same meta tags may be used to eventually expire the compliance data in the archive after it is no longer needed based on policy. Video surveillance architecture Continuing to rely on traditional systems like NVRs will fast become unsustainable for businesses Even if your organisation isn’t using machine learning or artificial intelligence-powered applications to enhance your data today, it probably will be one, three, or even five years down the line. Implementing a flexible end-to-end video surveillance solution prepares you for this possibility. With new advances in technology, the quantity of data captured by video surveillance systems will continue rising throughout the coming decade. As such, continuing to rely on traditional systems like NVRs will fast become unsustainable for businesses. Looking forward, when moving to an end-to-end video surveillance architecture, security pioneers should make sure to evaluate options from different vendors. For true futureproofing, it’s a good idea to opt for a flexible, modular solution, which allow different elements to be upgraded to more advanced technologies when they become available.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) programme included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of colour, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organisations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorised that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas). Dahua’s presence at the show makes a statement: We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analysed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyse the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE report continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time. ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realised some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system.Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organisation. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customisable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organisation. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyse the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualise it on Security Center maps, leveraging the dynamic visualisation capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localisation system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyse more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. Utilising the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and calibre of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment programme Shot Tracer has launched a reseller recruitment programme with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. The system determines the location of shots fired, the number of shots, and the type In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
In a surveillance monitoring context, video metadata refers to the structured details that the user can extract from given video footage. It is data that provides information about other data – a “data about data” in short. Human-based video metadata, as its name suggests, are data derived from human targets in the monitored scene. It can be utilised based on user’s requirements to significantly enhance the management and operation of various application scenarios, while carefully maintaining people’s privacy at the same time. To give some insights into its practical usage, here are three conventional applications of human-based video metadata to adopt based during monitoring needs: 1) Searching targets One of the most common applications of human-based video metadata is for target searching after an event. Intelligent surveillance devices, such as the Dahua WizMind products, offer a Quick Target Search function that can locate suspects in time using their physical attributes. Irrelevant targets in the captured images are filtered out by the back-end devices (IVSS, NVR) or by the platform Target attributes include beard, glasses, mask, hat, etc., which are continuously being developed and increased to meet the requirements of various application scenarios. Irrelevant targets in the captured images are also filtered out by the back-end devices (IVSS, NVR) or by the platform. It can capture up to 640* targets (with attributes) per second with an impressive detection rate of 98%*. Generating statistics In addition, another useful application of human-based video metadata technology is for target statistics. WizMind counts in real time the human targets in the monitored scene and filters them based on target category and direction. The directions include A>B, B>A, or A<>B. And to top it up, it can also generate reports by year, month, and day. It can capture up to 96** objects per frame, providing a detection rate of 98%** and an accuracy rate of 96%**. 2) Detect PPE wearing WizMind can detect wearing PPEs in construction sites including safety hats, protective vests, face masks, and glasses Wearing personal protective equipment or PPE is a must on any construction site. Depending on the scope of the project, monitoring the proper wearing of PPEs on the site could be a tough challenge to implement. The latest PPE Detection Technology of Dahua WizMind can detect wearing of commonly used PPEs in construction sites including safety hats, protective vests, face masks, and glasses. It can even detect the colour of the uniforms (top and bottom) of workers. When a violation has been detected, the site supervisor or manager can be notified via the DMSS mobile app. Similar to target searching and statistics functions, it also offers a detection rate of 98%**, with an accuracy rate of 96%**. 3) Aid city road planning Who would have thought that aside from vehicle-related data, statistics related to people on the street can also be useful in planning city roads? By collecting attributes of pedestrians, directions, and periods, local road planning departments can design better roads tailored for road users and commuters. One good example is the Dahua solution developed for a local organisation in Ireland. Aside from motor vehicles and non-motor vehicles, metadata of pedestrians are also captured on main city roads and streets around plazas. These data are then securely transferred to an SFTP server for further data analysis. The data summary is relayed to the local transportation department to help them plan and manage streets more efficiently. Key Takeaways Human-based video metadata can be effectively utilised to optimise the monitoring operation of various application scenarios. Metadata based on human targets can be used to search suspects after an event, and to generate accurate statistics of the people in the monitored scene. Also, these structured data can be used to detect proper wearing of PPEs in a particular site, and help local transportation departments in planning and maintaining city roads to benefit the general public.
Starr Corporation, located in American Falls, Idaho, United States, needed a way to track people’s time for time cards for a project that was to last a year long. It contacted Anviz for assistance. The customer, a food manufacturer, saw what they were doing for the construction site and wanted to have all subcontractors use the system, as to date there are 10,000 users and 200 some companies using the system. The challenge: For about a year-long length of the project, who comes to the construction site and who leaves. At any moment pull up a report of who is on-site ordered by the company. There are 200+ contractors and subcontractors on this project. The solution: It organised it so that company was the project name; departments were the various companies working on that project. Key benefits: Accuracy of capturing people and ability of reporting. Comments “The monthly attendance hours that CrossChex Cloud report to me took me 20 minutes to prepare to the bill while it typically takes me 2 hours without it,” said Brad Shroeder Pocatello, Idaho Manager.
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe. Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud. Allowing genuine access via MFA Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting? Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities. This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly. Need for secure and accurate user experience The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over. Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020. "The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Access control readers ACT365 has a modern and user-friendly design and a limitless number of users ACT365’s readers were well-suited to this installation because they are made of a robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. Self-service terminal For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
The Royal United Hospitals Bath NHS Foundation Trust is the latest healthcare site to benefit from Triton², a patented, high-security master key system from ASSA ABLOY, delivering assured security and key control. The Trust’s Royal National Hospital for Rheumatic Diseases and Brownsword Therapies Centre is a key facility to take advantage of the Triton² system. Opening in 2019 at the main Royal United Hospitals site in the Weston area of Bath, the Centre is an outpatient facility providing treatment, care, and education to those recovering from episodes of illness or injury, or who need help managing long-term conditions. With services covering rheumatology, therapies, and pain management, the Centre includes clinic and treatment rooms, a gym, hydrotherapy pool, an assessment and teaching kitchen, bathroom and bedroom, Skype clinic room, and education rooms for forums and classes. Secure and reliable key management The Triton² master key system has also been installed in the Bernard Ireland House residential building, which offers specially-designed accommodation for patients, with facilities including group treatment areas, office space, and a dedicated therapeutic courtyard area. Triton² provides a safe, secure, and reliable means of key management for both the residents and staff, so they can focus on delivering the highest standards of care to patients. Triton² provides a safe, secure, and reliable means of key management for both the residents and staff When searching for a suitable master key system for these buildings, the Trust had a wide range of requirements that needed to be satisfied. Hospitals and healthcare estates typically have large and complex key demands, because of the high number of staff employed, the variety of areas requiring different levels of access rights, and the fact that security and safety must not be compromised. Hierarchy of security access Fortunately, Triton² was ideally suited to meet the Trust’s needs. Supplied and installed by local distributor Gemsec, the platform raises security standards by ensuring employees have different levels of security access based on their roles, significantly reducing the risk of unauthorised access and security breaches. A hierarchy of access rights means no matter what an individual’s role at the site – whether it’s a general manager, doctors and nurses, tenants, porters, and so on – all have access to only the areas they need. And within each type of role, large availability of differs ensures access rights can be personalised to meet an individual’s exact requirements. The Trust’s estates team then has a master key, and there is a grandmaster key that sits above this that can access all areas. The system helps simplify key management too; a member of staff can access a range of rooms and areas from a single key, rather than having to carry around a collection of them. Furthermore, the fact that one key can open several locks means fewer duplicates are needed. Should there be a security breach, it’s easy to identify who has access to a particular area and ensure the appropriate action is taken. Patented key protection Keys can only be cut by registered dealers, maintaining a high level of security should a key ever be misplaced One of the key features of Triton² is its long-lasting patent protection. Guarding against unauthorised and 3D key copying, Triton² is patented until 2036 for guaranteed peace of mind. Keys can only be cut by registered dealers, maintaining a high level of security should a key ever be misplaced. With built-in anti-pick, anti-pull, anti-drill, and anti-bump protection, the system’s cylinders exceed the requirements of BS EN 1303:2015, meeting the highest standards for physical security. The platform has also been fire tested in line with BS EN 1634-1:200, and so is suitable for use on 30- and 60-minute timber fire doors. Easy and efficient future-proof solution Anthony Green, Senior Estates Officer at Royal United Hospitals Bath NHS Foundation Trust, said: “We’ve been so impressed with the Triton² master key system from ASSA ABLOY that we’re now planning to review the rest of the estate in line with the capabilities of the platform, to roll it out to other facilities across the site.” “The system delivers an assured future-proof solution. The Gemsec team has been a big help in ensuring we consider all likely events, as we continue to redevelop and expand the hospital site so that Triton² can meet any possible needs.” “Even simple considerations, such as the fact that Triton² is available with a comprehensive range of cylinder profiles to suit every type of lock case, help us save money in the long run by making sure we would not have to install new lock cases if we were to expand the system to existing buildings across the site. Secure and practical key management “ASSA ABLOY’s Triton² is so impressive because it perfectly meets the complicated key needs of a healthcare site such as ours, but does it in such an intuitive, efficient, and easy to manage way.” Craig Birch, Head of Product Management at the ASSA ABLOY Door Hardware Group, adds, “With long-life patent protection and 1.5 billion different master keying combinations, Triton² delivers a secure and practical key management solution, built to last. For the Royal United Hospitals Bath NHS Foundation Trust, Triton² offers a highly secure and durable master key platform.”
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its approach to building security. Avolon was looking for an innovative, flexible solution that could be personalised to individuals, easily accessed, and managed remotely. Additional requirements included: the need to provide different levels of security clearance in different areas of the building, the ability to manage individual security clearances, the facilitation of access outside of the usual workday, and secure parking lot access for employees and visitors. As a global company, Avolon wanted a solution that could be deployed worldwide to provide a consistent experience for its employees, regardless of their location. HID’s flexible access control solution Powered by Seos® technology, the solution uses BLE and iCLASS® readers to create a secure access control solution Avolon partnered with systems integrator Summit Security Systems Ltd and deployed HID Mobile Access at its Dublin headquarters. Powered by Seos® technology, the solution uses Bluetooth Low Energy (BLE) and iCLASS® readers to create a secure, convenient, and flexible access control solution for its headquarters. The building’s security system enables credentials on smartphones via an app rather than on physical access cards and uses iCLASS SE® mobile-enabled readers installed at points of access. Key benefits of a mobile access system include: Employees are less likely to forget smartphones, which they always carry than an access badge Security clearances are more efficient and easily changed because security status is provisioned to an app A cloud-based central control system provides security administrators with easy oversight, access to a complete set of metrics, and the ability to manage a network of premises around the globe Employing various access control measures Avolon has implemented a range of different solutions for different parts of its premises that can vary by time of day. For example, elevators utilise access control measures to ease the flow of people within the building during work hours, while assuring that after-hours access is more controlled. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry The ease-of-use and security also extend to the parking lot, which benefits from HID’s “Twist and Goes” feature. Employees simply twist their iOS or Android™ phones when they approach the parking readers to gain entry. Avolon encourages its employees to cycle to work and has extended mobile access to a secure employee bike parking area that links directly into the shower and changing facilities. Advantages of mobile access solution The HID Mobile Access Solution provides many advantages over the previous card-based system including after-hours access (vital to a 24/7 business like Avolon), ready access to secure rooms, and easy management of security clearances. With HID Mobile Access, fine-grained security access for a global network of offices is controlled centrally through a cloud-based portal. Access levels can be set on an individual basis so they are very flexible and can be modified as needed. “Using a mobile phone is much more convenient than access cards. People forget their access cards, but their mobile phone is with them all the time,” said Allan Dawson, facilities project manager at Avolon. “It’s much more efficient. For example, we now have much lower instances of people leaving the perimeter and having to ask for re-entry because they’ve left their pass in the office.” Worldwide installation of physical access solution In the future, Avolon anticipates expanding its new physical access solution across its global campuses. “As well as deploying in our Dublin head office we have also deployed in our New York, Florida, and Hong Kong offices,” said Dawson. “The benefit of using a global platform means our people can travel between offices with their security status intact and ready to go for each location.”
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download