HENSOLDT, the independent sensor solutions supplier, is presenting its wide range of sensor technologies at this year’s International Defence Exhibition (IDEX) in Abu Dhabi. For the first time, HENSOLDT will present its newly developed PrecISR airborne multifunction radar, as well as the extended portfolio of its Xpeller counter-UAV system. You can obtain further information at the HENSOLDT stand in Hall 9, booth B-18.
“We are interconnecting all essential sensor technologies to provide our customers with information superiority at any time,” said HENSOLDT CEO Thomas Müller. “We thus create the basis for decisions of political leaders and military commanders, while also contributing to the success of a mission and protecting soldiers in operations.”
Surveillance of sea and coastal areas
PrecISRTM's superior precision and target accuracy make it the sensor of choice for surveillance of large sea and coastal areas against piracyThe software-defined airborne radar named PrecISRTM (derived from ‘precise’, pronunciation: ‘priˈsaiser’) translates latest achievements in active array and digital receiver technology into a scalable high-performance sensor which can be installed aboard helicopters, UAVs and fixed-wing mission aircraft. Its superior precision and target accuracy make it the sensor of choice for surveillance of large sea and coastal areas against piracy, trafficking or illicit intrusion.
Together with this airborne radar, HENSOLDT is displaying its latest developments in land-based and naval radar. The TRML-4D is a land-based multifunctional radar ensuring rapid detection and tracking of approximately 1,500 targets in a radius of up to 250 km and at an altitude of up to 30 km. It uses the latest AESA radar technology (AESA = Active Electronically Scanned Array), which enables the acquisition of targets after just one rotation of the antenna, thus improving the response time and hit probability.
Supports anti-air and anti-surface operations
The naval radar TRS-4D belongs to the same product family. It is designed to support anti-air and anti-surface operations. Its rotating antenna combines mechanical and electronic azimuth scanning to achieve fast generation of target tracks. TRS-4D is available both in a rotating variant and another with four fixed arrays.
HENSOLDT shows its ARGOS-II HD multi-sensor system to be used for intelligence, surveillance and reconnaissance (ISR) missions from the air
The rotating variant is currently being installed onboard the US Navy’s ‘Freedom’ class Littoral Combat Ships while the non-rotator is delivered to the German Navy’s F125 frigates. It comes together with the SharpEye naval radar which provides the world’s navies and coast guards with surface search, navigation and helicopter control capabilities.
TwInvis, Xpeller and ARGOS-II systems
Furthermore, HENSOLDT is presenting its TwInvis passive radar which analyses the echoes of signals from radio or TV stations, so as to create a recognised air picture (RAP) within a radius of more than 200 kilometres in real time. Another exhibit to be seen is the Xpeller counter-UAV system, whose mission is to detect small drones, so as to protect critical infrastructure, large events or military facilities.
In addition, HENSOLDT shows its ARGOS-II HD multi-sensor system to be used for intelligence, surveillance and reconnaissance (ISR) missions from the air. It can be equipped with high resolution HD infrared and daylight cameras as well as with laser rangefinders and laser designators.
MILDS self-protection sensor
The MILDS self-protection sensor for helicopters and wide-body aircraft detects attacking missiles and initiates countermeasuresThe MILDS (Missile Launch Detection System) self-protection sensor for helicopters and wide-body aircraft detects attacking missiles and initiates countermeasures. It is a passive imaging sensor detecting the UV radiation signature of approaching missiles.
It enhances considerably the protection against anti-aircraft missiles such as shoulder-fired infrared-guided missiles. It has proven itself in operational use as the standard missile warning device on helicopters and transport/mission aircraft world-wide, including Tiger, NH90, CH-53, CH-47 and C-130.
Vanderbilt, the global provider of state-of-the-art security systems, has announced that the award-winning SPC system has been accredited to the NF A2P Cyber-RTC cybersecurity standard from the CNPP.
The SPC intrusion system was tested by CNPP to ensure that it meets the latest needs for cybersecurity. This is part of Vanderbilt’s continuous endeavour and commitment to work with approval bodies to ensure both the best-in-class security and the confidence that your security system is secure.
Security for remote monitoring transmissions
Using the FlexC protocol to communicate with AES256-CBC encryption, the communications between SPC and other system are secure and protected"By certifying our SPC intrusion ranges on the latest CNPP NFA2P at Cyber Type 2 and 3 repositories, Vanderbilt provides all its customers with high-level security for all remote monitoring transmissions, as well as for cloud applications such as our service SPC Connect to combine user-friendliness, availability, and security,” says Hervé Houy, Vanderbilt Country Manager for France.
SPC, an IP-ready intrusion alarm system, has been designed with communications and security at its core. Using the FlexC protocol to communicate with AES256-CBC encryption, the communications between SPC and other system are secure and protected. This communication also allows for flexibility using the SPC user models.
Secured data and communications
The rights and permissions of users protect the user and the system from malicious attacks. Customers can use the system with confidence whether they are on-site or using the SPC Connect to enable cloud services. Their data is secure, and communications are protected.
Vanderbilt has been working with CNPP for many years to ensure the quality of intrusion products for the French market
Vanderbilt has been working with CNPP for many years to ensure the quality of intrusion products for the French market. This innovative step by the approval body to have a defined standard for cyber is a clear indication of the path of security systems. As the cloud becomes an element of security, we move forward with confidence in working with partners like CNPP and ANSSI.
"The market is flushed with cybersecurity standards, but the NF cybersecurity standard from CNPP is the first specifically developed for intrusion alarm systems. It is a great way to benchmark and improve our SPC intrusion systems,” concludes Nick Pegtol, Vanderbilt’s Country Manager for Benelux, Greece and Cyprus.
OPTEX Corporation Ltd, global sensor manufacturer, has launched a new series of outdoor PIRs in EMEA (Europe Middle East and Africa) and in South and North America that offer 180° detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building.
Outdoor intruder detection sensors
The WX Infinity series comprises two wired and two wireless models available either as the standard or anti-masking version. The new models are built upon OPTEX’s extensive track record in providing outstanding sensing performance for outdoor intruder detection applications, while the wide (180°) detection area coverage brings a new feature that is ideal for protecting larger residential grounds.
Outdoor warning technology can help prevent crimes by detecting and reporting intruders before they attempt to break into a building"
“Outdoor warning technology can help prevent crimes by detecting and reporting intruders before they attempt to break into a building,” says Hiraku Shibuya, Section Chief, Sales and Marketing Department, Security Division at OPTEX Global Headquarters. “Early intrusion detection is what OPTEX has been focusing on for the last 40 years by delivering an extensive line-up of outdoor intruder detection sensors that provide reliable outdoor security.”
Two 90° 12m/40ft detection areas
The WXI sensors can provide two, independent 90° 12m/40ft detection areas, one for the left side and one for the right. The detection distance ranges from 2.5m (8ft) to 12m (40ft), and the sensitivity and alarm output can be set up independently for these left and right areas. For instance, the left output can trigger for a simple awareness alarm while the right-side output prompts CCTV camera system to set an event index.
A patent pending area-masking shutter allows a sliding mechanism to quickly mask an area and makes the detection area narrower to avoid obstructions such as swaying vegetation. The set-up procedure has been made easier by including an automatic walk test mode to ensure a quicker and more accurate installation.
WXI motion sensors
All WX Infinity models feature a tamper-proof back panel to detect if anyone is attempting to move the sensor from the wall
The WXI motion sensors benefit from OPTEX’s sensing analytics that filter out noises that are common in outdoor environments, and also distinguishes between humans and small- to medium-sized animals thanks to its Super Multidimensional Analysis (SMDA) logic.
The sensors also include temperature compensation and double conductive shielding to ensure best performance in sunny and hot outdoor environments. The selectable pulse count also has the option to enhance the sensor sensitivity when needed.
All WX Infinity models feature a tamper-proof back panel to detect if anyone is attempting to move the sensor from the wall, and the anti-masking models (WXI-AM/ WXI-RAM) will alert when anyone tries to cover the lens to block its view.
180° outdoor PIR sensor series
“We are pleased to bring our first 180° outdoor PIR series to the market that complements our existing 90° and curtain sensor range,” adds Hiraku Shibuya. “We first presented the first WXI models at Securex in South Africa in May 2018 and had a fantastic response from installers. We are now in a position to roll out the complete WXI series across the whole European and African and Middle East (EMEA) region, as well as in North and South America.”
Ideal for low light conditions, Matrix Professional Series Audio enabled compact IP Cameras are built using superior components such as Sony STARVIS sensor to offer unmatched image quality.
This 2MP IR Dome Camera with 3.6mm lens is powered by True WDR to offer consistent image quality with built in intelligent analytics including Intrusion Detection, Trip Wire, etc. to ensure real-time security. Additionally, it also provides features like H.265 compression technique and automatic motion based frame rate reduction to save bandwidth and storage up to 50%.
Features of camera
The Dark Observer - Sony STARVIS Series Sensor - Crystal Clear Night Vision, Colour Images at 0.08lux
High Efficiency Video Coding - H.265 Compression Technology - Save Up to 50% Of Storage Space
Vision Adaptive - True WDR 120db - Best Image Quality even in Varying Light Conditions
Capture More - Wider Field of View - 90ᵒ Horizontal Field of View
Versatility - Adaptive Streaming - Record More Frames During Motion, Less During No Motion
Analytics- Real-time Security - Intrusion, Motion Detection, No Motion, Trip Wire
Certification- BIS, IP66 CE, FCC, IK10
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains.
User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day.
Ensuring safe access
Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet.
It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest.
After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover
Importance of data protection
So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance?
After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit.
Cloud security risks
Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices
According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months.
According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD).
According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected.
Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine
In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe.
Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords.
Users expect organisations to protect their passwords and keep intruders out of their accounts
Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure.
Securing data with simplicity
Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service.
Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks.
So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users.
Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so
While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance.
Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so.
Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters.
The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity.
Significant public safety
Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety
While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018.
Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism.
Massive risk reduction
Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers.
Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks
Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream.
Promising detection systems
The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations.
2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants
2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact.
Cyber risk profile
The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions.
The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%.
The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access).
5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity
Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018.
Perimeter intrusion detection
One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry.
Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR
The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR.
Security ecosystem members
Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts.
At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised.
With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running.
According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system
Educating the smart home consumer
Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app.
Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities.
Smart technology is increasingly becoming the new norm in terms of home security
Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace.
Secure homes through smart technology
Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out
If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door.
It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course.
In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi.
"Smart" security on the move
The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change.
Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door
A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock.
Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore
Holiday rentals and smart home tech
ASSA ABLOY research published in 2017 forecasts continued growth in the European holiday rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travellers.
A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built holiday rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. Travellers use their phones and an app to unlock their apartment.
For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc.
Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2.
Adapting existing hardware
Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market.
AI software can even add learning capabilities by adapting existing hardware to AI applications
AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field.
Data capture form to appear here!
Detect anomalous data
Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions).
IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event.
The ability of deep learning for video analytics is much more sophisticated and accurate
Make critical decisions
Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets.
AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions.
Multiple camera streams
AI can reduce information overload to enable humans to work with the data more efficiently
The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour.
Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there.
Intrusion detection scenario
AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images.
In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm.
Part three coming soon. If you missed part one, see it here.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event.
Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show?
Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience.
Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience
Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham.
We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split.
Q: What conference programming is being planned to augment the trade show event?
Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights.
All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks.
Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer
Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC?
Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors.
Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally
Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website.
The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer.
Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor?
Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far.
We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward.
The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman
Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept
Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc.
We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event.
Q: How would you expect/hope the show would continue to evolve in coming years?
Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)?
In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day?
The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings.
Scarce resources on preventative measures
The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments.
The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything
Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorises another $25 million for improvements to school’s physical security infrastructures.
Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns.
But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything.
More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process
Studies on school safety and protection
Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them"
A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.”
Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.”
The effects on our students
Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence
Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they?
At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage.
Wide area monitoring
The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement.
The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time.
Matrix IP bullet and dome cameras
To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security.
For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage.
Centralised surveillance solution
Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement.
Centralised control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time.
Low light images for enhanced security
Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brandsTo cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security.
For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
24x7 Real-time Surveillance
Higher Security with Intelligent Video Analytics
Grafisch Lyceum Utrecht (GLU) is a creative and safe school that specialises in various multi-media disciplines as well as communications, media management and marketing. With approximately 2,100 students, GLU is located in Utrecht, The Netherlands and as at any education establishment, the protection of its staff and students is of paramount importance, which saw the school first implement a surveillance system in its new main building in 1998.
Unobtrusive video surveillance
In 2004, following several burglaries over the previous four years, Sead Hafizovic, GLU’s Safety and Security Supervisor identified the need to upgrade security provisions. The current surveillance systems consisted of five analogue cameras connected to a video recorder that required the changing of video tapes daily, and Hafizovic recognised this was no longer fit for purpose. Located across two facilities in Utrecht, GLU’s the main building in Vondellaan features glass walls and multiple access points giving the school an open and creative feel that Hafizovic wanted to maintain, making the need for unobtrusive security measures an important factor.
Following a thorough assessment by both GLU and Trigion, a mix of 30 IDIS analogue cameras together with motion detectors were implementedHafizovic turned to trusted partner Trigion, a systems integrator responsible for all the school’s security measures encompassing intruder, access control and video surveillance. Acting as an advisor, Trigion was tasked to find the most effective surveillance solution that would meet the security and performance needs of the school, while having the flexibility to scale and adapt as security and operational requirements changed.
Migration from analogue to HD IP surveillance
Following a thorough assessment by both GLU and Trigion, a mix of 30 IDIS analogue cameras together with motion detectors were implemented. The new security system proved incredibly effective in reducing crime as well as health and safety incidents and was gradually extended over the next ten years to include cameras in all strategic locations.
In 2013, the GLU went about updating the school’s security policy to include the use of cameras and their related images. While working alongside Trigion to develop the policy, Trigion advised GLU to make the move from analogue to high-definition IP to vastly improve performance and thereby further increase safety and security. Since the existing IDIS system was still reliably operating, GLU needed to be convinced of the investment.
IDIS HD IP cameras and NVRs
GLU was operating a mix of IDIS analogue and HD networked cameras connected to IDIS NVRs all seamlessly managed through IDIS Center
Trigion first installed two networked HD cameras next to the existing surveillance system. Both systems could be viewed easily through IDIS Center, totally cost-free video management software (VMS). The improved performance in terms of crisp picture quality, fast retrieval of footage and the easy and rapid installation quickly convinced GLU to implement a phased upgrade from analogue to IP. By 2014, GLU was operating a mix of IDIS analogue and HD networked cameras connected to IDIS network video recorders (NVRs) all seamlessly managed through IDIS Center, providing a high performance, centralised monitoring capability.
Since implementation the number incidents of internal theft, harassment, fighting and drug taking has reduced to almost zero—a measurable result Hafizovic is very proud of. The security policy has been shared with students and they fully understand their rights and obligations when it comes to the use of surveillance in the school and the importance of personal safety.
Adapting to safety and security provisions
The innate flexibility and backward compatibility of the IDIS solution allows GLU to continuously improve and adapt safety and security provisions, effectively enabling the school to upgrade to next generation IDIS technology when it comes online and integrate with other systems as required.
In 2015, GLU was voted the third best school in a nationwide survey, in which GLU scored top in the areas of safety and security. Later the same year, the King of The Netherlands, Willem Alexander and Jet Bussemaker, the Dutch Minister of Education, Culture and Science visited GLU to witness its achievements for themselves, proving a proud day for GLU staff and students.
Control and instrumentation specialist, CMR Philippines, has won undisclosed contract to supply and install advanced building management, CCTV and fire detection and alarm systems at one of the South East Asia’s pharmaceutical manufacturers.
The work, undertaken at Unilab Pharmaceuticals’ new oral medicines and capsules Delta Amherst plant production plant in Laguna, Binan, sees the design and installation by CMR of facility-wide Siemens Apogee BMS, Siemens Cerberus FDAS and Hikvision CCTV systems.
The advanced computer-based BMS system will be used to control and monitor the 22,000 sq. ft plant’s mechanical and electrical installations and equipment such as ventilation, lighting and power systems.
CMR is also providing engineering and testing services as part of a comprehensive package of technical support
CMR is also providing engineering and testing services as part of a comprehensive package of technical support, which covers the installation, programming and commissioning of advanced CCTV and FDAS capabilities. The systems will provide improved safety and security for Unilab employees working at Laguna as the manufacturer looks to expand its capabilities through new investment in state-of-the-art manufacturing and production facilities.
Critical operational requirements
Unilab produces a wide range of prescription and consumer health products covering all major therapeutic segments. Many of these products are sector brands across the Philippines, Indonesia, Thailand, Malaysia, Singapore, Hong Kong, Vietnam, and Myanmar. Rojel Rivera, general manager at CMR PH, said: “We are a valued and trusted supplier to Unilab and other regional manufacturers, providing cost effective and precision engineered system-based solutions.”
“We are building a strong reputation as a first-class supplier to customers such as Unilab, who are looking for technologies to meet critical operational requirements, alongside high levels of reliability and performance in demanding production environments.”
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?