Network / IP security
GRAU DATA has announced the general availability of Blocky for Veeam, which protects Veeam backups by denying any file access from unauthorised application processes, amid heightened demand for protection from increasingly sophisticated malware attacks. More sophisticated and targeted malware attacks combined with work from home as a new normal, has opened a vulnerability when it comes to IT security, particularly within midmarket companies. Whereas in the past, businesses could count on restor...
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, has announced the launch of its new high definition Wisenet X PTZ PLUS cameras. Available immediately from Hanwha’s extensive network of resellers and systems integrators, the new cameras feature AI-based object tracking, precise PTZ control, improved pre-set accuracy, adaptive IR illumination and enhanced cyber security. Designed for perimeter protection and large, open area applications such as ai...
Michael Fogelman, retired Master Chief U.S. Navy SEAL with 32-years of special operations experience, will spearhead the new division, concentrating on military and law enforcement contracts. SENTRY Products Group, a renowned manufacturer and distributor of products focused on the military, law enforcement and shooting sports markets, is proud to announce the launch of the new Special Operations Division and the hiring of retired Navy SEAL Master Chief, Mike Fogelman, to grow military and law e...
DMP releases its new line of alarm communication radios that are FirstNet Ready™ and approved for use on FirstNet®. FirstNet is built with AT&T in a public-private partnership with the First Responder Network Authority and is the only nationwide, high-speed broadband communications platform dedicated to and purpose-built specifically for America’s first responders and the extended public safety community. It’s the solution to decades-long interoperability and communica...
Boon Edam Inc., a global renowned supplier in security entrances and architectural revolving doors, has published a new whitepaper for architects and security professionals entitled, ‘The New Lobby: How Will Securing Buildings Change in a Post-Pandemic World?’ Physical security plan The publication begins by explaining the importance of creating a physical security plan that addresses and controls unauthorised entry due to tailgating, and continues with discussions around how COVID...
The Physical Security Interoperability Alliance (PSIA) has announced that it has elected Jason Ouellette, as its Chairman and Ewa Pigna, the Chief Technology Officer for LenelS2, a part of Carrier Global Corporation, as its Vice Chairman. Standards-based digital data In addition, Peter Boriskin, the Chief Technology Officer for ASSA ABLOY Opening Solutions Americas, will continue in his role as the organisation’s Treasurer. The PSIA membership develops specifications for enabling standar...
Globally renowned access control manufacturer, Inner Range is offering customers the ability to identify close contacts of anyone displaying symptoms of COVID-19 or other infectious diseases, by generating detailed reports of where the infected person has been and who else has been near them. Contact tracing The contact tracing report can be generated and shared quickly and easily. It can show which doors an infected user has passed through, how much time they spent in each area, what time they badged a reader and which other users were near them, up to 15 minutes before the infected person arrived and 60 minutes after they left the area. Furthermore, the report is completely customisable and multiple variations can be saved to ensure operators have what they need for a range of requirements. Inner Range General Manager, Tim Northwood, said “Organisations around the globe are struggling with the challenges raised by the COVID-19 global pandemic. One way in which Inner Range can help address some of these issues is by assisting organisations to design safer work environments for their staff and customers.” He adds, “The company also aims to provide a robust contract tracing report will help organisations quickly identify users who could be at risk and interrupt the spread of infection.” Integriti integrated access control system The contact trace report is available via Inner Range’s intelligent integrated access control and security system, Integriti, for customers using Integriti Business and Integriti Corporate software editions. The reports can be generated and displayed directly within Integriti and displayed on the operator’s screen in a user-friendly format. The report can be saved in PDF, Excel, CSV, Text, Image or RTF formats along with more advanced options such as generating HTML, or creating everything needed for a MHL single page website. Specific access permissions and area counting features Inner Range access systems can provide specific access permissions for each area of a building In addition, Inner Range access systems can provide specific access permissions for each area of a building and include area counting to monitor and limit the number of users in a particular area. This is available for Enterprise-level Integriti as well as Inner Range’s Entry-level system, Inception. Occupancy thresholds can be set for a whole building, specific area, individual offices or rooms, car parks and lifts. Once the level is reached further users’ permissions are suspended until the occupancy count has a spare space. Real-time monitoring and alerts All information about occupancy can be transmitted to the site health and safety manager for real-time monitoring and alerts. A report can be run at any time to confirm the occupancy status of any designated area. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres, pharmaceutical companies, government and critical national infrastructure.
IDS is now offering more than 20 new C-mount lenses. Thanks to lens resolutions of 5, 8 and 10 MP as well as different focal lengths and optical classes, they can be used in numerous application scenarios. In addition, they are characterised by a very good price-performance ratio. With these features they fit seamlessly into the "It's so easy!" product philosophy of the company. "When implementing image processing applications, it is not only important to choose the right camera, the lens also has a decisive influence on the image quality," explains Jürgen Hejna, Product Manager at IDS. Focal length, resolution and aperture, for example, must be taken into account. Industrial camera manufacturer The lenses are suitable for different sensor sizes (from ½ inch to 1.1 inch) and allow focal lengths of 4mm to 75mm depending on the model. The aperture and focus can be fixed mechanically if required. This ensures that brightness and image quality remain constant even if the lens is exposed to vibrations, for example. An additional set of screws is included in each delivery. The new lenses not only meet high demands on optical quality, but are also more than competitive in terms of price. For our customers, this means that they receive all components from camera to lens from a single supplier" "For our customers, this means that they receive all components from camera to lens from a single supplier - and in the usual high IDS quality," says Hejna. The lenses can both be obtained from the company’s webstore where a configurator helps select the right model or via the local IDS sales representative. The industrial camera manufacturer IDS Imaging Development Systems GmbH develops high-performance, easy-to-use USB, GigE and 3D cameras with a wide spectrum of sensors and variants. Image processing platform The almost unlimited range of applications covers multiple non-industrial and industrial sectors in the field of equipment, plant and mechanical engineering. In addition to the successful CMOS cameras, the company expands its portfolio with vision app-based, intelligent cameras. The novel image processing platform IDS NXT is freely programmable and extremely versatile. Since its foundation in 1997 as a two-man company, IDS has developed into an independent, ISO-certified family business with more than 300 employees. The headquarters in Obersulm, Germany, is both a development and production site. With branches in the USA, Japan, South Korea and UK as well as other offices, IDS is represented internationally.
Most business today is conducted at the edge, with employees working from home on vulnerable, often personal, endpoint devices. As the amount of sensitive corporate data accessed by devices out of an organisation’s control grows, so does the attack surface that the IT team must safeguard. In response to this complex reality, Acronis announced the development of an integrated solution for managed service providers (MSPs) designed to enhance the protection of their clients’ Citrix Workspace assets, no matter where they sit. Citrix is driven to deliver a consistent work experience, free from complexity and distractions, that enables employees to perform at their best. Intelligent digital workspace And solutions like Citrix Workspace - the secure, intelligent, and high-performing digital workspace that enables greater employee productivity and engagement - have become critical, as two-thirds of all employees have reportedly switched to remote work in the wake of the COVID-19 pandemic. The challenge for organisations is countering the dramatic increase in sophisticated cyberattacks The challenge for organisations is countering the dramatic increase in sophisticated cyberattacks targeting remote workers whose home systems and networks are rarely as resilient as office environments. Compounding that challenge: New research reveals 47% of remote workers worldwide report a lack of guidance from their IT teams on working remotely. That combination leaves them vulnerable to attacks that not only hurt their productivity, but also put valuable company data and systems at risk. Cyber security capabilities “Providing a consistent experience that is secure and reliable for employees, regardless of where they are working, is critical to keeping them engaged and productive,” said PJ Hough, EVP, Chief Product Officer, Citrix. “Through Acronis’ integration with Citrix, companies can provide comprehensive cyber protection that enriches the security of virtual apps and desktop users without getting in the way of their experience, and ensure their assets and data are protected now and into the future.” The integration of Acronis Cyber Protect with Citrix Workspace, made possible through the APIs and SDKs of the Acronis Cyber Platform, adds advanced cyber security capabilities that enhance Citrix’s existing privacy and security measures. Comprehensive cyber protection As a result, the VB100 certified antimalware solution secures endpoints with real-time protection that uses AI-based static and behavioural heuristic, on-demand antivirus, antiransomware, and anticryptojacking technologies to prevent direct attacks against the Citrix Workspace app. Given the increased sophistication of modern cyberthreats, any access point can be vulnerable to malware attacks that can destroy or alter files and inject malicious code. Without adequate cyber protection, a successful attack on a virtual desktop can put the entire environment at risk Without adequate cyber protection, a successful attack on a virtual desktop can put the entire environment at risk. Once the first client machine is compromised, the infection can move laterally across the network, encrypting data on other machines and leaving the target company open to devastating downtime and lost revenue. Comprehensive cyber protection unites data protection and advanced cyber security in one solution, which delivers a proven defence against such modern threats. Advanced antimalware technology Developers and independent software vendors (ISVs) can enhance their solutions using the APIs and SDKs of the Acronis Cyber Platform. By integrating with Citrix, Acronis Cyber Protect delivers a cohesive and cost-effective solution that enables MSPs to protect virtual desktop environments from direct attacks. Its advanced antimalware technology uses kernel-level drivers to protect files and registry entries from modification, while preventing the injection of malicious code. This integration is the first of several capabilities Acronis has planned to support Citrix solutions, with four additional enhancements being planned for early 2021. Among the features MSPs will soon see available are: Agentless Antimalware Protection for Virtual Machines: Other agent-based antimalware protection tools on the market require their technology to run inside each virtual machine in the environment, resulting in both greater complexity and consumption of resources. Acronis plans to integrate Acronis Cyber Protect directly with Citrix’s virtual apps and desktops solutions, which will reduce complexity and cost while streamlining resource consumption. Antimalware Protection for User Profiles: As the frequency and effectiveness of ransomware attacks increase, 50% of companies worldwide report experiencing cyberattacks at least once a week. Countering those attacks requires a proven solution, and testing by independent cyber security labs such as AV-Test and Virus Bulletin shows that Acronis Cyber Protect’s antimalware detects 100% of the latest malware attacks with zero false positives. Agentless Backup for Citrix Hypervisor: Most backup tools run a full-size agent inside each virtual machine, increasing the complexity of the overall system, as well as the resource consumption on the virtualisation host. Acronis’ agentless backups for Citrix’s virtualised environments provides a more efficient way to capture backups by decreasing RAM/CPU consumption up to 10-times -significantly reducing the time it takes to manage multiple backup agents per virtual machine. Continuous Data Protection for User Profiles: Throughout the workday, employees can make unintended changes to their data, such as accidentally deleting important files. This kind of data loss not only affects the individual user’s productivity, the entire business can suffer as a result. Using continuous data protection technology, the Acronis Cyber Protect agent tracks and backs up every change in user files. Its intuitive interface enables a user to revert files to the latest point in time in a transparent manner, ensuring employees and businesses stay productive. Integrating cyber protection “In this day and age, the need to bring user-friendly, comprehensive cyber protection to virtual desktop environments is more critical than ever,” said Serguei “SB” Beloussov, Founder and CEO of Acronis. “Working with partners like Citrix to develop and deploy integrated technologies is the key to ensuring businesses can survive and thrive in the COVID-19 era - and well beyond.” To learn more about the benefits of deploying Acronis Cyber Protect with Citrix Workspace, readers may visit the company’s official website. MSPs interested in strengthening the security of their Citrix Workspace client can try Acronis Cyber Protect for themselves with a 30-day trial. Any developer or ISV interested in integrating cyber protection into their solutions can learn more about the Acronis Cyber Platform on Acronis’s official website.
Overview Ltd, renowned UK developers of high-precision, sensor and camera positioning technology, this week announced the release of their Hydra 3000 series of rugged PTZ surveillance cameras which offers a range of enhanced features. The Hydra 3000 has been designed to support operation in harsh, outdoor environments. Incorporating the same quality build synonymous with Overview’s existing Hydra family of high-performance Pan-Tilt-Zoom (PTZ) camera platforms, Hydra 3000 combines aesthetic design in a rugged housing, manufactured from die-cast aluminium. Unobtrusive surveillance feature Pan and tilt are driven directly, without intermediate belts or gears, by Overview’s Servotorq Integrated Servo Motors to give an unrivalled level of positional accuracy and repeatability, as well as ultra-smooth and silent motion. Fitted with a 2MP, HD optical 30x zoom camera module and IP video encoder, the Hydra 3000 features include digital I/O, a built-in wiper and automatic defogger. The Hydra 3000 has been specifically developed to allow for its unrestricted deployment worldwide The combined, intelligent illumination option delivers adaptive zoom lighting, with a range of up to 200m and the new automatic IR illumination feature enables unobtrusive surveillance during night-time conditions. Designed and assembled in the UK, the Hydra 3000 has been specifically developed to allow for its unrestricted deployment worldwide. The Hydra 3000 has also been designed to provide easy installation. High-quality surveillance solution Its simple two cable connectivity, plus a range of brackets and mounts make installation straightforward in a wide range of environments. Overall, the Hydra 3000 represents exceptional value to the end-user, delivering military performance at a commercial cost, with very long life and low cost of ownership. It offers an extremely reliable, robust, and high-quality surveillance solution for security applications that demand the best performance, regardless of the environment, including industrial plant, marine, petrochemical, and public sector agency applications.
‘Making things easier’ – Under this maxim, the Panomera multifocal sensor systems by video technology manufacturer, Dallmeier have guaranteed maximum image and analysis data quality with minimum camera units for ten years now. The latest generation of the Panomera S-Series features a completely new design and offers numerous innovations, from the one-man mounting concept to contactless front glass cleaning, and above all, superior video analysis capabilities. Panomera multifocal sensor systems Panomera multifocal sensor systems combine a total overview with multiple detailed zooms in high resolution The Panomera multifocal sensor systems differ from other cameras in that they combine a total overview with an unlimited number of detailed zooms in high resolution. The detail zooms can simply be opened in the overall image with a click of the mouse, like ‘virtual’ PTZ cameras, not only live but also in the recording. This is made possible by the patented use of up to eight sensors with different focal lengths in a single system. In this way, a much greater expanse can be captured with each camera. In the words of the manufacturer, Dallmeier, this results not only in significantly improved operability and overview, but also saves up to 50% or more in operating and infrastructure costs, depending on the application area. Besides the advantages in image capture and operation, the latest Panomera generation is set apart by its superior analysis capabilities, as they combine a precisely plannable/definable image quality (and therewith data quality) with the most advanced analysis technology. Edge analysis with eight quad-core processors In traditional single sensor as well as multi-sensor camera technologies, image resolution and thus also analytical capability diminishes continuously in the direction of the image background. In contrast to this, the cameras of the Panomera S-Series capture a very large expanse or long distances with a minimum resolution over the entire area. Panomera is therefore, able to monitor and analyse complex context with the same high data quality, even over extremely large expanses. If an application requires, for example, a minimum resolution density of 62.5 pixels per meter, according to DIN EN 62676-4, over 50,000 square meters can be covered with just one camera system, which is more than sufficient for common object classifications. SoC generation analysis unit with integrated AI Even at the highest DIN resolution density of 250 pixels per meter, for the identification of unknown persons that can be used in court, one system still manages up to 3,100 square metres. For this purpose, each of the up to eight sensors in a Panomera is equipped with an analysis unit of the latest SoC generation with integrated Artificial Intelligence (AI), so that the analysis can be carried out directly in the camera (on the edge), from people counting through to ‘Appearance Search’. Users can operate the Panomera cameras either with the Dallmeier HEMISPHERE SeMSy Video Management System (VMS) or with any VMS systems that support ONVIF. Featuring ‘Quick-Lock’ rapid fastening system A special ‘Quick-Lock’ rapid fastening system allows the systems to be installed by a single technician Dallmeier engineers placed particular emphasis on functional design. Thus, for example, the ‘Mountera’ mounting concept offers enormous time savings and fewer errors during implementation. A special ‘Quick-Lock’ rapid fastening system allows the systems to be installed by a single technician. The different brackets for wall, ceiling or mast mounting are also completely compatible with each other; they can even be combined with the 180- and 360-degree systems of the Panomera W camera series. Foam packaging for ‘bubble protection’ The manufacturer has also made extensive improvements to the very tasks of unpacking and installations. A one-time handle which is already mounted on the camera in the package and the foam packaging that remains as ‘bubble protection’ reduce the amount of effort required for handling. The camera can be taken out of the packaging and can be transported and set down undamaged without further work steps. As the last, finishing touch, the size of all the Allen keys needed for installation and adjustment is the same, so only one key size is required. Convection cooling, ‘Air Blast’ and ‘Privacy Shield’ The new generation of Dallmeier Panomera cameras also fulfills the requirements relating to architecture and optical integration with a design language, which is applied consistently to all the various individual models. Besides the dynamic appearance, particular attention was also paid to innovative functions. These include a passive cooling system, which renders auxiliary cooling unnecessary for temperatures up to 60 degrees Celsius. A system called ‘Air Blast’, which uses compressed air to clean dust, water and insects off the lens without contact and therefore, without wear is also available as an option. Dallmeier’s ‘Privacy Shield’ is responsible for active and largely visible data protection. It is a remote-controlled blind mechanism with which police or private enterprises can temporarily disable the Panomera systems in a way that is clearly visible with a few clicks of the mouse, during rallies or strikes, for example. Enhanced data protection and security Dieter Dallmeier, Founder & CEO of Dallmeier electronic said, "For ten years, our Panomera customers have demonstrated that solutions with technology ‘Made in Germany’ deliver exceptional results with regard to attaining security objectives while remaining compliant with the most stringent data protection and data security requirements. At the same time, multifocal sensor technology is the intelligent answer to many unsolved problems because it brings precision and plannability to video technology." Dieter adds, "Because Panomera systems not only enhance operation and the attainment of security objectives in video observation and surveillance, most particularly they also provide superior quality data for the increasingly important function of video analysis. The fact that these solutions can then also be implemented for substantially lower overall cost than comparable technologies surprises many of our customers time and time again." Customer testimonials We have been using Dallmeier Panomera technology with great success since 2018" Thorsten Wünschmann, Director, Hanau Public Order Office said, "We have been using Dallmeier Panomera technology with great success since 2018. The major benefit we derive from the Panomera systems consists particularly in that the total overview of a scene is maintained at all times, while operators can zoom into various regions at high resolution even in the recording.” He adds, “This enables us to keep optimum control with minimum strain on the operators, and since only a small number of systems are needed, overall operating costs are low." David Lewis, Head of Security and Stadium Safety, Everton FC football club said, "In the course of our selection process, the Panomera cameras from Dallmeier were able to deliver images of the highest quality time and time again, both in normal daylight conditions and under weak floodlighting, and furthermore not only live also in the recordings with the highest possible resolution quality in all areas of the image.” David adds, “Moreover, with the Panomera cameras we can capture large expanses, such as the entire grandstand area for example, with just a few systems. Ultimately, these were the reasons which convinced us to award the contract for video security at Goodison Park to Dallmeier." Jürgen Vahlenkamp, Managing Director of VTS GmbH and principal contractor for the Panomera installation on the Kölner Seilbahn cable car stated, "We managed very well with the small number of available installation points for video observation with the Panomera. The remarkable lens and sensor concepts mean that we do not fall below the specified resolution even in the more distant image regions.” He adds, “The ideal prerequisite for observation over very long distances! Because of the high-resolution detail views, the operator has the situation under control at all times. He can maintain an uninterrupted overall view of the bearer cables and support pylons while simultaneously analysing a detail recording of a certain region as necessary. We were able to organise the procedure as safely as possible while the cable car was operating, to the immense satisfaction of our customer."
High demands on products as well as high time and cost pressure are decisive competitive factors across all industries and sectors. Whether in the food or automotive industry quality, safety and speed are today more than ever before factors that determine the success of a company. Zero-defect production is the goal. But how can it be guaranteed that only flawless products leave the production line? How can faulty quality decisions, which lead to high costs, be avoided? In order to test this reliably, a wide variety of methods are used in quality assurance. A visual inspection with the human eye is possible, but it is often error-prone and expensive: the eye tires and working time is costly. A mechanical test, on the other hand, is usually accompanied by complex calibration, i.e. setting up and adjusting all parameters of both software and hardware in order to detect every error. In addition, product or material changes require recalibration. Furthermore, with the classic, rule-based approach, a programmer or image processor must program rules specifically for the system to explain to the system how to detect the errors. This is complex and with a very high variance of errors often a hardly solvable Herculean task. All this can cost disproportionately much time and money. In order to make quality inspection as efficient, simple, reliable and cost-effective as possible, the German company sentin GmbH develops solutions that use deep learning and industrial cameras from IDS to enable fast and robust error detection. A sentin VISION system uses AI-based recognition software and can be trained using a few sample images. Together with a GigE Vision CMOS industrial camera from IDS and an evaluation unit, it can be easily embedded in existing processes. Defect recognition software The system is capable of segmenting objects, patterns and even defects. Even surfaces that are difficult to detect cannot stop the system. Classical applications can be found, for example, in the automotive industry (defect detection on metallic surfaces) or in the ceramics industry (defect detection by making dents visible on reflecting and mirroring surfaces), but also in the food industry (object and pattern recognition). Depending on the application, the AI is trained to detect errors or anomalies. With the latter, the system learns to distinguish good from bad parts. If, for example, a surface structure is inspected, see metal part in the automotive industry or ceramic part, errors are detected by Artificial Intelligence as deviations from a comparison with reference images. By using anomaly detection and pre-trained models the system can detect defects based on just a few sample images of good parts. The hardware setup required for the training and evaluation consists of an IDS industrial camera and appropriate lighting. The recognition models used are trained using reference images. For example, a system and AI model was configured for the error-prone inspection of fabric webs in the textile industry. A difficult task, as mistakes can be very subjective and very small. The system camera for optimum image material of textiles and web materials was selected together with IDS on the basis of specific customer requirements. A GigE Vision CMOS camera (GV-5880CP) was selected, which provides high-resolution data, triggered with precise timing, for accurate image evaluation. IDS Vision CP camera Slippage is the proportion of products that do not meet the standard but are overlooked The system learns what constitutes a "good" fabric structure and knows already from a few shots of the fabric what a clean and flawless product looks like. For quality inspection, the image captured by the IDS Vision CP camera is then forwarded via GigE interface to an evaluation computer and processed with the recognition model. This computer can then reliably distinguish good/bad parts and highlight deviations. It gives an output signal when an error is found. In this way, slippage and pseudo rejects can be reduced quickly and easily. Slippage is the proportion of products that do not meet the standard but are overlooked and therefore not sorted out, often leading to complaints. Pseudo rejects, on the other hand, are those products that meet the quality standard but are nevertheless incorrectly sorted out. Both hardware and software of the system are flexible, for multiple or wider webs, additional cameras can easily be integrated into the setup. If necessary, the software also allows for re-training of the AI models. "Experience simply shows that a certain amount of night training is always necessary due to small individual circumstances. With pre-trained models from our portfolio, you need fewer reference images for individualisation and post training," explains Christian Els, CEO and co-founder of sentin. GV-5880CP GigE Vision CMOS camera Extremely accurate image acquisition and precise image evaluation are among the most important requirements for the camera used. Perfectly suitable is the GigE Vision CMOS camera GV-5880CP. The model has a 1/1.8" rolling shutter CMOS sensor Sony IMX178, which enables a very high resolution of 6.4 MP (3088 x 2076 px, aspect ratio 3:2). It delivers frame rates of up to 18 fps at full resolution and is therefore ideal for visualisation tasks in quality control. The sensor from the Sony STARVIS series features BSI technology (backside illumination) and is one of the most light-sensitive sensors with a low dark current close to the SCMOS range (Scientific CMOS). It ensures impressive results even under very low light conditions. "In addition to resolution and frame rate, the interface and the price were decisive factors in the decision for the camera. The direct exchange with the IDS development department has helped us to reduce the time needed for camera integration," says Arkadius Gombos, Technical Manager at sentin. The integration into the sentin VISION system is done via GenTL and a Python interface. Advantages of AI over human inspection or applications The human brain is beaten by artificial intelligence in terms of consistency and reliability Automated, image-based quality control with Artificial Intelligence offers many advantages over human visual inspection or conventional machine vision applications. "In AI-based image interpretation, the aim is to create images on which humans can see the error, because then the AI model can do it too," concludes Christian Els. The system learns to recognise the requirements of the product similar to a human being. But the human brain is beaten at any time by an artificial intelligence in terms of consistency and reliability. Even if the brain is capable of remarkable peak performance, an AI can recognise much more complex error patterns. The human eye, on the other hand, cannot stand up to any camera in terms of fatigue and vision. In combination with deep-learning recognition software, the image processing system therefore enables particularly fast and accurate inspection. Depending on the application, image acquisition and evaluation can take place in just a few milliseconds. Deep learning The system can also be applied to other areas such as surface testing. Similar applications are e.g. the testing of matte metal/coatings surfaces (automotive interior), natural materials (stone, wood) or technical textiles such as leather. Scratches, cracks and other defects on consumer goods can thus be detected and the respective products sorted out. Exclude quality defects and produce only good stuff, an indispensable process within the framework of quality assurance. IDS cameras in combination with the deep learning supported software of sentin GmbH significantly optimise the detection of defects and objects in quality control. This allows the personnel and time expenditure for complaints and rework, as well as pseudo rejects, to be significantly reduced in a wide range of industries and areas.
We still have some way to go before we see 5G service rolled out as a UK-wide service, but we can discuss future implications of 5G, and how it can improve device capabilities once its widely accessible. The impact of 5G lies within the increase in the amount of data that can be transferred between smart home devices through a cloud-based system. By utilising the cloud’s mass computing power and its ability to process data in larger capacities, we are able to receive more in-depth analytics that can help improve smart home devices by making them faster, more informed and intelligent. Will 5G boost innovation in the smart home market, if so, how? Innovation using 5G can be shown with current smart home CCTV systemsAn example of innovation using 5G can be shown with current smart home CCTV systems. Products at present allow you to use functionalities such as motion detection. As it stands, this is a basic form of monitoring that monitors changes in picture and notifies the owner when something unusual has happened. Once 5G comes into play, the video data captured can be sent off to the cloud, interpreted in more detail, and can allow the system to conclude whether the movement is from a human, object or animal. Facial recognition could also come into play here, providing a more seamless service when reporting incidents to the police. Similarly, you can use data from various different devices within your home to toughen security measures. A video camera used in conjunction with a presence or heat detector can eliminate small errors by providing the ‘bigger picture’ with more data points to work with - an amalgamation of all smart devices used in tandem. We can’t solely rely on smart devices to make decisions for us, but what we can do is improve device processing so that by the time we step in, we already have all the necessary information to assess the appropriate call to action. What will 5G enable homeowners to do within their homes? Smart homes using 4G currently operate in a fragmented fashion, incorporating Wi-Fi, Bluetooth, and other network protocols. Unlike 4G, 5G will work with low-power devices, making it useful for a broader array of connected products. This means that all devices we will be able to connect any internet connected product in order to allow integrated communication between all devices. Can be connected to work together in conjunction with your home system Your fridge and other kitchen appliances, for example, can be connected to work together in conjunction with your home system to create an entirely automated home. If your freezer is internet connected, you may get a notification if it loses power, but as everything else is also connected within your home, you will be able to determine whether it is a power fault or product fault straight away. Faster connectivity means that users can quickly take advantage of the data their smart devices provide, such as water use sensors which can monitor levels and allow for behaviour changes to curb water usage The same can be applied with vehicles. Cars in future will be autonomous and include an integrated dashcam which can then be connected to your security system to provide added security on-site in the peripheral of your home, alerting you to potential intruders before they reach your front door.
Smart cities, airports, stadiums, hospitals and other organisations are now liaising with government bodies and law enforcement to propel a new dawn of collaborative security and communication. The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve. Artificial Intelligence is now allowing law enforcement, security personnel and organisations to a transformational method of fighting crime, maintaining public security and significantly finding persons of interest. AI-powered surveillance cameras Utilising surveillance cameras with implemented AI has revolutionised finding missing persons. Facial recognition and IREX.ai’s “Searchveillance” have equipped both the public and private sector with the tools to collaboratively work together in finding persons of interest. The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve Finding missing persons has been an underfunded and challenging issue across society, with many countries having no funding at all after the initial police investigation. Through artificial intelligence, surveillance cameras will never sleep on finding missing people by setting up alerts for once a missing person appears under surveillance. How it’s happening Technology like IREX.ai has delivered an AI collaborative security solution which is implemented into surveillance cameras enabling them to become “smart cameras”. Both public and private sector have not been able to collaborate through utilising their existing cameras, which are now powered by AI-backed smart video technology. With surveillance systems now veering toward becoming cloud based, this now allows an unlimited number of cameras for an organisation or city to connect to. The AI platform is helping bringing about a collaborative network to help monitor crowded public areas in real time, something that would have taken a lot of manpower, time and cost to produce. Quicker response through “searchveillance” This has now become a crucial element in the fight against COVID-19. The ability to track and trace has been very effective but this particular AI module may only just be getting started in the fight to find persons of interest. When an individual goes missing or is abducted, every second is crucial along with information gathered. Unfortunately, this brings in human-error, when a person believes they may have seen the person of interest, it can lead law enforcement and authorities critically, in the wrong direction. AI-powered Facial Recognition helps eliminate human-error through 99.5% accuracy success, leading authorities to definitive sightings and factual information through the help of AI. “Searchveillance” enables authorities to liaise with the public and private sector organisations who have implemented the AI into their surveillance to run a single search with the person of interest’s photo. Instantaneously the user receives immediate results of, if and when this person last appeared under surveillance. Long-term missing persons It’s common knowledge that after 72 hours, statistically speaking the chance of finding the individual quickly diminish, but that doesn’t mean people stop searching. This week alone, September 2020, US Marshalls found and rescued 25 missing children in Ohio, many of whom had been missing for years. AI-powered facial recognition helps eliminate human-error through 99.5% accuracy success Implementing AI into surveillance cameras is becoming more frequently adopted around the world, enabling alerts in surveillance cameras and notifying appropriate law enforcement when a missing person appears under surveillance are all extraordinary tools. The alert system from the persons photo in the software. Facial recognition allows law enforcement to receive real-time footage of the missing person and their location. It is of great assistance for law enforcement to simply receive a notification and a real time feed of individual they are looking for. Security is becoming a more collaborative effort In light of recent events throughout the world, with protests surrounding police brutality, rioting, violence and deaths, security is evolving and it has to. Enabling technologies and building security collaboration and communication platforms is assisting in the fight to find missing people. It’s not just smart cities and smart airports who are providing a fishing net for find persons of interest, it’s also stadiums. The Superbowl and other major sporting events generate some of the biggest human slavery and trafficking busts of the year. Stadiums are now harnessing the responsibility to help counteract this and set up these alerts, utilise the AI in their cameras and collaborate with authorities, thus playing their part in finding persons of interest. IREX.ai has helped deliver the AI and the platform for collaborative security and communication, as technology grows and becomes more in our lives than we care for it to be, you often forget of the results it can provide, such as reuniting a family.
Stadiums around the world are still paralysed from the effects of COVID-19. Fans and spectators in masses have been absent from stadiums since April and there doesn’t seem to be a concrete plan on how or when they’ll be able to return to near capacity. The NBA recently opted to form a bubble philosophy concept in Disney’s facilities, although it’s been a relative success, it’s also been a $200 million temporary solution. This then begs the question: How long can stadiums survive like this without spectator’s present? History tells us that stadiums, venues and sport recover from disasters, so what can stadiums do to speed up the process? This is the catalyst for AI to be integrated on mass level to stadiums around the world. AI is the answer AI’s role in getting fans and spectators back is huge, through capabilities such as: Social Distance Monitoring Crowd Scanning/Metrics Facial Recognition Fever Detection Track & Trace Providing Behavioural Analytics Technologies such as IREX.ai is now working alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. Stadiums around the world are still paralysed from the effects of COVID-19 AI surveillance software such as IREX.ai when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. Crowd metrics Arming stadiums with AI-powered surveillance tools can detect crowd metrics such as “people counting” and “group statistics”. This ensures stadium personnel can monitor social distancing with precision, accuracy and immediately. Alerts can be set up throughout parts of the stadium to alert senior staff members when overcrowding can appear with real-time videos, analytics and photos to their hand-held device, such as a smartphone. Fever detection Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures. What IREX.ai implements is an alert system, coupled with facial recognition of any individual(s) that read an elevated body temperature. This alert system then provides security and health officials with a photo of the individual with the elevated body temperature, meaning staff can react quicker to the situation prevent this individual from entry. Pandemic monitoring by facial recognition Thermal cameras have been implemented throughout facilities including stadiums and are helping assist to spot people with elevated temperatures Through facial recognition, staff members will be able to locate individuals through simply uploading a photo. It has never been easier to find a person of interest. With masks becoming an everyday part of society, facial recognition has come under scrutiny regarding the accuracy when a mask is worn. Irex.ai still maintains a 96% accuracy with individuals wearing masks and can set up alerts for any individuals not wearing a mask. Another important aspect of facial recognition is finding persons of interest quickly through technology like IREX.ai’s “searchveillance”. The future is here. Designated staff can track a person from when they enter the stadium by simply uploading their photograph. An example of how this can assist stadium personnel is to help relocate lost children inside the stadium with their guardians/parents when they are separated. Another attribute would be any individuals banned from entering the stadium would trigger alerts once they appear under surveillance, a fantastic collaborative tool to use with Law Enforcement. Return on investment With security solutions, one of the biggest issues with any security investment is a lack of an ROI. This is where AI security is breaking the mould. The ability to provide business analytics, consumer/fan behaviours, traffic patterns, etc, allows other departments within the organisation to gain vital information that can assist with their strategies and practices. Stadium security will never be the same in a post-COVID world, so why will its practices stay the same? AI & Stadiums is no longer the future, it’s the 2020 solution.
Can a smart card be used securely for multiple applications (and among multiple companies)? End users are demanding such interoperability, and they also want openness to switch out their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that can share encrypted access codes for numerous applications to enable MIFARE DESFire EV2 chip cards to be used across multiple vendors. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are encrypted “keys” – strings of 32 alphanumeric characters encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent EV2 card enables one encrypted key to be used for up to 16 devices (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF consortium enables encryption sharing using protocols that ensure each manufacturer’s systems can interface with a card chip in the same way. Specifically, each card has a “shared data structure,” which means that the location of information is arranged on a card chip in a predictable and consistent manner. Member companies adhere to that structure in order to be interoperable using a single credential. There are no license fees or intellectual property rights involved. Secret key The approach involves a LEAF Custom Cryptographic (Cc), a “secret” key owned by the end user but managed by a third party. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of custom-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end user staying in control and having unlimited interoperability.” Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications. Key management service WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF-enabled. They provide a key management service (for life) to end users based on LEAF capabilities. End users “own” the keys and can ask to share them with any other manufacturer. Sharing a key involves two key custodians (engineers), each of whom only has access to half of the encrypted key in order to keep it secure. Combining capabilities The LEAF consortium provides a way for smaller manufacturers to work together to increase their market share without putting anyone’s intellectual property at risk. Working together, smaller manufacturers can assemble systems to compete more effectively with larger manufacturers. In effect, they combine their capabilities rather than compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve in terms of where a biometric template is stored on the chip. Although the standard does not currently offer mobile credentials, mobile functionality will be available by the second quarter of 2021 (or sooner).
Facial recognition is becoming more popular in newer systems for access control — a shift that began before the pandemic and has intensified with a market shift toward “touchless” systems. A new facial recognition platform is emerging that responds to the access control industry’s increased interest in facial recognition by expanding the concept with a new higher level of technology. At the core of the new system is high-performance, true-3D sensing with facial depth map processing at low power consumption, which enriches the capabilities of small-footprint access control devices. New proficiencies include anti-spoofing (preventing the use of a 2D photo of an authorised user to gain entry) and anti-tailgating (preventing an unauthorised person from gaining entry by following an authorised user) in real time and in challenging lighting conditions. The system uses “true 3D sensing,” which incorporates single-camera structured-light 3D sensing—as opposed to dual-camera depth sensing or IR video imaging-based approaches. AI vision processing and 3D sensing technologies The new “Janus reference design” incorporates AI vision processing, 3D sensing technologies, and RGB-IR CMOS image sensor technologies from Ambarella, Lumentum and ON Semiconductor. Specifically, Lumentum’s high-reliability, high-density VCSEL projector for 3D sensing combines with ON Semiconductor’s RGB-IR CMOS image sensor and Ambarella’s powerful AI vision system on chip (SoC). The Ambarella, Lumentum, and ON Semiconductor engineering teams worked together to incorporate their complementary technologies into the reference design. A reference design offers OEM product and engineering teams a fully functional engineering reference implementation that they can use as the basis for their own product. Teams will often customise a reference design with their choice of various third-party hardware components to fit their product specifications and positioning. They might also integrate their own software, algorithms, and back-end system integrations. The advantage to this approach is that the manufacturer can get to market quickly with a next-generation product that emphasises their core strengths. 3D depth information for facial recognition Generally, it takes between nine months and a year for a manufacturer to get to market using a fully functional reference design, such as the one developed jointly by Ambarella, Lumentum and ON Semiconductor. The Janus platform leverages 3D depth information generated via structured light for facial recognition with a >99% recognition accuracy rate. Traditional 2D-based solutions are prone to false acceptance and presentation attacks, whereas 3D sensing delivers advanced security—just as mobile phones use true-depth cameras for facial recognition. 3D facial recognition also significantly reduces the gender and ethnic biases demonstrated by some 2D facial recognition solutions. The Janus reference design is also aimed at future smart locks for enterprise and residential use: its unique single-camera 3D sensing solution will help OEMs overcome cost and manufacturability barriers, while the ultra-low power edge AI capability can effectively extend the battery life, which in turn reduces maintenance cost. Video security and access control Ambarella sees touchless access control, as well as the convergence of video security and access control, as the mega-trends driving industry innovation and growth—using video, computer vision, and 3D sensing to not only address safety and security, but also to improve the user experience and public health, says William Xu, director of marketing for Ambarella. The convergence of video security cameras and access control readers has been widely discussed by leading access control OEMs. In many cases, they already integrate video security cameras, readers, door controllers, cloud-access, and the like. In most enterprise installations, one would typically find security cameras installed where there are access control readers. Combining the two devices significantly reduces the maintenance cost and system complexity. “In comparison to fingerprint or other contact-based approaches, Janus-based access control is touchless—requiring no physical contact with authentication hardware such as fingerprint sensors or keypads—reducing infection risk while enabling a seamless experience,” says Mr. Xu. “The Janus platform provides true 3D depth information to prevent unauthorised individuals from mimicking legitimate users, and the advanced embedded AI processor enables tracking and anti-tailgating algorithms. Janus-based devices perform well in challenging lighting conditions and they are capable of authenticating multiple users simultaneously, with imperceptible latency.” Access Control and public health What was once purely a security challenge—namely, how to prevent unauthorised entry into a restricted area—has evolved into a public health challenge as well. Many traditional access control methods, from number pads to fingerprint readers, require touch in order to function, and if the current global pandemic has made one thing evident, it’s that minimising physical contact between users and surfaces is vital to community well-being. Janus was originally designed to facilitate the next generation of facial-recognition-based access control readers—enabling 3D sensing and high recognition speed for seamless authentication. COVID-19 has accelerated industry-wide research, development, and timelines for Janus-based solutions, says Mr. Xu. Deep learning and artificial intelligence drive all the new capabilities offered in Janus—capabilities that are only possible due to the platform’s high computational horsepower. The core deep learning and AI capabilities of Janus enable a wide range of advanced features only possible with an embedded vision SoC, says Mr. Xu. All are performed in real time, even when multiple users are being processed simultaneously. These include the extraction and comparison of facial depth maps with those registered in the system; 3D liveness detection, ensuring that the system can distinguish between real users and photo or video playback attacks; anti-tailgating, which relies on computer vision algorithms to detect and track when an unauthorised person follows a legitimate user inside; face mask detection; and people counting. VCSEL technology According to Ken Huang, Director of Product Line Management, 3D Sensing, Lumentum: “Lumentum’s VCSEL technology is one of the Janus design’s core strengths and differentiators. The process begins when Lumentum’s high-resolution dot projector projects thousands of dots onto the scene to create a unique 3D depth pattern of a user’s face. Most traditional biometric facial security systems rely on 2D images of users—simple photographs—which reduces authentication accuracy. In contrast, the 3D depth map generated by Lumentum’s technology provides the foundation of a more accurate, more secure, and more intelligent system overall. In addition, Lumentum’s VCSEL solutions incorporate a Class 1, eye-safe laser with zero field failures to date.” Adds Paige Peng, Product Marketing Manager, Commercial Sensing Division, ON Semiconductor: “If we think of Ambarella’s CV25 as the brain of the Janus design, the AR0237IR from ON Semiconductor is the eye. The AR0237IR image sensor captures the information, and the CV25 processes it. Other face recognition systems use two “eyes” – one to recognise RGB patterns to generate the viewing image stream, and another IR module to detect liveliness in motion. The Janus solution leverages a single “eye”—the AR0237IR—to obtain both visible and infrared images for depth sensing and advanced algorithms such as anti-spoofing and 3D recognition. AR0237IR also provides good sensitivity in various lighting conditions and supports high-dynamic-range (HDR) functions.” The single-camera 3D sensing solution for access control operates in three seamless steps: Step 1: Lumentum’s high-resolution dot projector creates a unique 3D depth map of a user’s face; Step 2: ON Semiconductor’s RGB-IR image sensor captures the high-resolution images from Step 1, even in low-light or high dynamic range conditions; Step 3: Ambarella’s advanced vision SoC takes the high-resolution images captured in Step 2 and uses deep neural networks (DNNs) for depth processing, facial recognition, anti-tailgating, and anti-spoofing while video encoding and network software run simultaneously.
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. Today, even air travel seems incredibly risky, or at minimum a huge hassle. The good news is that the industry has adapted well without the shows. A series of “on-line shows” has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. It’s easy to dismiss these sessions as “Death by PowerPoint,” but some of them are incredibly informative. And conveniently accessible from the comfort of a home office. Internet transforming businesses We have already seen how the online world makes it easier than ever to connect with customers. In the consumer space, businesses like Uber, Shopify and Airbnb have proven that the Internet can transform how business is done. But in the security industry, we hear: “You can’t replace the value of meeting face to face.” That’s definitely true to some degree. A lesson of 2020 is the need to take a hard look at the economic model of trade shows However, the reality of 2020 suggests that there are alternatives that are almost - emphasis on almost - as good. And that don’t cost as much. And that don’t take away as much time from the office. And that don’t involve the effort of schlepping luggage through an airport yet again to a hotel in a beautiful city you will never see where you will spend three days in a big exhibit hall eating overpriced hot dogs and regretting your choice of footwear. Economic model of trade shows Sure, you’ll meet up with old pals, and get some value out of the experience. But how much value versus the cost? A lesson of 2020 is the need to take a hard look at the economic model of trade shows - how much they cost versus the value they provide. Considering how well we have gotten along without them, one wonders how and why trade shows have become such an integral part of our industry, and of hundreds of other industries, for that matter. I have had many conversations with exhibitors at trade shows in the last several decades. I have heard probably thousands of complaints about the slowness of the foot traffic, the high costs of exhibiting, the price and hassles of travel. The question I have often wondered (and asked): Is it worth it? Defray the costs Usually, the complaining exhibitor will reluctantly admit that it is, and/or provide some other justification, such as one of the following: All my competitors are here. If I don’t exhibit, it sends the wrong message to the market. That’s why I need to have the largest booth near the front of the show, too, because it’s all about perception and positioning ourselves in the market. We need the show for the sales leads, which drive our sales for the next six months. If I meet one large end user who turns into a big sale, the extra revenue pays for it all and makes everything worthwhile. This is the only time I get to see my sales staff or other coworkers from around the country. We have a sales meeting this week, too, so it helps to defray the costs. Success of alternatives The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come Given the experience of the year 2020 without any trade shows, might some of these justifications melt away? At a minimum, companies will be taking a hard look next year to evaluate what they missed about the trade show experience, and more importantly, what the impact was on their business (if any). What is the future of trade shows? After the 2020 hiatus, exhibitors and attendees alike will be starting with a clean slate, taking a fresh look, reexamining the value proposition with new eyes, braced by the successes (while acknowledging the failures) of alternatives that emerged as necessities during a global pandemic. Ensuring safety and security The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come - including trade shows. During the pandemic, we have all had to reinvent ourselves, deploy new strategies, work around new challenges, and in the end, hopefully, emerge better for it. There’s no reason trade shows shouldn’t undergo the same transformation. And it’s likely the “new normal” could look very different. The security market has found new opportunities during the pandemic, including new applications for existing technology and a renewed emphasis on the importance of ensuring safety and security. That positivity will hopefully carry our industry triumphantly into the new decade, and trade shows will adapt to find their place in the newly revitalised industry. As it should be.
A networked surveillance system has been installed at Petwood Hotel in Lincolnshire, the former home of members of 617 Squadron, more famously known as The Dambusters, during World War 2. The hotel, situated in the village of Woodhall Spa, was originally built in 1905, as a country house for a wealthy Baroness, and after serving as a military convalescence hospital during World War 1, was converted into a hotel in 1933. Located among magnificent lawns and landscaped gardens, the Grade II-listed hotel has 53 bedrooms, a Squadron Bar filled with World War II memorabilia, a restaurant and terrace bar, and function rooms. Dahua Smart PSS viewing platform The system at the Petwood Hotel comprises 12 HFW5431-ZE bullet cameras, four HDBW5431-ZE dome cameras, and 13 HDBW2421R-ZS mini dome cameras. Images are recorded and processed on to a central server, while viewing is managed by a Dahua Smart PSS viewing platform. Some 29 Dahua bullet, dome and mini-dome network cameras have been installed by Videcom Security around the hotel. Externally, cameras monitor the car parks, where previously there were incidents of damage to vehicles. With the new system, however, the source of any damage can be quickly located, so helping with guests’ insurance claims. Other cameras are positioned so that the hotel’s management has coverage of the entire perimeter. Perimeter protection Inside, cameras are located in public areas such as reception, the bar area and function rooms Inside, cameras are located in public areas such as reception, the bar area and function rooms. They are designed to help resolve payment discrepancies and to deter any unwarranted behaviour. Images from the cameras go back to a secure room in the hotel’s separate office block, while staff at reception is able to view live images. “The Dahua system delivers all the benefits we were looking for,” said George Kane, General Manager at the Petwood Hotel. It is reliable, easy to use, and provides excellent quality recorded images, which can be accessed quickly and easily. The cameras are discreet and sensitively installed in and around the listed building. Video surveillance system The technology is great and Videcom Security have handled the project well and sensitively, considering the building is more than 100 years’ old and the hotel remained open throughout the period of installation. “The new surveillance system has been brilliant. The high image quality will enable us to resolve any liability issues in the car parks, while the system reassures guests and staff about internal and external security,” said Danny Harsley, Northern Engineering Manager at Videcom Security. Danny adds, “The Dahua equipment was ideal for this project and, as we have found on many other projects, was easy to install and commission. It’s also a great system to use.”
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s centre, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognise the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Centre (SOC) to gather, understand, and analyse the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behaviour. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimising installation time and eliminating downtime. Ava’s simplified licencing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
Security and surveillance systems have become a vital component of a casino management system enabling gaming club operators to monitor and manage security threats in real time. Apart from the original purpose of security measures, it helps raising concerns over card counting, advantage playing, and various other suspicious or prohibited activities. However, a typical casino atmosphere often involves great complexity in its environmental lighting, leading to high noise level in captured video images. Challenges: Inadequate lighting in casino making it difficult for cameras to distinguish colours and movement, resulting in blurry images. Lack of advanced video analytic functions in traditional surveillance systems presents difficulties to an effective monitoring process, with high labour cost needed for scanning live views and recorded footages manually. Access control system Different casino areas require different solutions to fulfill its demand. At gaming tables, it’s critical to capture the subtle movements of each players and dealers. Cameras with higher FPS, 3D DNR and super low lux image sensor gives a neater and brighter image under dim lighting, while 2-way audio provides additional audio information. Casino operations involve a multitude of monetary transactions in critical areas including cages, vaults and offices where cash, chips, and other valuables are circulated. An access control system integrated with facial recognition functions helps operators in strengthening the security level. Exceptional customer experience is the key to good customer loyalty. Facial recognition system Video analytics allows operators to filter videos recording smartly with object attributes With ANPR (Automated Number Plate Recognition) and facial recognition embedded into the management system of carparks and VIP lounges, customer entry and exit can be streamlined minimal interruptions. A modern video surveillance system complemented by top notch IP cameras can improve and simplify the entire operation. Modern video management software possesses features that are not offered by traditional systems. Video analytics such as human object detection allows operators to filter videos recording smartly with object attributes, e.g. colours of customer clothes. The architecture of modern video management provides scalability to accommodate the growing amount of video sources during business expansion. Standardised protocol offers higher interoperability in terms of 3rd party system integration with access control or alarm system. Cameras for centralised management Thanks to the internet, control center is now able to receive and group videos from dispersed cameras for a centralised management. The operators could access to the live views of different casino affiliates and receive real-time notification on mobile devices when specific events are in action.
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business centre – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognising a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorised individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to consumers by the operator, and in the operator’s cloud-native environment. The services are expected to be made available to millions of the operator’s fixed broadband customers. The operator has ordered an enterprise-wide perpetual licence from Allot. According to the Microsoft Security endpoint threat report 2019, the malware encounter rate in APAC was 1.6 times higher than the global average. In light of these conditions, Allot HomeSecure gives telecom providers in APAC a unique opportunity to deliver zero-touch, fully automated services that protect their customers while generating supplemental revenues. Security for home IoT and smart home devices Allot HomeSecure provides security for home IoT devices and smart appliances Allot HomeSecure provides security for home IoT, smart appliances, and the devices connected to the home network. It integrates into the existing home router with the addition of a thin software client that provides home network visibility, cyber security and parental controls without the need for any configuration by the consumer. Allot HomeSecure uses AI to identify and profile connected home devices and to detect and act upon anomalous device behaviour. HomeSecure has the option to be managed from an easy-to-use app for every household that gives consumers control over their network security and parental controls. “Our customer in APAC sees anti-malware protection for all home-connected devices and parental controls as basic requirements for any offering they provide to their millions of fixed broadband customers. HomeSecure gives them a single zero-touch clientless solution that satisfies both of these demands,” said Ran Fridman, EVP Global Sales at Allot.
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardised business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order centre. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
Round table discussion
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?