Boosting efficiency through digitalisation, almost no branch of industry can evade it. Also operators of press shops are increasingly networking their production. But, regardless of whether it’s a single press or press lines, it’s not always necessary to replace the entire plant, in order to stay up to date. Retrofitting existing lines, true to the principle of ‘sensible evolution instead of cost-intensive revolution’, is often the order of the day. With Visual Die Prote...
On the occasion of the Milipol 2021 (Milipol Paris 2021) exhibition, the event dedicated to homeland security and safety (taking place from Oct. 19-22, 2021, in Paris, France), Deveryware will introduce its range of security solutions, to support investigators and enhance homeland security. As the European expert in investigation technologies and global security services, Deveryware will present its innovations, specially designed to facilitate police and the Gendarmerie’s investigations....
Recently, the European Parliament called for a ban on police use of facial recognition. In the US, too, some cities have restricted police use of facial recognition. The first question that comes to mind is - why ban police from using technology that is allowed to private companies? Point of difference The key difference between the way police use facial recognition and the way commercial facial recognition products work is that: The police get a picture of a suspect from a crime scene and wan...
Security screening and detection technology expert Rapiscan Systems has completed its largest single install of the new Orio Metor 900M walkthrough metal detector and its 920CX X-ray scanner. This substantial installation provides additional security and protection to over 80 facilities in Washington DC. The Metor 900M is an advanced upgrade on its predecessor the 600 series, which has been used in these facilities for the past five years. The upgrade consists of a complete redesign from the gr...
A report launched by Menlo Security, a pioneer in cloud security, highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ IT decision-makers in the U.S. and the U.K., includes a third at C-level – looks at attitudes to securing remote access to applications and resources and the adoption of zero-trust solutions. Developing working strategies While most respondents (83%) say they are confiden...
Abloy Oy announced ABLOY CUMULUS, a platform for keyless access, combining quality hardware products with secure access and management applications. It brings all the solutions together into a single ecosystem with a risk-free, integrated cloud service. “CUMULUS is our next step in the ‘keyvolution’ — the development in which mechanical keys are transforming into digital ones. We have wrapped our more than one hundred years of security expertise into digital so...
Cymulate, the industry pioneer in SaaS-based Continuous Security Validation (CSV) announced the next generation Extended Security Posture Management (XPSM) platform leveraging its native, Offensive Security technology and capabilities to widely support customers security and business needs. The combination of these new capabilities follows several product launches over the last six months and provides end-to-end validation of an organisation's cyber security posture. XSPM incorporates four fundamental pillars tied together with analytics to provide meaningful security posture insights: Attack Surface Management, Continuous Automated Red Teaming, and Breach and Attack Simulation alongside an Advanced Purple Teaming framework. Attack Surface Management (ASM) ASM tools scan domains, sub-domains, IPs, ports, and other assets for internet-facing vulnerabilities Helping organisations understand how hackers might get an initial foothold, ASM tools scan domains, sub-domains, IPs, ports, and other assets for internet-facing vulnerabilities. These functions alongside Open-Source Intelligence (OSINT), which could be used in a social engineering attack or a phishing campaign. Combined with Vulnerability Prioritisation Technology (VPT), these capabilities empower security teams to efficiently prioritise vulnerabilities and mitigation steps, ensuring a shorter time to remediation. Continuous Automated Red Teaming (CART) Moving beyond reconnaissance to answering: "how can an adversary breach my defences?" CART tools attempt to penetrate the organisation by analysing the exposed vulnerabilities and autonomously deploying attack campaigns that penetrate the network. After gaining the initial foothold, an attack subsequently propagates within the network in search of critical information or assets, for example by triggering a well-crafted phishing email. BAS and Advanced Purple Teaming BAS tools launch simulated attack scenarios out of the box, correlate findings to security controls (email and web gateways, WAF, endpoint, etc.), and provides mitigation guidance. These tools are primarily used by blue teams to perform security control optimisation. Advanced Purple Teaming Framework expands BAS into the creation of advanced and custom attack scenarios Advanced Purple Teaming Framework expands BAS into the creation and automation of advanced and custom attack scenarios. These tools easily follow the MITRE ATT&CK framework to model a threat actor, enabling security practitioners to create complex scenarios from predefined resources to custom binaries and executions. Customised scenarios can be used to exercise incident response playbooks, proactive threat hunting, and automate security assurance procedures and health checks. Cymulate’s XSPM platform "With the threat landscape evolving at such a rapid pace, Cymulate's SaaS-based Extended Security Posture Management (XSPM) is better suited to cater to customers' needs," said Eyal Wachsman, CEO, and Co-founder of Cymulate. "We're now continuing our vision to help organisations stay in control of their security posture while minimising resources, as well as allowing security professionals and leaders to know and control their cybersecurity posture in a dynamic environment." The XSPM platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. Deployable within minutes, Cymulate enables security professionals to continuously challenge, validate and optimise their cybersecurity posture end-to-end, across the MITRE ATT&CK framework.
Synectics releases a new ‘tech note’ exploring the benefits of cloud storage for enhancing security and surveillance operations. The guide focuses on hybrid cloud surveillance solutions which deliver maximum flexibility, allowing users to record, process, manage and store video and operational data on site, carry out these actions directly to the cloud, or seamlessly use a mix of both. Adopting cloud storage David Aindow, Business Development Director at Synectics, said: “Harnessing cloud management and storage capabilities opens many doors when it comes to optimising security, surveillance and operational control set ups.” The tech note also covers common questions around areas such as cyber security “As well as allowing organisations to easily scale and flex their storage requirements, cloud storage solutions present new opportunities in terms of analytics, collaborative working and secure data sharing. This resource is designed to help organisations explore and understand all these options in more detail.” In addition to looking at the core benefits of adopting cloud storage, the tech note also covers common questions around areas such as cyber security, guarding against network outages and data loss, and optimising bandwidth without impacting frame rate. Cloud storage solutions The tech note is part of a wider programme of educational activity, including a dedicated webinar on cloud storage in partnership with CCTV User Group. Taking place on Thursday 21st October at 2.30 pm, the ‘Cloud Storage Explained’ webinar will include a run-down of different cloud storage solutions and a Q&A session to help those attending select the best options for their specific requirements. David added: “We know from our customers that cloud capabilities deliver huge potential for improved security and operational management - our programme of activity around this topic aims to give any organisation considering cloud the facts they need to decide on the best route forward.”
Integrated security manufacturer TDSi announces the arrival of its latest student placement, Vlad Radoi. Vlad has joined the company’s Software Development Team for a twelve-month placement as part of his BSc (Hons) in Software Engineering studies at Bournemouth University. Supporting placement students Vlad is the latest in an ongoing line of TDSi placement students, as Managing Director John Davies elaborated, “As a business, we have a long heritage of supporting apprenticeships and placement students across all parts of our business, so we are always delighted to support a new student.” “Software Development is a key role within the access control and integrated security industry and one which is at the heart of what TDSi does, so Vlad is exactly the type of passionate young trainee professional we look to attract and support, as they enter the world of business as well as the technology of security.” About Vlad Radoi Vlad is looking forward to working directly with the TDSi team Originally from Romania (although he has lived in the UK for over 10 years) and a fan of the McLaren Formula One racing team and Arsenal Football Club, Vlad is looking forward to working directly with the TDSi team, as he stated, “Being at Bournemouth University has been fun and weird at the same time, for the last year and a half my experience has largely been online via Zoom and Teams, due to pandemic restrictions.” “However, I am excited to be getting first-hand experience in a commercial setting with TDSi, there is much to learn, and it will kickstart my career as a software engineer.” Gaining new experience Having started with TDSi at the beginning of August, Vlad is already working closely with the Software Development Team, helping it to enhance its GARDiS Access Control software for example. “At the moment, I am working with the GARDiS API, and whilst it is complex, I enjoy studying the intricacies of it. This role gives me lots of experience working with new frameworks and language, as well as learning how software development works in the real world.” Vlad is looking forward to the year ahead and added, “TDSi is an important player in the security and access control industry, and I look forward to learning a lot more about the company, its software, and software development as a whole.”
The 5 new Wisenet P series AI NVRs (Network Video Recorders) launched by Hanwha Techwin are able to apply AI metadata to images captured by most non-AI Wisenet cameras, allowing users to quickly and accurately search for people, and vehicles. Deep Learning AI video analytics The licence-free Deep Learning AI video analytics onboard the NDAA-compliant NVRs offer a wide range of search criteria, including, for example, looking for people of a certain age group or gender, as well as whether they are wearing glasses or carrying a bag. Similarly, a search for vehicles can be narrowed down to those of a particular colour and whether they are a bicycle, bus, car, motorbike or truck. The Network Video Recorders can also be set up to trigger real-time alarm notifications, if an object is detected. Support for wide range of cameras The new devices are able to support all the features built into the Wisenet P series AI cameras Selected bullet, fixed, PTZ, 360° fisheye, multi-directional and thermal cameras from the Wisenet X, P, Q and T series, are among the long list of cameras that are supported by the new Wisenet P series AI NVRs. In addition, as is the case with 32 and 64 channel Wisenet X NVRs, the new devices are able to support all the features built into the Wisenet P series AI cameras, including the classification and detection of faces and licence plates. Operators can take full advantage of the Network Video Recorders’ functionality, with the help of UX 2.0, a brand-new user interface that offers zoom in/out and drag & drop support, and a timeline preview feature, as well as enabling all event settings to be edited in a single window. Wisenet P series AI NVRs Other key features shared by the Network Video Recorders (NVRs), include the following: Up to 400Mbps network camera recording, at up to 32MP recording resolution Up to 16 SATA HDD bays, each offer 10TB storage data capacity. RAID-5 and RAID-6 support Dual 4K and 1080p HDMI outputs Simultaneous playback across all channels Dynamic event support, including e-mail alerts, PTZ preset control of PTZ cameras, control room buzzer and monitor Support for Wisenet AI and 8K cameras, and improved compatibility with all Wisenet PTZ, multi-directional and thermal cameras ONVIF Profile S conformant WiseStream II complementary compression technology The NVRs feature WiseStream II complementary compression technology, which improves bandwidth efficiency by up to 75%, in comparison to current H.264 technology, when combined with H.265 compression. The ability of the NVRs to support cameras, which are dual streaming video at different resolutions, can further reduce bandwidth requirements. The Network Video Recorders’ SATA HDDs are supported by Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T) The Network Video Recorders’ SATA HDDs are supported by Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T), which detects and alerts operators, to any possible imminent hardware failures. Offering N+1 failover support, the NVRs also feature Automatic Recovery Back-up (ARB), to provide continuity of recording and remove the risk of video evidence being lost. Automatic Recovery Back-up (ARB) facilitates the transfer and seamless storage of the images stored on a camera’s SD card, if communication between one of the Network Video Recorders and a Wisenet camera is disrupted. In addition, the new PRN-6405DB4 NVR is equipped with a dual switched-mode power supply (SMPS), to provide continuity of recording for mission-critical applications. GDPR compliance support and easy configuration Security personnel can apply bookmarks, in order to prevent the important video from being overwritten, with the NVRs programmed to automatically delete the bookmarked video, after a defined time period, so as to ensure compliance with GDPR. The installation time of the new Network Video Recorders is minimised, by the ability of engineers to remotely connect to the NVRs. This is achieved via a smartphone or tablet, without having to set up a complex network, by using P2P and unique QR product codes. Furthermore, the NVRs can be easily configured to match an end user’s requirements, with the help of an intuitive interface and installation Wizard. The new Wisenet P AI network NVRs are as follows: PRN-1605B2: 16 channel AI NVR. Up to 8 channels providing AI support. 2 HHD bays PRN-3205B2: 32 channel AI NVR. Up to 16 channels providing AI support. 2 HHD bays PRN-3205B4: 32 channel AI NVR. Up to 16 channels providing AI support. 4 HHD bays PRN-6405B4: 64 channel AI NVR. Up to 32 channels providing AI support. 4 HHD bays PRN-6405DB4: 64 channel AI NVR. Up to 32 channels providing AI support. Dual switch mode power supply (SMPS). 4 HHD bays Powerful detection tool “The accuracy of the Deep Learning AI video analytics incorporated into these new NVRs provides security personnel with a powerful tool to detect and track people, or vehicles that may be involved in criminal activity,” said Uri Guterman, the Head of Product & Marketing for Hanwha Techwin Europe. Uri Guterman adds, “By eliminating false alarms, which can occur when standard motion detection technology or sensors are being used to detect activity, the NVRs significantly reduce time wasting and allow security personnel to focus on responding to real incidents and emergencies.”
PSA, the consortium of professional systems integrators, announces the addition of viisights to its approved technology partners. viisights adds behavioural recognition systems for real-time video intelligence to the PSA offerings. “PSA is excited to be able to offer such an in-depth and advanced AI service to our integrators,” said Chris Salazar-Mangrum, PSA’s vice president of technology partners. Video surveillance systems “viisights is providing a technology that takes video surveillance to the next level and allows our integrators to advance their clients’ video analytics results. Our partnership with viisights is an example of how we aim to elevate the industries we serve through our relationships with industry-leading products and solution providers.” viisights is providing a technology that takes video surveillance to the next level" viisights developed technology that allows video surveillance systems to provide information on what subjects in the captured video feed are doing. Its system analyses real-time data to determine unique information for behavioural results of objects. These results assist in reviewing past and harmful activity as well as help to predict potential risks and hazards. viisights’ products and solutions have been utilised in a wide variety of markets such as smart cities, transportation hubs, enterprise and educational campuses, critical infrastructures and banking and financial sectors. Affordable video analytics “Partnering with PSA is a very important step to expand and establish our US presence,” said Pat Aiello, viisights’ Vice President of sales and business development in North America. “With PSA, we will quickly introduce to the market highly advanced, complete and affordable video analytics for helping with daily security, safety and environmental challenges.” A benchmark in video intelligence, viisights' behavioural analytics provide systems integrators with a new and unique selling proposition for existing and potential customers that will lead to business growth. viisights personnel will be at ISC East in November to discuss these opportunities in one-on-one meetings with potential technology partners and systems integrators. Video intelligence systems viisights leverages artificial intelligence to facilitate human-like pattern prediction" The company offers extensive support for integrators including project registration, price protection to protect and secure bids, engineering, design and implementation support, installation documentation and setup tools, training and certification for technical staff, application consulting for specialised projects, software demo licences and more. “viisights leverages artificial intelligence to facilitate human-like pattern prediction, creating fully autonomous video intelligence systems,” said Asaf Birenzvieg, CEO at viisights. “We go further than simple object recognition by analysing full-motion video for objects and their behaviour in the context that they operate in. Our real-time behavioural analytics transform video streams into actionable insights by autonomously recognising behaviours that demand immediate attention, allowing customers to be more proactive.” Protecting public privacy In this first phase, viisights will be offering PSA integrators to resell its flagship product, viisights wise, which is sold for on-premises configuration. Later in 2022, viisights is planning to release wise fully as a SaaS product. It is important to note that viisights technology protects public privacy by only analysing general behaviour patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or licence plates.
Videonetics, the world’s first AI & DL powered Unified Video Computing Platform (UVCP™) development company, announced that it has joined the Red Hat Partner Connect Program as an Independent Software Vendor (ISV) for Red Hat Enterprise Linux and Red Hat OpenShift in India and South Asia. Intelligent VMS 3.0 Videonetics Intelligent Video Management Software (VMS) 3.0 delivers a unified, next-generation user interface, military-grade security, rugged with unprecedented levels of high availability, and a future ready solution, for any size of deployment. It analyses the attributes of servers, storage, network communication, and other associated devices, with its AI algorithms in real-time, and intelligently uses the capability of those devices to offer a fault-tolerant, fail-safe, responsive, and rugged system for video management. It handles cybersecurity threats with its multi-pronged security measures to ensure users' data privacy, security, and data integrity. Operational over hybrid cloud environments Acclaimed as a market pioneer, Videonetics has secured more than 140 cities, 80+ airports, and 100+ large enterprises across many geographies. Powered by its patented and awarded AI and Deep Learning framework, Videonetics UVCP™ encompasses Intelligent VMS 3.0, Video Analytics, Intelligent Traffic Management System, Facial Recognition, Video Computing Platform as a Service (VCPaaS™), and Video Command Control Centre. Videonetics offers its AI and DL powered Unified Video Computing Platform on Red Hat Enterprise Linux and OpenShift Videonetics offers its Artificial Intelligence (AI) and Deep Learning (DL) powered Unified Video Computing Platform on Red Hat Enterprise Linux and Red Hat OpenShift to customers worldwide, opening numerous businesses as well as technology sharing opportunities for customers. In addition, Intelligent VMS 3.0 is certified to run on Red Hat Enterprise Linux and its container applications are certified to run on Red Hat OpenShift, offering greater consistency across hybrid cloud environments and reassuring customers that Intelligent VMS 3.0 can be supported on any Red Hat footprint. Software certification The Red Hat Partner Connect software certification uses modern delivery methods to support a hybrid cloud strategy to help partners build and run applications on any cloud. The program brings advanced, cost-effective collaboration and cloud-native development built on leading Red Hat technologies to deliver enterprise-grade IT services, whether on-premise or in the cloud. Through this collaboration, Videonetics can explore a range of open source technology solutions that are the foundations for digital transformation and innovation, including Red Hat Enterprise Linux and Red Hat OpenShift, the industry’s enterprise Kubernetes platform. Delivering scalable offerings With Red Hat Linux, Videonetics can deliver containerised offerings with multi-cloud deployment and management As a member of the Red Hat Partner Connect program, Videonetics gains access to resources to develop Red Hat technology competencies while building an open-source practice, adopting container-native technologies, attaining product certification and is listed on the Red Hat Ecosystem Catalog. With Red Hat Enterprise Linux, Videonetics can deliver more secure, ready-to-use, scalable containerised offerings with simplified multi-cloud deployment and management, helping reduce infrastructure costs with more efficient hardware use. Unified open source technologies Avinash Trivedi, VP - Business Development, Videonetics expressed, “We are delighted to be recognised as a Red Hat ISV Partner. By collaborating with Red Hat, we can provide truly unified solutions based on open-source technologies and practices, with an added layer of security features and easier maintenance, that helps ensure greater confidence and stability for customers.” “We intend to deploy advanced container native technologies across cities, municipalities, industries, aviation & mass transportation, education, and healthcare for a well-connected infrastructure.” Using cloud technologies Emerging workloads like video analytics are crucial building blocks of smart city and safe city initiatives in India" Neeraj Bhatia, Senior Director, Sales, Red Hat, India, and South Asia said, “Emerging workloads like video analytics are crucial building blocks of smart city and safe city initiatives in India.” “Videonetics is spearheading the adoption of cloud-native technologies which are key architectural imperatives that help the customer with agility and flexibility across on-prem or cloud deployments. This also ensures that ISVs like Videonetics can extend it to Edge footprints.”
Cyber threats hit the headlines every day; however digital hazards are only part of the security landscape. In fact, for many organisations - physical rather than virtual security will remain the burning priority. Will Liu, Managing Director of TP-Link UK, explores the three key elements that companies must consider when implementing modern-day business surveillance systems. 1) Protecting more than premises Video surveillance systems are undoubtedly more important than ever before for a huge number of businesses across the full spectrum of public and private sector, manufacturing and service industries. One simple reason for this is the increased use of technology within those businesses. Offices, workshops, and other facilities house a significant amount of valuable and expensive equipment - from computers, and 3D printers to specialised machinery and equipment. As a result, workplaces are now a key target for thieves, and ensuring the protection of such valuable assets is a top priority. A sad reality is that some of those thieves will be employees themselves. Video surveillance system Of course, video surveillance is often deployed to combat that threat alone, but actually, its importance goes beyond theft protection. With opportunist thieves targeting asset-rich sites more regularly, the people who work at these sites are in greater danger too. Effective and efficient surveillance is imperative not just for physical asset protection, but also for the safety From this perspective, effective and efficient surveillance is imperative not just for physical asset protection, but also for the safety of colleagues as well. Organisations need to protect the people who work, learn or attend the premises. A video surveillance system is, therefore, a great starting point for companies looking to deter criminal activity. However, to be sure you put the right system in place to protect your hardware assets, your people, and the business itself, here are three key considerations that make for a successful deployment. 2) Fail to prepare, and then prepare to fail Planning is the key to success, and surveillance systems are no different. Decide in advance the scope of your desired solution. Each site is different and the reality is that every solution is different too. There is no ‘one-size-fits-all solution and only by investing time on the exact specification can you arrive at the most robust and optimal solution. For example, organisations need to consider all the deployment variables within the system’s environment. What is the balance between indoor and outdoor settings; how exposed to the elements are the outdoor cameras; what IP rating to the need? A discussion with a security installer will help identify the dangerous areas that need to be covered and the associated best sites for camera locations. Camera coverage After determining location and coverage angles, indoors and outdoors, the next step is to make sure the cameras specified are up to the job for each location. Do they have the right lens for the distance they are required to cover, for example? It is not as simple as specifying one type of camera and deploying it everywhere. Devices that can use multiple power sources, Direct Current, or Power over Ethernet well are far more versatile You have to consider technical aspects such as the required level of visual fidelity and whether you also need two-way audio at certain locations? Another simple consideration is how the devices are powered. Devices that can use multiple power sources, Direct Current or Power over Ethernet as well are far more versatile and reliable. Answers to these questions and a lot more need to be uncovered by an expert, to deliver a best-of-breed solution for the particular site. 3) Flexibility breeds resilience Understanding exactly what you need is the start. Ensuring you can install, operate and manage your video surveillance system is the next step. Solutions that are simple to install and easy to maintain will always be favoured - for example, cameras that have multiple sources of power can be vital for year-round reliability. Alongside the physical aspect of any installation, there is also the software element that needs to be considered. The last thing organisations need is a compatibility headache once all their cameras and monitoring stations are in place. Selecting cameras and equipment with the flexibility to support a variety of different operating systems and software is important not just for the days following the installation, but also to future-proof the solution against change. Easy does it Once the system is up and running, the real work of video surveillance begins. Therefore, any organisation considering deploying a system should look to pick one that makes the day-to-day operation as easy as possible to manage. And again - that is all about the set-up. Cameras can also provide alerts if they have been tampered with or their settings changed The most modern systems and technology can deliver surveillance systems that offer smarter detection, enhanced activity reporting so you learn more about your operations, and also make off-site, remote management easy to both implement and adjust as conditions change. For example, camera software that immediately notifies controllers when certain parameters are met - like motion detection that monitors a specific area for unauthorised access. Cameras can also provide alerts if they have been tampered with or their settings changed without proper authorisation. Remote management of HD footage What’s more, the days of poor quality or unreliable transfer of video are long gone. The high-quality HD footage can be captured, stored, and transferred across networks without any degradation, with hard drives or cloud-based systems able to keep hundreds of days of high-quality recordings for analysis of historical data. Finally, the best surveillance solutions also allow for secure remote management not just from a central control room, but also from personal devices and mobile apps. All this delivers ‘always-on’ security and peace of mind. The watchword in security Modern video surveillance takes organisational security to the next level. It protects physical assets, ensures workplace and workforce safety, and helps protect the operations, reputation, and profitability of a business. However, this is not just an ‘off-the-shelf purchase’. It requires proper planning in the form of site surveys, equipment and software specifications, as well as an understanding of operational demands and requirements. Investing time in planning will help businesses realise the best dividends in terms of protection. Ultimately, that means organisations should seek to collaborate with vendors who offer site surveys - they know their equipment best, your needs, and can work with you to create the perfect solution.
The evolution of smart video technology continues at pace. As in many other industries, the onset of the COVID-19 pandemic expedited timelines and the artificial intelligence (AI) video world is continuing its rapid evolution in 2021. As video demand and the use of AI to make sense of the visual data increase, the number of cameras and subsequent data produced are growing rapidly, and these are forcing the creation of new edge architectures. Cameras and AI in traffic management ‘Smart factories’ can leverage AI to detect flaws or deviations in the production line in real time In addition, a new generation of ‘smart’ use cases has developed. For example, in ‘smart cities’, cameras and AI analyse traffic patterns and adjust traffic lights, in order to improve vehicle flow, reduce congestion and pollution, and increase pedestrian safety. ‘Smart factories’ can leverage AI to detect flaws or deviations in the production line in real time, adjusting to reduce errors and implement effective quality assurance measures. As a result, costs can be greatly reduced through automation and earlier fault detection. Evolution of smart video The evolution of smart video is also happening alongside other technological and data infrastructure advancements, such as 5G. As these technologies come together, they’re impacting how we architect the edge. And, they’re driving a demand for specialised storage. Listed below are some of the biggest trends that we’re seeing: Greater volume means greater quality The volume and variety of cameras continue to increase with each new advancement, bringing new capabilities. Having more cameras allow more to be seen and captured. This could mean having more coverage or more angles. It also means more real-time video can be captured and used to train AI. Quality also continues to improve with higher resolutions (4K video and above) Quality also continues to improve with higher resolutions (4K video and above). The more detailed the video, the more insights can be extracted from it. And, the more effective the AI algorithms can become. In addition, new cameras transmit not just one video stream, but also additional low-bitrate streams used for low-bandwidth monitoring and AI pattern matching. Smart cameras operate 24/7 Whether used for traffic management, security or manufacturing, many of these smart cameras operate 24/7, 365 days a year, which poses a unique challenge. Storage technology must be able to keep up. For one thing, storage has evolved to deliver high-performance data transfer speeds and data writing speeds, to ensure high quality video capture. And, actual on-camera storage technology must deliver longevity and reliability, critical to any workflow. Real world context is vital to understanding endpoints Whether used for business, in scientific research or in our personal lives, we’re seeing new types of cameras that can capture new types of data. With the potential benefits of utilising and analysing this data, the importance of reliable data storage has never been more apparent. Considering context when designing storage technology As we design storage technology, we must take the context into consideration, such as location and form factor. We need to think of the accessibility of cameras (or lack thereof), are they atop a tall building or maybe amid a remote jungle? Such locations might also need to withstand extreme temperature variations. All of these possibilities need to be taken into account, so as to ensure long-lasting, reliable continuous recording of critical video data. Chipsets are improving artificial intelligence (AI) capability Improved compute capabilities in cameras means processing happens at the device level, enabling real-time decisions at the edge. New camera chipsets deliver enhanced AI capability We’re seeing new chipsets arrive for cameras that deliver improved AI capability, and more advanced chipsets add deep neural network processing for on-camera deep learning analytics. AI keeps getting smarter and more capable. Cloud must support deep learning technology Just as camera and recorder chipsets are coming with more compute power, in today’s smart video solutions most of the video analytics and deep learning is still done with discrete video analytics appliances or in the Cloud. To support these new AI workloads, the Cloud has gone through some transformation. Neural network processors within the Cloud have adopted the use of massive GPU clusters or custom FPGAs. They’re being fed thousands of hours of training video, and petabytes of data. These workloads depend on the high-capacity capabilities of enterprise-class hard drives (HDDs), which can already support 20TB per drive and high-performance enterprise SSD flash devices, platforms or arrays. Reliance on the network Wired and wireless internet have enabled the scalability and ease of installation that has fuelled the explosive adoption of security cameras, but it could only do so where LAN and WAN infrastructures already exist. 5G technology aids camera installations Emerging cameras that are 5G-ready are being designed to load and run 3rd party applications 5G removes many barriers to deployment, allowing expansive options for placement and ease of installation of cameras at a metropolitan level. With this ease of deployment comes new greater scalability, which drives use cases and further advancements in both camera and cloud design. For example, cameras can now be standalone, with direct connectivity to a centralised cloud, as they’re no longer dependent on a local network. Emerging cameras that are 5G-ready are being designed to load and run 3rd party applications, which can bring broader capabilities. Yet with greater autonomy, these cameras will need even more dynamic storage. They will require new combinations of endurance, capacity, performance, and power efficiency, to be able to optimally handle the variability of new app-driven functions. Paving the way for the edge storage revolution It’s a brave new world for smart video, and it is as complex as it is exciting. Architectural changes are being made to handle new workloads and prepare for even more dynamic capabilities at the edge and at end points. At the same time, deep learning analytics continue to evolve at the back end and the Cloud. Understanding workload changes, whether at the camera, recorder, or the Cloud level, is critical to ensuring that new architectural changes are augmented by continuous innovation in storage technology.
Since the early 1920s, when the transition to fast food consumption began with the grand opening of White Castle in Wichita, Kansas, fast-casual dining has appealed to a fast-paced way of life – offering convenience and affordability. Today, fast-casual restaurants are as popular as ever, continuing to challenge restaurants to offer a consistent brand experience. This requires security and safety operations to be conducted at a volume and pace too rapid for humans to consistently monitor and execute productively. 24/7 safety and security Many major fast-food chains, such as McDonald’s, Burger King, KFC, Chick-fil-A, etc., operate sophisticated systems to ensure safety and security in restaurants 24/7. This sets a standard for security hardware and equipment in all locations. These include video surveillance systems, alarm systems, time-delay safes, fortified drive-thru windows, and robbery prevention training for the entire staff. Smart security cameras help operators automate the monitoring and analysing of visitor and employee behaviour The monitoring of video surveillance systems offers the highest level of return amongst these technologies when fast-casual chains are looking for simplified automation and optimisation of operations. Smart security cameras that combine the Internet of Things (IoT) and security cameras with Artificial Intelligence-enabled video analytics, help operators automate the monitoring and analysing of visitor and employee behaviour. By gaining valuable insights from video data, restaurant operations can be optimised, and customer experience will be enhanced. Maintaining consistency Optimised execution and consistent quality are barriers faced by many fast-casual food chains, and when coupled with rising labor costs, low training, and high employee turnover, are making the case for technology solutions designed to help with consistent execution. However, very few are taking advantage of digitised, or automated, opportunities. According to the Zenput, 2020 Restaurant Ops Report, 27 percent of operators say their company is embracing technology to automate various aspects of their organisation “to a great extent.” However, 83 percent of operators who have embraced automation, report their experience has been positive. Positive customer experience Smart cameras equipped with AI-video analytics are also helping food retailers to ensure consistency Because uniformity of the customer experience is an important aspect of fast-casual spaces, each location must streamline the entire process, from customer line entry to order, production, and delivery and exit. Smart cameras equipped with AI-video analytics are also helping food retailers to ensure consistency across locations and processes in a variety of innovative ways. One restaurant that was able to increase sales based on business intelligence gathered from smart cameras was Happy Donazz & Co, a German baked goods chain specialising in American-style donuts. With 15 franchise outlets occupying a mix of locations, including in shopping centres and some inside major food retailers, the German chain needed a consistent way to analyse the performance of individual outlets. This information would be used to create internal benchmarks for corporate and franchisee use as well as to provide individual franchise owners intelligence to make improvements and boost individual store sales. Enhanced restaurant layout Happy Donazz deployed a footfall application in its stores to monitor visitor traffic and customer flow. By gathering visual analysis over time, Happy Donazz was able to detect and respond to customer flow patterns. Through the use of heat mapping applications, a geographical representation of the data can be gained from camera systems, enabling operators like Happy Donazz to easily identify critical areas and take appropriate action to optimise the layout. For example, if a restaurant offers a self-checkout or online order pick-up station, smart cameras can help decision-makers in designing the best possible routes through a restaurant for customers. Over time, analysis can also help identify weaknesses in restaurant layout and improve overall customer experience. By offering real-time insights, cameras can also help to spot loitering in the restroom or identify suspicious behaviour in corners or hallways that are difficult to monitor. The cameras can also monitor the self-checkout or online order pick-up areas for suspicious behaviour and possible thefts. Video analytics for streamlined staffing and operations Smart security cameras analyse restaurant occupancy to plan to staff based on actual demand, rather than just feeling Proper staffing for busy times can be difficult for many fast-casual restaurants. Smart cameras can help fine-tune and optimise personnel planning by analysing restaurant occupancy continuously. This ensures managers can keep enough staff on hand at all times, creating superior customer experiences. Smart security cameras detect visitors entering and leaving a restaurant, using people counting applications, and analyse restaurant occupancy over time enabling managers to plan to staff based on actual demand, rather than just gut feeling. The future of AI video analytics in fast-casual restaurants Today’s technology has evolved from “digital” to “smart,” leveraging AI to gain better insights into business operations and understand customer behaviour. While fast-casual restaurants have been required to adapt to modern technologies faster than other restaurants due to the speed and accuracy requirements of production, this offers them the unique opportunity to be some of the first to leverage video analytic technology. With this in mind, fast-food/fast-casual restaurants can ensure each store is running as optimally as possible, offering consistent experience and ensuring quality standards are being met – ushering in the dining experience of the future.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
In a surveillance monitoring context, video metadata refers to the structured details that the user can extract from given video footage. It is data that provides information about other data – a “data about data” in short. Human-based video metadata, as its name suggests, are data derived from human targets in the monitored scene. It can be utilised based on user’s requirements to significantly enhance the management and operation of various application scenarios, while carefully maintaining people’s privacy at the same time. To give some insights into its practical usage, here are three conventional applications of human-based video metadata to adopt based during monitoring needs: 1) Searching targets One of the most common applications of human-based video metadata is for target searching after an event. Intelligent surveillance devices, such as the Dahua WizMind products, offer a Quick Target Search function that can locate suspects in time using their physical attributes. Irrelevant targets in the captured images are filtered out by the back-end devices (IVSS, NVR) or by the platform Target attributes include beard, glasses, mask, hat, etc., which are continuously being developed and increased to meet the requirements of various application scenarios. Irrelevant targets in the captured images are also filtered out by the back-end devices (IVSS, NVR) or by the platform. It can capture up to 640* targets (with attributes) per second with an impressive detection rate of 98%*. Generating statistics In addition, another useful application of human-based video metadata technology is for target statistics. WizMind counts in real time the human targets in the monitored scene and filters them based on target category and direction. The directions include A>B, B>A, or A<>B. And to top it up, it can also generate reports by year, month, and day. It can capture up to 96** objects per frame, providing a detection rate of 98%** and an accuracy rate of 96%**. 2) Detect PPE wearing WizMind can detect wearing PPEs in construction sites including safety hats, protective vests, face masks, and glasses Wearing personal protective equipment or PPE is a must on any construction site. Depending on the scope of the project, monitoring the proper wearing of PPEs on the site could be a tough challenge to implement. The latest PPE Detection Technology of Dahua WizMind can detect wearing of commonly used PPEs in construction sites including safety hats, protective vests, face masks, and glasses. It can even detect the colour of the uniforms (top and bottom) of workers. When a violation has been detected, the site supervisor or manager can be notified via the DMSS mobile app. Similar to target searching and statistics functions, it also offers a detection rate of 98%**, with an accuracy rate of 96%**. 3) Aid city road planning Who would have thought that aside from vehicle-related data, statistics related to people on the street can also be useful in planning city roads? By collecting attributes of pedestrians, directions, and periods, local road planning departments can design better roads tailored for road users and commuters. One good example is the Dahua solution developed for a local organisation in Ireland. Aside from motor vehicles and non-motor vehicles, metadata of pedestrians are also captured on main city roads and streets around plazas. These data are then securely transferred to an SFTP server for further data analysis. The data summary is relayed to the local transportation department to help them plan and manage streets more efficiently. Key Takeaways Human-based video metadata can be effectively utilised to optimise the monitoring operation of various application scenarios. Metadata based on human targets can be used to search suspects after an event, and to generate accurate statistics of the people in the monitored scene. Also, these structured data can be used to detect proper wearing of PPEs in a particular site, and help local transportation departments in planning and maintaining city roads to benefit the general public.
Ipsotek, an Atos company and a pioneer in Artificial Intelligence-powered video analytics, has announced the fulfillment of its contract with Sydney Trains, the operator of rail services across the metropolitan Sydney area, to increase security capabilities at 13 railway stations. Following a competitive tendering process, Ipsotek was selected by Sydney Trains, to deliver an AI-based video analytics solution. This has seen the train operator, Sydney Trains, integrate a range of Ipsotek’s AI-powered video analytics solutions with its security cameras, to identify incidences of tunnel and track intrusion at its 13 stations, located across the metropolitan Sydney area. AI-based video analytics solution Ipsotek’s AI solutions are at the core of Atos Computer Vision Platform, a unique end-to-end computer vision platform that offers pre-trained & customisable AI models, powered by the BullSequana server range, enabled by NVIDIA GPUs and enriched by worldwide expert labs. Mark Edmonds, the Manager of Security Capability for Transport at Sydney Trains, commented “Sydney Trains chose Ipsotek, after an extensive comparison of a number of products. Ipsotek’s proven track record in the AI Video Analytics space, its partnership with Genetec and its work with Innovate UK’s Small Business Research Initiative (SBRI) for railway-focused AI applications, made it a well-deserved choice.” Enhancing security at Sydney Trains’ stations The project with Sydney Trains is the second transportation project in the region for Ipsotek Chris Bishop, Sales Director APAC & Marketing Director at Ipsotek, said “As a British SME, competing against some of the industry’s big-named companies, we are delighted to have been chosen by Sydney Trains, to deliver this project. It represents a welcome validation of our expertise within the transportation and more specifically, the rail sector and we are proud to have supported Sydney Trains with its commitment, to delivering enhanced security practices across its network.” The project with Sydney Trains is the second transportation project in the region for Ipsotek, which is working with accelerated computing solutions firm, NVIDIA on implementation. Ipsotek, member of NVIDIA Metropolis partner group Ipsotek is a member of the NVIDIA Metropolis partner programme, which brings together a computing platform and extensive ecosystem of specialists, to help create smarter spaces and solve some of the world’s most pressing problems, which involve operational efficiency and public safety. Sudarshan Ramachandran, the Country Manager, Enterprise, ANZ at NVIDIA, commented “As an NVIDIA Metropolis partner, Ipsotek delivers incredibly valuable capabilities, solving deeply challenging video-analytics problems using AI and the NVIDIA GPU accelerated computing stack.” AI video analytics for public transport Ipsotek’s project with Sydney Trains follows the company’s previous success in delivering an initial programme of work via the Innovate UK SBRI initiative, for the development of AI video analytics, to enhance the rail experience for passengers and staff in the UK.
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people, living in nursing facilities, die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those patients who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Rise in nursing home patient falls Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the chances of falling when compared to seniors who live in a regular residential community. It has been a prevalent challenge to detect falls quickly and effectively, especially when these occur in residents’ bedrooms. In the United Kingdom, the Care Quality Commission has recognised that the use of CCTV may be one of the best ways to ensure safety and quality of care. However, using video surveillance also brings into question other security issues, such as privacy and data protection. Dahua’s WizMind technologies WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals This is where Dahua Technology’s WizMind technologies come into play. WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals, such as retail, energy, finance, transportation and of course, health and social care. Specific to the health and social care sector are deep-learning algorithms, to protect the privacy of the face and body in real-time, and stereo analysis, which combines dual-lens cameras with three-dimensional scene analysis, in order to detect sudden physical movement, such as falls. Stereo video analysis The growth of AI applications has enabled the greater availability of 3D scene analysis solutions, thereby enabling objects and people to be analysed in three dimensions. Dahua Technology’s stereo analysis uses two lenses, in order to capture separate images of the same scene. It then computes the ‘optical parallax’ of spatial points in the two images, providing 3D information of the scene. The stereo vision mimics the depth of view that comes from humans having two eyes, known as binocular vision. Combined with deep-learning algorithm Combined with a deep-learning algorithm, stereo analysis can recognise event patterns, such as falls and other movement-based behaviours, such as people approaching, the detection of an abnormal number of people in an area, and violent behaviour. In nursing and care homes, stereo analysis cameras can help staff monitor residents, in case of emergency and respond to residents’ problems, such as tripping and falls. The cameras can view all three dimensions of subjects and together with its deep-learning algorithm, can immediately alert staff to any unusual or sudden movement, such as would be evident in a fall. Cameras in communal areas and bedrooms With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents, which may otherwise stay undiscovered for hours. An example of such a scenario is a nursing home in Singapore, which has a capacity of around 400 beds and is divided into 14 separate living environments, with each designed to be a home-like living area. Dahua cameras with intelligent fall detection technology Dahua cameras, such as IPC-HDW8341X-BV-3D with intelligent fall detection technology were installed, including the provision of 167 stereo analysis cameras inside each bedroom. These trigger an alarm, in the case of incidents, such as a fall, allowing immediate response by staff. Not only does this enhance the well-being and safety of residents, but it also can reduce the nursing home’s labour costs. In addition, Stereo Analysis can also be applied in other application scenarios. An underground unmanned bicycle parking garage in Amsterdam, for instance, has installed Dahua Technology’s behaviour analysis cameras, to detect abnormal events and prevent accidents, such as people tripping and falling, or suspicious individuals wandering around the area. Privacy Protection 2.0 technology While monitoring their situation inside the nursing home, Dahua also adopts Privacy Protection 2.0 technology that features masking of human face and body, to protect the residents’ privacy. It involves the restriction of what can be seen in video images and applies equally to live, and recorded images. Digital masking takes place on the front-end device (e.g. network camera). Dahua’s Privacy Protection 2.0 provides real-time occlusion of the body and face and enables users to access recorded videos, without having to overlay faces with mosaic masks. It also offers additional occlusion options, such as irregular polygons, mosaics and coloured blocks, and allows code exporting based on specified targets, ensuring the privacy of subjects. Privacy and security in evidence collection Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities Benefits offered include non-pixelated human targets, allowing for privacy and security in evidence collection. The technology also allows for face and human attributes analysis, without breaching people’s privacy, making it ideal for nursing homes. Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities. It allows the close monitoring of residents or patients to help ensure their well-being and safety, while at the same time protecting the privacy of often vulnerable individuals. Dahua TechMonth As part of the Dahua TechMonth, this blog highlights how Dahua’s stereo analysis technology, combined with privacy protection, can provide a valuable tool to help staff respond to incidents quickly and efficiently, including falls, without infringing on people’s data protection rights. In the next blog, Dahua Technology will be discussing the WizMind application of human metadata, enabling users to maximise situational awareness and analysis of events.
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe. Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud. Allowing genuine access via MFA Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting? Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities. This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly. Need for secure and accurate user experience The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over. Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020. "The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
Here East is an innovation and technology campus located at the heart of Queen Elizabeth Olympic Park in London, UK. Once the Press and Broadcast Centre for the 2012 Olympic Games, it is home to a thriving community of over 4,500 creative, academics, and innovators. Designed as a mini-city, the campus is a mixed-use development that houses offices, retail units, university facilities, cultural exhibitions, and public spaces. Notable tenants include BT Sport, the V&A Museum, Sports Interactive, and the studios of noted choreographer Wayne McGregor. In total, the site offers 1.2 million square feet of flexible space and caters to a wide range of visitors. Modernising data The previous video management system was still functioning. Yet, Here East’s Head of Security, Leighton Jones, was familiar with the Genetec unified platform and was confident it could deliver more. The advanced capabilities of the Genetec system would enable his team to gain a deeper understanding of the environment, resolve incidents in real-time and ensure a positive user experience. “Here East is a truly iconic location with a diverse list of high calibre visitors and tenants,” explains Jones. “I wanted to be able to say we use the best technology available and in my experience that is Genetec.” Here East has begun a multi-year phased adoption of Genetec solutions, starting with the deployment of Genetec Clearance to modernise data handling and the secure sharing of digital evidence. GDPR compliance Implementation of the EU GDPR has led Here East to revisit its processes for the sharing of video surveillance footage Like many organisations, the implementation of the EU General Data Protection Regulation (GDPR) has led Here East to revisit its processes for the sharing of video surveillance footage. Each time Here East received a validated evidence request, operators burned footage onto physical storage media such as a CD or a USB stick. The process was time-consuming and also created chain-of-custody issues. Here East had no control over how that footage was stored and shared by others. “It wasn’t a situation I was comfortable with,” explains Jones. “We find ourselves needing to share footage internally and externally. We need to retain controls on our data.” Clearance simplifies evidence sharing All digital evidence is now collected, shared, and distributed through Genetec Clearance. The team at Here East can put appropriate safeguards in place to minimise the risk of footage being inappropriately shared or lost. For example, it can specify viewing rights for specific users, set time limits, and revoke access to previously shared footage. The automatic redaction features available within Genetec Clearance have also streamlined the processing of requests for video evidence. Under the terms of the EU GDPR, any citizen can submit a subject access request, with Article 15 of the legislation presenting specific challenges concerning video surveillance. Article 15 states “the right to obtain a copy… shall not adversely affect the rights and freedoms of others. Video surveillance operators must redact the identities of multiple other third parties in relevant frames of video before footage can be shared. On a busy night, the canalside restaurants and bars on the Here East site can contain 1,000 people in a single camera’s field of view. Before the user had to spend significant time manually redacting the identifies of innocent parties in the footage. With Genetec Clearance, that task is instant and automated. Improved incident reporting capabilities Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back to the senior management. Each month the Here East team runs an automated report breaking down incidents by time, date, and location. It then uses this data to make recommendations surrounding security operations and the deployment of resources. Where it’s applicable they run educational workshops for tenants. For example, phone snatching and bike theft are two of the most common crimes in their London borough. By closely monitoring the data, Here East can take proactive steps to detect, deter, and discourage perpetrators from operating on the Here East site. “It’s all well and good having the data but the most important thing is being able to visualise it, spot the meaningful patterns, and take the right preventative actions,” explains Jones. “Genetec Clearance makes this seamless”. The foundations for future growth Here East is still in the early phases of a long-term rollout with Genetec but is already benefitting from a unified approach to security, digital evidence-sharing, and operations. Further deployments will see the innovative site continue to work closely with Genetec to maximise value, push the boundaries of the technology and exceed the expectations of its tenants. “We’re continuing the legacy of the 2012 Olympics and have ambitious plans for the day-to-day management of this iconic site,” concludes Jones. “Our tenants expect a gold medal standard service and we have no intentions to disappoint”.
Four out of every five (82%) of existing CCTV and video monitoring systems are set to be extended to help keep schools and colleges ‘COVID Safe’, found a new education sector study of 91 education organisations based in the UK, US, Sweden, and Norway, carried out by video security as a service (VSaaS) provider AVA Security in March 2021. Many schools and colleges have already adapted their video monitoring systems to support COVID safety measures. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 6 months. Adopting video monitoring/CCTV technologies The AVA Security Education Sector Trends Report 2021 just out, provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 6 months. New COVID Safe-specific video analytics 29% were using their existing video systems to help provide temperature level health checks at some building entrances Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the 6 months. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels inside retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 6 months. Mask and face recognition systems Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 6 months. However, the Education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22% of schools and colleges have deployed facial recognition to date, although this is set to more than double to 29% over the next 6 months. The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely before the end of 2021. Cybersecurity becomes a key IT priority There has been an increased focus on cybersecurity to protect access to vital data and online learning resources As IT, operations, and security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few months, the University of Hertfordshire experienced a major cyberattack that led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. VSaaS selection criteria For the 82% of all education respondents actively considering Video Security as a Service (VSaaS) options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS in 2021, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ Reduced costs and ease of use The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people. While 24% of education sector decision-makers considering VSaaS, said the provider needed not to be headquartered in mainland China. Integration with existing camera systems A net 80% of video monitoring system decision-makers in the education sector also considered it important A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment. A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Video analytics An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and colour searching’. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimising the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection Education sector video monitoring system decision-makers are considering VSaaS and weighing up criteria for selection" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Video security solutions Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Round table discussion
Artificial intelligence (AI) is simultaneously an emerging technology, a common term in popular culture, and a buzzword in the security industry. But these aspects of the term can lead to misunderstanding in the marketplace. AI technology is continuing to emerge, but what is the reality today? How do depictions of AI in popular culture impact how it is understood in the real world of security? As a buzzword, at what point does marketing hype garble our understanding of reality? We asked this week’s Expert Panel Roundtable: What are the misconceptions about AI in security?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
Surveillance software: Manufacturers & Suppliers
- Milestone Surveillance software
- CCTV Software Surveillance software
- Panasonic Surveillance software
- Vanderbilt Surveillance software
- Hanwha Techwin Surveillance software
- Bosch Surveillance software
- Axis Communications Surveillance software
- Geutebruck Surveillance software
- artec Surveillance software
- Vicon Surveillance software
- Genetec Surveillance software
- Verint Surveillance software
- March Networks Surveillance software
- ADPRO Surveillance software
- FLIR Systems Surveillance software
- Siqura Surveillance software
- eneo Surveillance software
- TeleEye Surveillance software
- TDSi Surveillance software
- AxxonSoft Surveillance software
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download