Edge360 announced the launch of its new Video Management Software (VMS), Surveill VMS, which is the first fully containerised VMS running on micro services.
Surveill VMS was originally created to support the U.S. government on a global scale and now offers the private sector a true-enterprise surveillance technology that can scale with their business.
“Edge360 makes products that are operationally-appropriate, specifically designed to answer to real-world issues in mission-critical environments,” said John Rezzonico, the Chief Executive Officer (CEO) at Edge360.
True enterprise solution
John Rezzonico adds, “Surveill VMS was built with purpose. To provide a true Enterprise solution that scales horizontally with a reduced hardware footprint in a solution that is easy to maintain, even on a global scale.”
Features of Surveill VMS include, but are not limited to:
Containerised platform - Multiple micro services running on a single server, communicating in a virtual environment.
Built-in fail over and redundancy.
API-First Technology ready to integrate with third-party security solutions.
Meeting modern security needs
Surveill is available now, offering options for organisations of any size. Edge360 is a Service-Disabled Veteran-Owned Small Business (SDVOSB), built to bridge the gap between intelligence analytics and security imperatives.
Edge360’s software platforms are tailor-made to address the most pressing security needs of the time and are scalable to take on future challenges.
Pro Cloud SaaS announces it’s new partnership with Ava Security. Ava Security is uniquely positioned to deliver both cyber security and physical security solutions to organisations worldwide.
Pro Cloud SaaS is a global organisation and partners with the most recognised SaaS providers and SaaS consumers on the planet. Their Professional Services Engineers are strategically located in Australia, India, Qatar, Zambia, Belgium, Chile, the United Kingdom and the United States to provide clients with global delivery and 24/7 support.
Cyber security solution
“By adopting a unified approach to both cyber and physical security, organisations can proactively protect their most valuable assets - their people, property, and critical infrastructure. Our combination of market-leading cyber and video security technology is becoming increasingly powerful for organisations looking to improve their security posture, in both the physical and digital worlds. This strategic partnership with Pro Cloud SaaS will help us increase our reach and promote Ava Security’s approach worldwide, through a trusted cloud solutions provider,” said Tormod Ree, CEO of Ava Security.
Ava’s human-centric cyber security solution - Ava Reveal - employs a powerful combination of policy, machine learning sensors and real-time user education to prevent IP theft and sabotage, improve cyber hygiene, and accelerate threat hunting.
Video surveillance solution
Ava Reveal helps organisations to detect, monitor, and respond to insider threats in real-time
Ava Reveal helps organisations to detect, monitor, and respond to insider threats in real-time - protecting their users, data and reputation. Ava’s end-to-end intelligent video surveillance solution - Ava Aware - delivers proactive video security and insight, including integrated video and audio analytics uniquely powered by machine learning algorithms, smart appliances, and smart cameras.
The Ava Aware platform can also add intelligence to existing video security systems helping organisations to detect threats, human or vehicle and raising alerts to respond in real-time. Ava Aware increases security efficiency, streamlines forensics and searches, and provides valuable operational insights and data beyond traditional surveillance systems.
Potential security threats
"Ava Security is a gamechanger and a very complementary fit with Pro Cloud SaaS's Tier One Eco Partners," said Shane Hannan, Pro Cloud SaaS Founder and Managing Director APAC. "Ava is a true SaaS platform that will help our customers on their migration to the simplicity and security of the cloud. Many customers are stuck with on-prem video security data storage and servers, which is costly and potentially vulnerable to cyber-attacks.”
“Ava removes this burden along with providing advanced analytics/machine learning. This feature provides real-time incident alerts vs. time-consuming forensic investigation." Pro Cloud SaaS looks forward to working with Ava Security to help mobilise companies and keep them protected from all potential security threats - malicious, careless, or accidental.
March Networks, a global video surveillance and video-based business intelligence solutions company, is pleased to announce a new highly scalable Linux version of its Video Management Software (VMS) that can support up to 3,000 cameras on a single server.
Command Recording Software
The latest release of March Networks Command Recording Software offers unparalleled flexibility and scalability for customers. In addition to Windows systems, the software now works with Linux-based Operating Systems (OS), offering an unprecedented ability to support up to 3,000 IP channels on one server.
March Networks has achieved this scale by leveraging Docker container technology, an open-source platform
March Networks has achieved this scale by leveraging Docker container technology, an open-source platform that can speed the delivery of cloud-based applications, centralised video storage and cloud recording – all elements of the March Networks VMS roadmap.
Using the solution, customers can lower infrastructure costs with fewer servers. They can move toward centralised storage, by streaming cameras to just one server in an on-site data centre.
“We added the Linux option for our VMS because of its superior security and Docker support, which provides the scalability our customers need as well as the foundation for our cloud recording solution,” said Net Payne, Chief Sales & Marketing Officer, March Networks.
Net Payne adds, “This platform further builds on March Networks’ 20-year history of offering highly secure, enterprise-class Linux recording solutions.”
Net Payne notes that Command Recording Software uses a customised OS that removes unnecessary services and applications, reducing the likelihood of cyber-attack. It offers complete end-to-end encryption (from camera to recorder to enterprise management system to client software), with cameras supporting RTP/RTSP over HTTPS.
X-Series Hybrid Recorders
For customers that prefer a purpose-built appliance, the software is also embedded on March Networks’ new X-Series Hybrid Recorders. The high-performance recorders are optimised to support Artificial Intelligence (AI) applications with NVIDIA system-on-chip (SOC) technology.
The high-performance recorders are optimised to support Artificial Intelligence (AI) applications
New 4, 8 and 12-channel versions of the X-Series – ideal for ATM and small retail installations – are now available for order and shipping later this quarter. Net Payne adds, “Our VMS platform’s flexible architecture, supporting both Windows and Linux-based systems, as well as running on our X-Series recorders or commercial off-the-shelf servers and virtual machines, makes it an ideal solution for almost any business.”
Retail warehouses and distribution centres
He further said, “Large organisations with high camera counts including retail warehouses and distribution centres, school campuses, airports and corporate headquarter locations will particularly benefit from the solution’s scalability, high availability and failover recording.”
The platform also offers:
Business intelligence – When integrated with March Networks Searchlight data analytics software, customers can enjoy access to people counting, queue length and dwell time analytics as well as ATM or POS transaction data overlaid on the video.
Compatibility with March Networks’ hosted Command Enterprise Software for a cloud-managed video solution offering real-time health monitoring, and centralised system and user management.
Convenient external recording options (DAS, NAS and SAN).
Remote viewing with the March Networks Command Mobile app or the March Networks Web Client.
March Networks will showcase Command Recording Software and its X-Series Hybrid Recorders at ISC West, booth #12045, July 19-21, at the Sands Expo Convention Center in Las Vegas, Nevada.
Motorola Solutions announced the newest addition to its video security and analytics portfolio, the Compass Decision Management System™ (Compass).
Compass provides organisations with security intelligence that helps users prevent human error by outlining standard procedures, automating incident reporting, and highlighting key performance indicators to achieve effective and consistent outcomes.
Real-time event response
By enabling security managers to customize step-by-step procedures that guide their teams, Compass advises on how to best respond to real-time events such as intercom calls, intrusion and fire alarms, video analytic events, or addressing a technical issue.
This is aided by video streams and audio calls so that users can provide prescriptive and consistent responses to incidents.
Video management and access technologies
In addition, Compass integrates with Motorola Solutions’ video management and access control systems to improve the consistency and effectiveness of their team’s responses.
By integrating with Avigilon Control Center, Avigilon Access Control Manager, Pelco VideoXpert, and IndigoVision Control Center, Compass becomes a key element of a combined solution of video management, access control, and decision management.
Effective and efficient
Compass with video management and access control solutions can help organisations gain full visibility "
“Motorola Solutions is delivering the technologies that companies need to achieve their security goals,” said John Kedzierski, senior vice president of Video Security & Analytics at Motorola Solutions.
“By combining Compass with our video management and access control solutions, organisations can gain full visibility into their security operations and enable them to be efficient and effective in every response.”
The introduction of Compass is a part of Motorola Solutions’ ongoing commitment to the integration of security technologies that remove system silos and simplify workflows to provide unparalleled safety, efficiency and productivity.
Prices and delivery times for essential components in CCTV systems are being driven up as demand soars from other industries. Secure Logiq’s Robin Hughes explains the current state of the market.
Component shortages and supply chain challenges are a hot topic in just about every industry based on semi-conductors and silicon chips right now, and security is no exception.
It’s common knowledge that the global Covid lockdown caused a shutdown in the mining of silicon and spherites as large industries such as motor manufacturing cancelled or postponed their chip orders – this has caused a supply gap that every industry is feeling.
However, there is a second challenge that is hitting the security sector particularly hard, and it may not be one you are expecting – cryptocurrencies.
Cryptocurrencies and security
When people discuss cryptocurrencies and security, thoughts often turn to cybersecurity and ransomware payment tracking. But the issue for the majority of the security industry comes from crypto mining.
When it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining
GPUs (Graphics Processing Units) are a key component in CCTV, they decode images and display them onto screens. With the increase of video analytics, these have also become key to running the complicated algorithms required for creating the metadata and presenting it in a meaningful way for end-users. However, when it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining.
Demand for GPUs
When Bitcoin prices were relatively low, it was hard to justify the cost of a GPU and the associated power consumption for Bitcoin mining applications.
But as the price of Bitcoin has increased exponentially, demand for GPUs to do the number-crunching has grown dramatically causing a major shortage and huge price hikes. This rise in prices is not correlated with an increase in technological performance on the new GPUs, it is entirely a case of demand outstripping supply and a resulting bidding war.
To put this in context, cards are currently going new for around twice the original price and manufacturers simply cannot keep up with the demand.
On top of this, there is a new cryptocurrency creating a new threat to a different part of the CCTV industry.
A new ‘environmental’ cryptocurrency called Chia has dispensed with the processing power and electricity demands of traditional GPU mining, instead of utilising the spare storage space on hard drives (HDD) to verify blockchain transactions (‘proof of space’).
The demand for this particular cryptocurrency has to date called on 30 Exabytes of storage since May this year – that’s 30 Billion Gigabytes of data, and it’s not just HDDs, high-capacity SSDs are also in demand. This is causing massive hard drive supply issues globally, thus rocketing prices for those that are available.
The security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days to 6 months
Of course, this has a particularly large knock-on for the CCTV market. There is nothing more data-intensive than video, other than multiple streams of HD video.
With this in mind, the security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days typically up to 6 months and longer in some regions/applications, the CCTV market consumes more HDDs than many other markets.
Growth of data centres
While you would think that this would make security an important area for HDD manufacturers, our market is a relatively small player.
IT vendors will always focus on their core customers, and the rise of the gaming market, as well as the growth of data centres due to remote working in the pandemic, has created a more important sector to serve – and these customers will always come first. Imagine the daily storage space required if 5 Billion people uploaded just one image a day to ‘the cloud’!
These factors combined with the lack of raw materials leading to longer lead times for component manufacturers mean that the prices for hard drives and GPUs are likely to remain inflated well into 2022 while factories play catch up on the backlog.
The market for IT hardware is currently strong enough to continue even with the increase in component prices and the extended lead times for products. If you can get your hands on any HDDs, the delivery times from most distributors are around 6-8 weeks.
Increased delivery times
All of this has had a serious impact on the security industry. CCTV projects are now facing the combined issue of increased delivery times and higher costs. Many manufacturers, integrators, and distributors are doing their best to absorb the price increases where they can, but this is unsustainable over the long term. So what can be done?
Some people are getting more creative by purchasing from the second-hand market
Some people are getting more creative by purchasing from the second-hand market. However, it is unlikely that commercial applications will be willing to risk potential downtime or data losses by using second-hand components that have been pushed hard for months on end mining cryptocurrencies.
Making early purchases
While I can’t comment on what other manufacturers have done, at Secure Logiq we have been watching this market trend closely.
We always try to keep a close eye on anything that has the potential to significantly impact our manufacturing capabilities and try to offset any potential challenges with early purchases before the impact is fully felt.
As such, we have been able to secure enough products to continue manufacturing as normal for more than six months.
Increased demand as a challenge
While we have this existing stock to meet current and anticipated orders, we continue to scour the market for any available stock to make sure we are at the top of the list when any fresh products come on the market. This has meant that throughout our 10-year history we have never failed to deliver a customer order within 7-10 working days.
The delays with component manufacture and the ongoing increased demand will continue to present a huge challenge to the CCTV and wider security industry. However, good planning and intelligent design will allow projects to remain on track.
Security technology manufacturers are not alone in this challenge, but the dual-threat is perhaps unique. It will take a while for this threat to be overcome, but with robust planning and by paying close attention to the market forward-thinking CCTV manufacturers can still deliver projects for their clients.
Perimeter security is by no means a new concept. A phrase used to describe solutions with the primary purpose of limiting access to any area that is prohibited to the public at large, perimeter security has been prevalent for millennia. From Hadrian’s Wall that was built by the Roman Empire in Britain back in AD 122 to the Great Wall of China that winds almost 22,000 kilometers through the Asian country’s eastern regions, it is a concept that remains a fundamental part of global societies today. Fast forward to today and no longer are we reliant on 50-foot-high, 20-foot-thick stone blockades to protect our safety.
Perimeter security has evolved over the centuries moving from empires and structures to products and cutting-edge technology and continues to grow today. In fact, in 2020 Perimeter Security was a $61.3 billion industry as more businesses and industries have the need to protect against modern-day threats. This colossal and growing market is powered by industry innovators that are providing advanced solutions that are reliable, integrated, and cost-effective.
Layered Perimeter Security Defense
The number of perimeter intrusions is a large reason behind the continued surge in security investment, propelled by increasing urbanisation, a growing terror threat, and a plethora of other concerning factors. Most organisations are better equipped to protect people and assets today, yet there is still a need for solutions that can grow with our future needs and the unforeseen challenges ahead.
For many, this means moving beyond siloed solutions into a multi-layered, integrated physical security strategy – one that provides the best security posture possible. There are a variety of innovative technologies that can create a holistic perimeter security solution that will transform the defences of any organisation. The question is, what are the technologies and trends shaping perimeter security in 2021 and beyond?
Next-Generation Video Surveillance By combining two powerful visualisation technologies in a single form factor, rich data can be captured and deliver more accurate awareness
In today’s surveillance market, cameras and video management systems are nothing like those that were available a mere half-decade ago. Cameras now readily feature ultra-HD and 4K resolution that provide an extremely high level of detail, enhancing security teams’ ability to capture evidence and identify perpetrators. This enhanced detail bolsters not only investigation sequences but equally transforms video analytics capabilities, like facial recognition that unlock additional business benefits.
Where are cameras heading in the future? Let’s look at Oyla’s cameras as an example. These cameras fuse together artificial intelligence (AI), video, and 3D data, offering a depth camera that can be used to define very accurate intrusion detection perimeters. Its advanced motion detection activates an alert when a user-defined perimeter has been crossed, or if there is a presence in a user-defined area or volume space. By combining two powerful visualisation technologies in a single form factor, rich data can be captured and deliver more accurate awareness and better application of deterrence measures in real-time, versus the evidentiary use of cameras today.
Thermal cameras are a relatively novel yet growing security phenomenon, having come to the forefront during the pandemic. Where such technology was once a novelty, their widespread application in detecting raised temperatures which might indicate a COVID-19-related fever has seen them become increasingly applied to a broader market in the past 18 months.
Not only are these cameras now more accessible, but they have also advanced from a technical perspective. Modern thermal cameras now offer a more accurate thermal resolution, longer detection ranges, ONVIF compliance and edge-based analytics for the benefit of VMS solutions. They are also a useful technology for solving visibility challenges in complete darkness.
Radar is a technology that’s increasingly being used in physical perimeter security applications. Capable of conducting 360-degree scans of a property on a continual basis every couple of seconds, it is an extremely powerful intrusion detection technology. Radars stand up better than other technologies in difficult conditions such as smoke and fog. When paired with other sensors, false alarms can also be reduced in these conditions – something that is a major challenge more broadly.
While law enforcement responds to millions of security alarms every year, a study from the United States Department of Justice's Office of Community Oriented Policing Services previously showed that between 94 and 98 percent of these turn out to be false, costing as much as $1.8 billion a year in wasted police time and resources.
What is LiDAR? LiDAR has been around since the 1960s, with one of LiDAR’s first use cases was being attached to aircraft to emit laser light towards the surface of the earth to provide distance readings. Spurred by its necessity for the coming autonomous driving revolution, today, the application of LiDAR technology has become more widespread.
It is technologies such as these, designed to reduce the burden of security personnel by conducting the heavy lifting in alarm validation
According to research by Fortune Business Insights, the size of the global LiDAR market is set to surpass $6.7 billion by 2026, a monumental increase on the $1.32 billion spent on LiDAR in 2018. In the security space, LiDAR technology is already proving it carries a string of benefits and upgrades on what is currently available on the video surveillance market. The major upside of LiDAR is that like video, it brings a high level of detail to a physical environment that other sensors simply cannot provide.
Pairing Lidar with video, machine learning, AI, and other advanced sensor technologies can help validate alarm accuracy. Indeed, it is technologies such as these, designed to reduce the burden of security personnel by conducting the heavy lifting in alarm validation, that we can expect to become increasingly prevalent soon.
Often referred to as unmanned aerial vehicles (UAVs), drones are another technology that is becoming both more accessible and more capable from a security perspective. In sizable areas of land or hard-to-reach critical infrastructure sites, drones can be dispatched instead of security personnel as a means of first response to an intrusion alert.
They can also work in tandem with thermal imaging, radar, lidar, and next-generation video surveillance technologies, either incorporating them onboard directly or supporting them in wider, integrated security infrastructures.
Developing the Right Multi-Layered Perimeter Security Strategy
These are just a handful of some of the more progressive perimeter security-centric technologies on the market today. The challenge for many organisations is knowing which solutions will suit their needs and address the challenges of tomorrow.
Take the time to understand what you need to protect. Is it people, data, or assets? Where do you feel your potential vulnerabilities may lie? By assessing your risks, you will better understand potential target areas and address them accordingly.
For perimeter security, a multi-layered solution will likely be the most secure approach. From basic needs to the more advanced, there are a broad variety of possible solutions available. Yet taking the time to understand which solutions are the most successful, cost-effective, and relevant to your business will yield the best results.
Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption.
Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalisation bringing multiple business benefits, which would simply not be possible using traditional models.
While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment.
Yet, with more organisations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximise the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge.
Improved access control in smart environments
These urban constructs are capable of reducing waste, driving efficiencies and optimising resources
The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimising resources and increasing citizen engagement.
Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors.
Frictionless access control
During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity.
Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimising the risk of infection, by removing the need to touch shared surfaces. Such systems can be customised and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful.
Barriers to adoption
Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant.
Many are now beginning to realise that connected network-enabled solutions are here to stay
Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space.
Time will not stand still, and many are now beginning to realise that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature.
The importance of cyber hygiene
Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks.
Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT).
While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited.
Cyber security considerations
Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognised cyber security principles, incident reporting and best practices.
It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security.
The future of access control
There is a natural dispensation towards purchasing low-cost solutions
There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organisations by their association.
The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world.
Cyber security key to keeping businesses safe
In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies.
As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor.
The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex.
Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’.
CV5S and CV52S AI-powered SoCs
The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond.
The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing.
Faster and ubiquitous AI capabilities
Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions"
“Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm.
John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.”
Edge AI vision processors
Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive.
By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing.
4K multi-imager cameras
“However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot.
In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation.
The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022.
Reference boards for camera manufacturers
The software on these new SoCs is an evolution of our unified Linux SDK"
As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families.
“The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot.
Better crime detection
Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address.
“Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot.
Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution.
4K AI processing on-camera
The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras.
This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot.
The advent of on-camera AI at 4K changes the paradigm
Enhanced video analytics and wider coverage
“Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot.
He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.”
Deployment in retail applications
Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once
Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement.
The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out.
This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics.
Use in cashier-less stores
Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item.
In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking.
Updating on-camera AI networks
Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames.
So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle.
If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene.
Efficient traffic management
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself
Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.).
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server.
Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video.
On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy.
In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level.
Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas.
“With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.”
Physical security in parking lots
With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot
One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred.
With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners.
If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go.
Advantages of using edge AI vision SoCs
Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.”
He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.”
He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form.
Cameras with AI capabilities
Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge.
Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems.
4K network security cameras
The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications
Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications.
The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome.
FacePRO facial recognition technology
Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics.
Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications.
i-PRO AI-capable security cameras
Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer.
Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe.
Flexible and adapting to specific customer needs
This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols.
He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organisers and transport hubs to monitor and ensure safety.”
Edge-based analytics offer multiple benefits over server-based systems
Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata.
On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy.
Explosion of AI camera applications
We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications"
“We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.”
As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver.
Facial recognition, privacy protection and cross line technologies
Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line.
However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realised that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware.
Metadata for detection and recognition
Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities.
“However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.”
i-PRO AI Privacy Guard
One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard
Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world.
Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.”
Future scope of AI and cameras
He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents."
Gerard Figols concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behaviour before incidents occur.”
Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation.
Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics.
Adoption of disruptive technologies
“Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realise their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.”
“Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.”
Challenges faced by cities
Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness and reducing costs.
Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic.
“The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualisation and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks and detection of noise level, glass breaks and gunshots.
Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever and ensure physical distancing.
2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience.
Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyse customer behaviours to create new routes, pathways, signage and to optimise cleaning operations. Personalised digital experiences will add to the overall entertainment value.
In the public safety arena, video enables core capabilities such as protection of people, assets and property, emergency response, and real-time visualisation and increased situational awareness. Video also provides intelligent incident management, better operational efficiency and faster information sharing and collaboration.
Smart video strategy
Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming and costly. Cities and public venues are looking for hardware, software and industry expertise to provide the right mix of performance, capabilities and cost-effectiveness.
Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimisation, enables customers to build and deploy high-performing computer vision and deep learning inference applications.
Intel and Milestone partnership – Video solutions
“Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.”
As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing and AI capabilities with Milestone’s video management software and community of analytics partners.
Given its complex needs, the smart cities market is particularly inviting for these technologies.
Genetec Inc, a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that Seagate Technology Holdings plc, a provider of data storage and enterprise storage systems, has deployed Genetec™ Security Centre to secure their global campuses and regional offices.
At the heart of this large-scale global deployment is the Genetec unified security platform which includes Security Center, Genetec Omnicast™ IP video management system (VMS) to manage more than 1,150 cameras, Genetec Synergis™ IP access control system (ACS) to manage more than 22,000 card holders, Sipelia to manage communications between intercoms and security operation, and Seagate’s own high-efficiency, high-performance Exos™ X 5U84 mass capacity storage system.
Unified security platform
All sites are connected using the Genetec Security Centre Federation feature to centralise monitoring, reporting, and alarm management across the entire organisation. The solution enables Seagate to pull in up to 1.3 petabytes of high-definition video in a single disk enclosure from hundreds of cameras and other IoT devices without losing a single frame or data packet.
The solution enables Seagate to pull in up to 1.3 petabytes of high-definition video
“Video, and especially multi-source, high-definition video, provides a stringent performance test for any storage solution,” said Ken Claffey, Senior Vice President and General Manager of enterprise storage systems at Seagate. “Likewise, the data availability expectation of a robust, unified security platform like Genetec™ Security Centre is formidable. The sheer volume of high-definition video streams, frames and metadata coupled with increasingly long retention periods, represent one of the most challenging IT infrastructures to deploy.”
Physical security environment
This enterprise scale deployment provides a clear blueprint for a state-of-the-art, unified, high performance physical security environment for modern, large scale facilities. “Enterprises with global campuses and data centre environments have mission critical requirements, and securing a growing number of assets across huge facilities, while staying ahead of emerging threats is increasingly challenging,” said Christian Morin, Vice President of Product Groups at Genetec Inc.
“Through our partnership with Seagate, this enterprise scale deployment provides a great example of how enterprises can implement a holistic approach to security, that encompasses physical and cyber security, while ensuring compliance with fast-changing regulatory mandates.”
Calipsa, a provider of deep-learning-powered video analytics for false alarm reduction, announced that Edmonton, Alberta-based GPS Security Group is using its false alarm filtering platform.
GPS, which offers a complete range of security services across Alberta, British Columbia and other parts of Western Canada, is the third Canadian central monitoring station to adopt the cloud-based Calipsa technology.
Deep learning technology
Calipsa’s software uses artificial intelligence with deep learning technology to recognise genuine alarms caused by human or vehicle movement. More than 90% of notifications resulting from nuisance factors such as animals, lighting, weather or foliage are filtered out, helping operators reduce their response times to genuine threats.
We’ve engaged Calipsa as a strategic growth partner to assist with reducing false video alarms"
The GPS Security Group’s Fredy Ramsoondar, Corporate Senior Security Solutions Advisor and Private Investigator, said GPS is adopting Calipsa’s AI-powered video analytics across its video surveillance sites to support the sustained growth of its monitoring division. “We’ve engaged Calipsa as a strategic growth partner to assist with reducing false video alarms, allowing our operators to focus on only genuine alarms,” he said. “We anticipate widespread benefits, including improved customer service, operational efficiency and employee morale.”
Tara Biglari, Calipsa’s Regional Sales Director, Americas, said its false alarm reduction software is easily scalable, making it ideal for any growing video monitoring station. “This is an exciting time of growth for the GPS team and we’re happy to partner with them to provide the highest level of customer service,” she said.
“The installation of our cloud-based technology requires no onsite hardware devices and we keep our service always current with remote upgrades.” A platform dashboard enables station managers to monitor the software’s performance, including detecting idle cameras that may need replacement or moving to a better position.
Dedrone, the globally renowned company in airspace security, has announced the successful implementation of Dedrone’s counter drone technology at Preakness 146. Dedrone worked with the security team from 1/ST (1/ST Group of Companies) and the Maryland Jockey Club, owners of Pimlico Race Course, home of the Preakness Stakes, in the weeks leading up to the event for a pre-event threat assessment.
Unauthorised drones detection
On multiple occasions before race day, unauthorised drone pilots were detected and located with Dedrone-enabling security teams, to respond to potential threats in real-time.
In 2021, Preakness 146 returned on May 15 with standardised COVID-19 protocols in place, to welcome back 10,000 socially-distanced fans and stakeholders with a key exception – that aerial intruders and unauthorised drone activity would not be tolerated.
Airspace security services
The Maryland Jockey Club retained Dedrone to assess the airspace security and protect race day operations from potential drone interruptions. Dedrone provided complete airspace security services, including a pre-event threat assessment, utilising Dedrone sensors and analytics software, to identify areas of higher drone activity.
“The Preakness Stakes is a premier event for our company and the health and safety of horses, riders, stakeholders, guests, employees and the community is our highest priority. Prioritising safety includes how we address airspace security to protect against drone threats,” said Robert (Rob) D’Amico, Chief Security Officer, 1/ST.
Detection, analytics and protection
Law enforcement issued warnings and educated the drone pilots about their violations
“As the Chief Security Officer for 1/ST and as former Chief of Operations for the FBI’s Counter UAS Unit, I knew Dedrone was the ideal airspace security partner to provide detection, analytics and protection for our event. Dedrone allowed our team to focus on executing the safe, stellar race day operations that 1/ST is known for.”
Dedrone identified multiple drone incursions, allowing the Maryland Jockey Club and local law enforcement to locate and approach unauthorised pilots. Law enforcement issued warnings and educated the drone pilots about their violations. On race day, Preakness 146 did not experience any drone incursions.
Countering the threat of unauthorised drones
Dedrone provides airspace security for government, military, critical infrastructure, and major public events, including the 2019 RBC Canadian Open, and the 2018 PGA Tour – Waste Management Phoenix Open.
Shutdowns due to the COVID-19 pandemic closed venue doors to spectators, however, aerial trespassers remained a persistent and escalating threat to event operations. As venues and stadiums welcome back spectators, Dedrone works with security teams to prevent drone threats to operations.
True airspace protection
“Despite airspace restrictions in place, public and sporting events remain vulnerable to unauthorised drone flights, and the only way to ensure true airspace protection is through Dedrone’s airspace security solution,” shares Aaditya Devarakonda, the Chief Executive Officer (CEO) at Dedrone.
He adds, “The coordination of security teams at Preakness Stakes leveraging Dedrone, demonstrate how venue security providers can stay ahead of airspace threats by easily integrating drone detection into their existing security ecosystem.”
In an increasingly sophisticated business environment, clients need law firms that have the experience and depth to handle significant matters. This law firm in California is staffed by attorneys who offer diverse legal, business and governmental backgrounds.
Its practice areas are focused on specific legal disciplines, but the firm also has teams that are equipped to address the needs of particular industries, including healthcare, banking and finance, gaming, environmental, manufacturing, governmental, and pharmaceutical, and telecommunications.
Ensuring continued protection
When the law firm relocated its corporate headquarters to a new building three years ago, founding partners knew they would need to invest in technology, education, and services to ensure top-tier security and security measures. It had previously worked in a space in which security was managed centrally across the building but now it had to develop its own program.
The management team quickly realised that they were not interested in building their own security team
Stakeholders were not only interested in managing access to the facility, it also wanted to ensure that alarms, video, and security operations were managed by experts to ensure continued protection across physical and network infrastructure. As they were evaluating options, the management team quickly realised that they were not interested in building their own security team from scratch. Rather, they wanted to work with an expert team that could quickly bring their security efforts up to par.
Security systems monitoring
The law firm connected with Ryan Schonfeld, Founder, and CEO of risk management services and operations firm RAS Watch. After speaking with Schonfeld and he provided an overview of what a robust security effort should entail, the firm quickly identified a plan.
“RAS Watch provided us with the expertise we needed to quickly determine what our security efforts should entail,” the founding partner said. “The entire team are experts in what they do, they understand the changing risk landscape, are experienced and proactive, and therefore, were the ideal choice to support our efforts.” The corporation contracted with RAS Watch to deliver a managed service security program that provides training, risk assessments, security systems monitoring, alarm management, and more.
Managed service operations
RAS Watch is a unique managed service operations and risk mitigation centre
RAS Watch is a unique managed service operations and risk mitigation centre, offering companies the opportunity to benefit from a mission-critical security program without investing significant capital, allocating real estate, administering technology, or managing a comprehensive operation. The RAS Watch suite of services uses state-of-the-art tools to protect a company's people, assets, and brand, providing actionable intelligence in real-time through a service-based security program model.
While RAS Watch offers a wide range of services and solutions, the organisation opted for a layered approach to security — one that incorporated monitoring services, crisis training, and remote SOC support. The training was rolled out in stages, first to the law firm’s leadership team and then to managers and employees. Employees continuously learn how to deal with potential security issues, de-escalation techniques, and how to respond in an active shooter incident.
Emergency mass communications
RAS Watch also operates as the legal team’s security operations centre from a separate facility along with educating and training staff. The SOC is online 24/7, allowing operators to coordinate with the alarm company, provide information and assistance for any security concerns or questions, and handle emergency mass communications and responses for the firm.
In early 2020, as the coronavirus pandemic began to impact California, RAS Watch was also able to help address concerns about COVID-19. It offered the company ideas on integrating wellness protocols with existing security plans and taking advantage of technology to simplify processes. "RAS Watch has gone above and beyond to help us ensure the safety and security of our facility," the partner said. "We value their insight, ideas, and suggestions, and they have become an integral part of our business."
Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics.
Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks.
The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?
Perimeter security is the first line of defence against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?