Video content analysis
Allied Universal®, a security and facility services company in North America, and SOS Security®, a renowned provider of global security services, announces that a definitive agreement has been executed with respect to a transformational merger that creates a security leader in North America and beyond. “I am thrilled to welcome Edward Silverman - one of the most highly regarded leaders of the security industry - and the SOS Security team to the Allied Universal family,” said...
Panasonic Security Systems, a business unit of the newly formed Panasonic i-PRO Sensing Solutions Co., Ltd., is showcasing its impressive solutions capabilities at ISC East booth #435. By combining its superior imaging technologies with new AI-driven software and analytics solutions, Panasonic i-PRO Security Systems offers comprehensive, customisable solutions to meet the most diverse range of users’ specific needs. Core solutions on display include the company’s fully integrated Vi...
In the new version update of VIVOTEK’s video management software VAST 2, several advanced user-centered functionalities will be unveiled. The new features include the Deep-Learning Technology Smart Search II, Cyber security Management Solution, and License Plate Recognition Integration. With this update, users can enjoy the intuitive interface of VAST 2 while achieving a higher level of management efficiency. Video Content Analytics Three new user-oriented benefits will be highlighted in...
Rhombus Systems, a provider of enterprise cloud-managed physical security solutions, announces a suite of new sensors - asset tags, door sensors, environmental sensors – to transform how organisations manage their physical security. The new sensors are battery operated and use the Rhombus security cameras as a local intelligence hub to capture sensor events, corresponding video footage, and data of the physical environment. By seamlessly combining enterprise video security with IoT sensor...
Hanwha Techwin is now able to offer an even greater choice of cameras following on from the announcement that it has introduced three new ‘affordable’ Wisenet QVGA resolution thermal models. Unlike traditional cameras which rely on light to see images, thermal cameras pick up heat signatures of objects and are unaffected by extreme conditions, such as complete darkness, harsh weather, bright lights, fog and smoke. They also offer an effective solution for applications where there ar...
Hikvision, the provider of innovative video security products and solutions, exhibited its latest innovative technologies, products and solutions at the China Public Security Expo (CPSE) 2019 in Shenzhen from October 28 to 31. This year marked the second anniversary of Hikvision’s AI Cloud. Hikvision’s presentation was dubbed ‘Fusing Data for a Smarter World’ and showcased its AI Cloud platform which supports integration of IoT and information network data designed to em...
MOBOTIX is making the next big advance in intelligent video technology, furthering its mission statement of going ‘Beyond Human Vision’. By launching its new MOBOTIX 7 open solution platform and the M73 high-end camera that uses it, the company is once again cementing its position as a pioneer in this technology. Supported by artificial intelligence and application solutions based on deep learning, the new generation of video cameras not only enables an unlimited set of functions; it also opens up brand new possibilities far beyond traditional video security. This means that the MOBOTIX systems remain fully reliable and secure, as cybersecurity and data security continue to have the highest priority. New Standards For Intelligent Video Technology The MOBOTIX 7 is by far our most powerful decentralised and secure modular IoT-video system" The M7 system platform and the M73 camera were presented to over 500 international technology and sales partners, as well as representatives of the press, at this year's MOBOTIX Global Partner Conference (GPC) in Mainz. "The MOBOTIX 7 is by far our most powerful decentralised and secure modular IoT-video system based on deep learning modules, and sets new standards for intelligent video technology," explained Hartmut Sprave, Chief Technology Officer at MOBOTIX AG, in his opening speech. "Our hardware and software are 'Made in Germany', and tailor-made camera apps provide limitless possibilities for expanding the MOBOTIX 7. This will revolutionise numerous IoT processes — not only for us, but for our technology partners and customers in various markets too," says Sprave. The MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded Future market requirement Even at its launch, the MOBOTIX 7 already comes with pre-installed apps that are verified and certified by MOBOTIX and meet the highest standards in terms of cyber security. These apps are supported by artificial intelligence (AI) and deep learning, and cover a significant number of industry-specific, individual requirements. It is also possible for partners, customers or users to develop and program their own solutions and have these certified by MOBOTIX. "This means that the range is growing dynamically in response to customers' needs, so virtually any current and future market requirement can be met with a tailor-made application installed directly on a camera featuring the MOBOTIX 7 platform," explained Sprave. AI-based analytics One of the MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded The new MOBOTIX video system is also suitable for our customers' very particular and individual challenges in specific areas: For example, one of the MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded. In this case, the camera immediately and automatically triggers a diversion for any further persons wishing to enter the building, thus reliably preventing accidents and panic. By combining image sensors and environmental sensors with AI-based analytics, industrial enterprises can increase their production efficiency and improve fire prevention measures, for example. The object-based recognition of individual road users, such as trucks, cars or people, and their behaviour, such as stopping, accelerating and so on, is enabled for traffic and transport applications. The information that is immediately available can improve the road safety for drivers and passengers, while enabling other road users to continue moving in an unobstructed flow. Video management software "Together with our partners, we aim to develop a multitude of other solutions based on artificial intelligence and deep learning to help predict events and facilitate the early introduction of effective countermeasures aimed at protecting the environment, buildings, systems, people or animals," said Sprave, the Chief Technology Officer. MOBOTIX offers a unique platform and thus facilitate the search for global partner network Partner Expo — Presentation of the Newest Partner Solutions and Technological Alliances In line with the motto of the GPC 2019—‘Evolution. It Continues With You’—and across a space of more than 200 square meters, 19 MOBOTIX technology and solution partners from the Partner Society are presenting their industry-specific and cross-industry complete solutions. These solutions cover the fields of industry solutions, video management software, IT infrastructure, AI-based video analysis and much more. Together with the Partner Society, MOBOTIX offers a unique platform and thus facilitate the search for global partner network by using intelligent components for individual requirements. MOBOTIX camera apps can detect when a building is in danger of becoming overcrowded Smart video technologies Artificial Intelligence and Deep Learning Pave the Way for Smart Video Technologies In his keynote speech, Thomas Lausten, CEO of MOBOTIX AG, highlighted the fact that camera functions based on artificial intelligence and deep learning are becoming increasingly important: "With Konica Minolta, we have a partner that provides leading technology. We also collaborate with other leading companies and institutions in research when it comes to artificial intelligence." We offer customers around the world access to applications that are perfectly tailored to their requirements" Thanks to the MOBOTIX system now being more open and our collaboration with strategic partners, the video security market is being expanded to include new solutions for a wide range of industries. "By developing and marketing specialised apps, we offer customers around the world access to applications that are perfectly tailored to their requirements. The profit models resulting from this new technology will open up almost unlimited opportunities for us and our partners in the market," predicted Lausten. Highest cyber security standards "When we unveiled the MOBOTIX 7 system platform and the once more ONVIF-conformant M73 camera, the feedback we received from our technology partners was overwhelming," Lausten was pleased to announce, adding that MOBOTIX expects to make many more innovative developments in intelligent applications that can be marketed worldwide. "With the MOBOTIX 7, we are launching one of the best IoT platforms for apps on the market. It meets the requirements of a wide variety of industries," says CEO Lausten. "Thanks to the MOBOTIX 7, the M73 and all subsequent IoT camera models will have no limits. It goes without saying that protecting our customers' data remains our top priority in all of these endeavours — and as you would expect, the M73 also meets the world's highest cyber security standards." Read more about MOBOTIX 7 here.
VuWall, a pioneer in video wall control and AV network management, announced new engineering and sales hires in the United States. Francisco Provencio has been appointed application engineer while Christian Cooper joins as account manager for the East Coast. These new positions will provide additional resources for customers throughout the U.S. as VuWall continues to grow globally. Currently, VuWall has more than 1000 deployments in over 45 countries, with more than 200 in the U.S. alone. As this number continues to grow, expanding the U.S. service and sales support team is a critical step toward healthy growth for the company. This is a continuation in overall North American corporate strategy, as earlier in the year, VuWall added resources to its marketing and inside sales teams at its Canadian headquarters. "As the demand for agile and scalable video wall and control room systems increases rapidly, VuWall has become the chosen solution provider for many installations in the U.S.," said Paul Vander Plaetse, CEO. Supporting AV integrators We strive to help our customers make informed decisions in their control room projects." "Building a solid American team will make it easier to help our customers achieve a superior visualisation experience. Francisco and Christian have years of expertise that will ensure customers are well supported in every step of the design and deployment process.", he adds. Provencio, based in Atlanta, Georgia, has more than 10 years of international experience in the AV industry — specialising in control rooms — having held both technical engineering and sales roles. In this new position, Provencio will focus on the U.S. market, supporting AV integrators and consultants with project designs, technical drawings, and on-site or remote customer demos. Cooper, based in Miami, Florida, is a seasoned AV sales manager with broad experience and technical expertise in control rooms, display walls, and digital signage for utility companies, emergency operation centers, traffic management centers, and other critical infrastructure industries. Prior to joining VuWall, he served as regional sales manager for Mitsubishi Electric. Cooper will focus on supporting integrators, consultants, and end users with their video wall projects. "We are thrilled to have Francisco and Christian join our team. In addition to being an excellent fit with the VuWall culture, bringing them on board is perfectly aligned with our consultative approach to sales," says Maryse Montagne, sales director of North America at VuWall. "Their technical expertise was a critical part in our selection process as we strive to help our customers make informed decisions in their control room projects."
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, and Northdoor Ltd., a London-based IT consultancy, will sponsor, exhibit, and make a presentation at the upcoming IBM Think Summit London on Oct. 16 at the Olympia London event center. Scheduled for 12:39 p.m. as part of the Cloud and Infrastructure Think Tank, the presentation is titled "Machine Learning Meets Data Protection — the unstoppable force meets the immovable object?" The companies will be exhibiting in the Cloud and Infrastructure Campus. Enterprise-ready multicloud solutions Think Summit London is IBM's annual festival of innovation, featuring tech talks, immersive experiences, topical debates, and thought-provoking guest speakers. This year's focus will be on enterprise-ready, multicloud solutions that are transforming businesses from "surviving" to "thriving," and how research and technology — including AI, blockchain, and quantum computing — are being channeled into protecting the future and helping to sustain not just business growth but also people and environments around the world. Enterprises are deploying SaaS-based models to meet service levels demanded by data-aware business executives In this presentation, Rodney Foreman, chief revenue officer of Cobalt Iron, will discuss how groundbreaking new solutions for hybrid cloud deployments pair analytics with automation to eliminate many of the performance issues normally associated with managing a legacy data protection environment. Foreman will present what the "art of the possible" looks like for companies leveraging the next generation of SaaS data protection using Cobalt Iron's Compass™ and IBM's Spectrum Protect delivered by Northdoor IT. Auto-provisioning workflows "Machine learning and data protection are a partnership made in heaven — or at least made in the cloud. Machine learning, analytics, automation, cloud, and SaaS have been aggressively deployed with massive success, delivering productivity, agility, and economic value across key IT disciplines," said Foreman, "While previously overlooked, data protection is now being brought into the fold — and the ability to integrate data protection into auto-provisioning workflows should be standard for any hybrid cloud environment." AJ Thompson, chief commercial officer for Northdoor commented, "Progressive public sector, SMB, and global enterprises are rapidly deploying SaaS-based models to meet and exceed the new service levels being demanded by cloud-savvy and data-aware business executives. We'd like to invite Think Summit London attendees to join our panel of experts as they shine a light on this opportunity."
ETSI is pleased to announce the creation of a new Industry Specification Group on Securing Artificial Intelligence (ISG SAI). The group will develop technical specifications to mitigate threats arising from the deployment of AI throughout multiple ICT-related industries. This includes threats to artificial intelligence systems from both conventional sources and other AIs. The ETSI Securing Artificial Intelligence group was initiated to anticipate that autonomous mechanical and computing entities may make decisions that act against the relying parties either by design or as a result of malicious intent. Conventional cycle of networks risk analysis The conventional cycle of networks risk analysis and countermeasure deployment represented by the Identify-Protect-Detect-Respond cycle needs to be re-assessed when an autonomous machine is involved. The intent of the ISG SAI is therefore to address 3 aspects of artificial intelligence in the standards domain: Securing AI from attack e.g. where AI is a component in the system that needs defending Mitigating against AI e.g. where AI is the ‘problem’ or is used to improve and enhance other more conventional attack vectors Using AI to enhance security measures against attack from other things e.g. AI is part of the ‘solution’ or is used to improve and enhance more conventional countermeasures. Developing technical knowledge Three main activities will be undertaken and confirmed during the first meeting of the group The purpose of the ETSI ISG SAI is to develop the technical knowledge that acts as a baseline in ensuring that artificial intelligence is secure. Stakeholders impacted by the activity of ETSI’s group include end users, manufacturers, operators and governments. Three main activities will be undertaken and confirmed during the first meeting of the group. Currently, there is no common understanding of what constitutes an attack on AI and how it might be created, hosted and propagated. The work to be undertaken here will seek to define what would be considered an AI threat and how it might differ from threats to traditional systems. Hence, the AI Threat Ontology specification seeks to align terminology across the different stakeholders and multiple industries. Prioritising potential AI threats ETSI specifications will define what is meant by these terms in the context of cyber and physical security and with a narrative that should be readily accessible to all. This threat ontology will address AI as system, attacker and defence. Data is a critical component in the development of AI systems, both raw data, and information This specification will be modelled on the ETSI GS NFV-SEC 001 ‘Security Problem Statement’ which has been highly influential in guiding the scope of ETSI NFV and enabling ‘security by design’ for NFV infrastructures. It will define and prioritise potential AI threats along with recommended actions. The recommendations contained in this specification will be used to define the scope and timescales for the follow-up work. Data is a critical component in the development of AI systems, both raw data, and information and feedback from other AI systems and humans in the loop. Developing data sharing protocols However, access to suitable data is often limited, causing a need to resort to less suitable sources of data. Compromising the integrity of data has been demonstrated to be a viable attack vector against an AI system. This report will summarise the methods currently used to source data for training AI, along with a review of existing initiatives for developing data sharing protocols and analyse requirements for standards for ensuring integrity in the shared data, information and feedback, as well as the confidentiality of these. The founding members of the new ETSI group include BT, Cadzow Communications, Huawei Technologies, NCSC and Telefónica. The first meeting of ISG SAI will be held in Sophia Antipolis on 23 October. Come and join to shape the future path for secure artificial intelligence!
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualise incident and indicator flows, allowing security teams to better manage and automate incident response. Key updates to Demisto v5.0 include - Reimagined User Interface - Brand new UI that streamlines global navigation while also enhancing the delivery of information within each incident Enhanced Threat Intelligence - Access rich indicator intelligence from integrated sources and take action in a scalable manner Database Scaling - Install the Demisto app server and databases on separate machines. Multi-tier configurations let you scale your environment and manage resources efficiently SOAR on the fly - Introduction of chat support in the mobile application, letting you update relevant stakeholders on-the-go and ability to manage notifications from the web app, choosing to receive updates on email, Slack, Mattermost, or the mobile app Demisto v5.0 security platform Rishi Bhargava, VP Product Strategy, Demisto, a Palo Alto Networks company comments, “Demisto v5.0 is packed with new features suggested to us by our community of customers, partners, and independent users. We’ve also introduced changes that facilitate improved load management and scaling of resources, ensuring that organisations are secure irrespective of the pace at which they grow”. He adds, “Back in 2015, we recognised that security teams wilt under dual pressures every day: an ever-increasing volume of security alerts, and insufficient resources to address these alerts. Over the past four years, our customers have seen us as the only platform that has combined security orchestration, incident management, and real-time collaboration to make their lives easier”. Security Orchestration and incident management Rishi further stated, “Automating as much as possible hands time back to security teams to investigate, learn and improve, and sometimes just take a deep breath. Since joining forces with Palo Alto Networks, we have accelerated our go-to-market and made inroads into use cases outside of traditional security operations.”
In the latest product update of Milestone XProtect 2019 R3 video management software, Milestone Systems introduces several new features and capabilities. These include centralised Search, a new Driver Framework, adaptive streaming and enhanced Device Password Management. With this product update, Milestone Systems continues to pursue ever higher performing software to fulfill the market’s rising demands for cost-effective video technology solutions. Centralised Search One of the main features of the 2019 R3 release is Search - a new centralised search platform in XProtect Smart Client, making it possible for users to search for everything in one place. Previously, users performed several standalone searches, depending on what data they were searching for. With the new Search tool users can search for motion, alarms, events, bookmarks and other types of data, in one single place enabling rapid and efficient video investigations. Milestone Systems provides customers with support for more than 8,000 cameras and devices Moreover, the new Search platform also smoothly embeds partner integrations and their powerful analytic capabilities via dedicated filtering options. Through specific plug-ins and devices, search criteria such as line-crossing and object-in-field will be enabled directly in the Search Tab, saving time and increasing efficiency. Milestone’s Driver Framework Milestone Systems provides customers with support for more than 8,000 cameras and devices, the widest device support in the industry. In order to allow XProtect device support to grow exponentially with the number of devices in the market, and in order to provide support for new types of devices such as IoT, Milestone Systems introduces Milestone’s Driver Framework. Milestone’s Driver Framework within the Milestone Integration Platform Software Development Kit (SDK) allows devices manufacturers, big or small, to develop their own drivers and provide faster device compatibility and deeper integration that goes beyond the capabilities of ONVIF. Adaptive streaming This new feature will enable users to receive lower resolution streams from the recording server when a high resolution one is not required, for example when displaying video in the smart client or smart wall in window sizes smaller than a full screen. The new Device Password Management continues XProtect’s focus on ease-of-useThis will give users smoother viewing and a better user experience, a lower total cost-of-ownership (TCO) due to less hardware needed to decode unnecessary high-resolution video and a better use of bandwidth that can then be utilised for other needs in the organisation. New Device Password Management The new Device Password Management continues XProtect’s focus on ease-of-use and enhanced cybersecurity during setup of new installations, as well as when expanding existing ones. This feature makes it possible for system administrators to manage all devices’ passwords directly from the XProtect Management Client for selected device manufacturers. In the 2019 R3 update Milestone Systems doubled the number of supported device manufacturers and added the option to schedule future password changes according to the cadence in the organisations and their password policies, making device password management fully automatic.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organisation’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The next wave in IP technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analogue-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analogue audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial intelligence: hype vs. reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organisation’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting with the right partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labour, fair wages and sourcing minerals from countries in armed conflict. Go in with a plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognise the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognising gun threats The technology is centred around a CNN that aims to replicate how a human brain would process informationActuate offers such a technology, which the company says enables existing security cameras to automatically recognise gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognise what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritise immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Actuate helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximise survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Actuate is a software-only solution that plugs into security camera hardware and software, including VMSActuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organisations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analysed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralised management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organisation. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Located in the Southern Vietnamese metropolis of Ho Chi Minh City, the Deutsches Haus office tower is a symbol of cooperation between Germany and Vietnam. Opened in September 2017, it is the country’s first building to earn LEED (leadership in energy and environmental design) Platinum environmental certification and serves as a cultural, commercial and diplomatic hub in the region. Next to the Consulate General of the Federal Republic of Germany the 25-story building with a 40,000-square-meters floor area is home to regional offices of international firms such as VISA, Adidas, Schneider Electric, and Bosch Vietnam. As premium amenities, Deutsches Haus also features a gourmet cafe, multifunctional conference and events area, health club, and rooftop restaurant. Creating a challenging security environment Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams From a security manager’s perspective, this multi-use blend of diplomacy, business, and leisure facilities – in a building fully accessible to the public – creates a challenging security environment. As the seat of the Consulate General of the Federal Republic of Germany, Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams, have to be approved by the Federal Foreign Office of Germany. Adding to the challenge, Deutsches Haus is located opposite from the Consulate General of the United States of America – and in close vicinity to the Consulate General of France and the British Consulate General – on a busy intersection between two main streets. Therefore, monitoring pedestrians and automobile traffic on the building’s perimeter is just as crucial to end-to-end security as tracking public and high-security areas on the inside. Detecting security events automatically In search of an adequate video security solution, the team at Deutsches Haus knew that high-definition cameras alone would not suffice. The reason: When several hundred cameras are required to secure an area of this size, personnel tend to be overwhelmed by the amount of video feeds. After only 20 minutes, the average operator misses 90 percent of important scenes, as studies have proven. Bosch experts covered the building and its perimeter with network security cameras For this reason, modern IP security cameras feature Intelligent Video Analytics – using algorithms and AI-based image recognition – to support operators by detecting security events automatically. Bosch experts covered the building and its perimeter with network security cameras featuring built-in Intelligent Video Analytics. Indoor areas like the entrance doors, reception area, lobby, café, as well as parking garages and corridors to the fire escape staircases are monitored by over 170 DINION IP starlight 7000 HD and FLEXIDOME IP panoramic 7000 MP cameras. Alerting security personnel of illicit behaviour The building’s elevators are also protected by Bosch cameras. Thanks to built-in-intelligence, IP cameras automatically alert security personnel of illicit behaviour, for instance persons accessing restricted areas. The building’s perimeter and parking lot are safeguarded outdoor-approved AUTODOME IP starlight 7000 HD cameras with pan-tilt-zoom (PTZ) capabilities. Integrated with a third-party solution to open barriers for authorised vehicles, the cameras can automatically track moving objects such as cars and pedestrians – and warn personnel of threats – with their 30x zoom lens while obtaining images under low light conditions via Bosch starlight technology combined with Intelligent Video Analytics. As a key requisite, the networked cameras are able to withstand the city’s four-month rain period and prove resistant to vandalism. Enhancing safety of building occupants The staff can easily announce and notify a building guest about a forgotten purse which was left in the café PAVIRO, the Public Address and Voice Evacuation system of Bosch was installed in the building for the safety of building occupants. The PAVIRO solution makes it possible for occupants to feel safe in the building while enjoying high quality music and excellent Public Address speech intelligibility. The staff can easily announce and notify a building guest about a forgotten purse which was left in the café. To make building evacuations as efficient as possible, the PAVIRO solution provides phased evacuation: automated messages direct occupants to immediate safety. Next to this, building occupants and guests can also enjoy high-quality music in the rooftop restaurant, café, health club and event areas which of course contributes to the nice building atmosphere. Providing government-grade security For the building owner, PAVIRO can establish long-term cost-saving and minimise total cost of ownership. The system is especially eco-friendly because less amplifiers are needed due to power-load sharing of the amplifier architecture, which in turn requires fewer batteries. Since opening day, the Bosch system has provided government-grade security at Deutsches Haus in Ho Chi Minh City. “I am proud to have Bosch both as a tenant and as a brand who secures Deutsches Haus with their high quality and reliable video security cameras and sound systems,” added Ryan Lower, Property Director, Colliers International – Deutsches Haus. While meeting the challenge of securing diplomatic and enterprise assets in a publicly accessible building, the future-proof solution provides an important reference in this dynamic market.
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, announces that Planet Fitness, with the help of their preferred system integrator Adirondack Direct, recently incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security but also improves operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. Intelligent motion detection Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the camera and Video Management Systems (VMS), but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center unified platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection. Providing bookmarks of recorded incidents A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Video surveillance management Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lightsCollins said Adirondack Direct has long recommended Security Center from Genetec for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organisations through enhanced situational awareness, unified command and control and connectivity to the cloud. While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgment-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behaviour. Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it. Providing video evidence When a Lunk Alarm is pressed, Security Center creates a bookmark of the event Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate the use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Genetec video solution. When a Lunk Alarm is pressed, Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. Identifying areas of improvement The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Planet Fitness management can re-orient that employee on the proper policies and procedures Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can re-orient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. Losing sales opportunities “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.” A big question for Planet Fitness is have they been losing sales opportunities without realising it? A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realising it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check-in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Delivering a safe environment Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciated by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgment-free zone where people can do their own thing.”
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent video analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognise threats, unauthorised access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete security solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analogue video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback. But Brouwers soon learned of the vast capabilities of modern systems. He turned his focus to finding one that went beyond basic video management to offer business intelligence. Identify suspicious customers Brouwers ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic In particular, he was interested in face recognition, which would enable Cosmo Music to identify suspicious customers to prevent shoplifting. Working with integrator Northern Alarm Protection Ltd. (NAP), Brouwers looked at a number of different systems, and ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic. “I was sold on Symphony when I got to actually use it,” said Brouwers. “It floored me how easy it is to work, how straightforward it is. It is so user friendly it is unbelievable.” Brouwers likes several of Symphony’s core features, including: the ability to save video for up to six months (he had been hoping for 90 days) customisation options (for example, recording only when motion is detected) ability to bookmark video the mobile app, which lets users connect to Symphony via a smartphone or tablet to view and playback video, control pan-tilt-zoom (PTZ) cameras, manage I/O devices, receive alarm notifications, and more. Face recognition analytic Before implementing Senstar’s Face Recognition video analytic, when a suspicious customer was identified through video surveillance, Brouwers would screen capture an image, email it to staff, and ask them to keep an eye out for that person. With Senstar’s Face Recognition video analytic, Brouwers can flag suspicious customers in Symphony. When that person enters the store again, Brouwers is automatically notified. One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up" Brouwers tested the analytic thoroughly and was amazed by its capabilities. “One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Mr. Brouwers. “That’s what sold me on it.” Symphony and the Face Recognition analytic, deployed on Senstar’s R-Series network video recorder (NVR) hardware, have been running at Cosmo Music since April 2018 and Brouwers couldn’t be happier. Business intelligence applications “It’s everything I dreamed of and more,” he said. From an integrator perspective, NAP, who had significant VMS experience but never used Symphony, thinks the product is a great option for business intelligence applications. “Symphony is the right fit for any application that requires enhanced security such as analytics. It’s superior to many other systems out there,” said NAP President and CEO Dave Koziel. “From a deliver what is promised standpoint, it’s 12 out of 10 on the scale.” Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment Identify known and unknown individuals Create allow and deny lists, and be alerted when someone on that list is identified Save time and resources with a robust search functionality that lets users look for registered and unknown people in video Search across multiple cameras, and filter search results by match score or date and time Two-factor authentication processes for access control applications
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?