Video content analysis
The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced Video Content Analysis (VCA). H.265 compression By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras,...
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and...
Hikvision, global supplier of innovative video surveillance products and solutions, has released a new Thermal Bi-spectrum Deep Learning Turret Camera, which will bring enhanced capabilities of indoor fire detection, including an advanced temperature anomaly alarm and visual warning. This new cost-effective camera (DS-2TD1217/V1 Series) reduces the risks of fire and property loss. Thermal Bi-spectrum DL Turret Hikvision’s Thermal Bi-spectrum Deep Learning Turret Camera supports fir...
Dahua Technology, a video-centric smart IoT solution provider, announces the addition of the new StereoVision camera: a 3MP dual-sensor, people-counting camera that incorporates Artificial Intelligence (AI). The camera uses advanced image processing technology for improved depth perception to count people with up to 98% accuracy. The close, side-by-side positioning of the StereoVision camera’s dual lenses allows each sensor to capture images of the same area from slightly different angles...
After strategic analysis of the best options to accelerate growth at TDSi and augment the launch of the new GARDiS ONVIF Profile A and C compatible hardware and software platforms and the journey to offering Access Control as a Service capability to our customers and the market TDSi is pleased to announce that it has agreed to be acquired by VITAPROTECH Group, one of the European providers in access control and security systems and technologies for critical sites. This acquisition continues Vit...
German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier ‘HEMISPHERE’. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to f...
IdentiSys Inc. has been named one of the Top 150 Workplaces in Minnesota by the Star Tribune and was published in the Star Tribune Top Workplaces special section on Sunday, June 16. Produced by the same team that compiles the 28-year-old Star Tribune 100 report of the best-performing public companies in Minnesota, Top Workplaces recognises the most progressive companies in Minnesota based on employee opinions measuring engagement, organisational health and satisfaction. The analysis included responses from over 140,000 employees at Minnesota public, private and non-profit organisations. Employee engagement and retention The rankings in the Star Tribune Top 150 Workplaces are based on survey information collected by Energage, an independent company specialising in employee engagement and retention. IdentiSys was ranked 32 out of 70 on the small company list. Very few companies make this list ever and this is our sixth year in a row obtaining Top Workplace honours" “It is a huge honour to be among the best of the best in Minnesota. And, even more important is that our employees feel this way about the company and what we do” said Mike Shields II president and CEO of IdentiSys. “Very few companies make this list ever and this is our sixth year in a row obtaining Top Workplace honours. I am so proud to lead this organisation and know that we have the best colleagues to support our business and the focus we place on customer satisfaction.” Best work environments “Our growth strategy for the past 20 years has always been dependent on the services our employees provide daily and we believe this is the key to our continued business success.” Star Tribune Publisher Michael J. Klingensmith said, “The companies in the Star Tribune Top 150 Workplaces deserve high praise for creating the very best work environments in the state of Minnesota. My congratulations to each of these exceptional companies.” To qualify for the Star Tribune Top Workplaces, a company must have more than 50 employees in Minnesota. Over 2,000 companies were invited to participate. Rankings were composite scores calculated purely on the basis of employee responses.
Transforming the way security teams monitor, manage and control multiple systems, Maxxess is launching its new, open-architecture InSite solution at IFSEC International, (London ExCel 18-20 June, stand IF2120). Maxxess InSite is a cyber-secure, cloud-based service that has been developed to give organisations impressive new levels of situational awareness and allow the most rapid, coordinated response to wide range of incidents, both emergency and non-emergency. InSite can pull data from a wide array of security and safety systems and infrastructure thanks to its open-architecture design. Applications range from device fault monitoring, maintenance tracking and reporting, to incident handling and emergency response coordination. Effective coordination during emergency InSite doesn’t simply integrate disparate systems, it unifies their capabilities and makes them more powerful in use"For large organisations, or those with complex sites or multiple premises to manage, InSite reduces complexity and allows seamless central control. It lets day-to-day operations to be managed more efficiently, identifying problems early and reducing risks, and it enables more effective coordination during emergency incidents. “InSite doesn’t simply integrate disparate systems, it unifies their capabilities and makes them more powerful in use,” said Lee Copland, Managing Director, Maxxess EMEA. “InSite pulls together critical security infrastructure and systems – everything from cameras to door controls - bringing everything under a single operating umbrella, and unifying their functions to allow rapid communications, analysis and action.” eFusion security management platform Ambit allows system controllers to link with remote personnel via their personal devicesInSite joins Maxxess’s full suite of advanced control solutions, including the Ambit family of mobile apps and the eFusion security management platform. Ambit allows system controllers to link with remote personnel via their personal devices, enabling alerts, notifications, status assessment and functions including video surveillance support. And eFusion integrates seamlessly with more than 60 off-the-shelf systems from leading vendors, including surveillance, access control, fire and intruder systems with back-office processes. For managers and teams that need to be mobile, the Maxxess MX+ client gives secure web access to eFusion controls and functions via smartphones and tablets. The full suite of Maxxess technologies will be on show at IFSEC, providing complete solutions for organisations looking to streamline their operations and improve control of multi-system infrastructure.
VIVOTEK, an IP surveillance provider, will be showcasing its latest comprehensive surveillance solutions at IFSEC 2019, taking place from June 18 to 20 at ExCel London. During IFSEC 2019, VIVOTEK will present Deep Learning Smart VCA, Cybersecurity Management Solution, and a brand new license plate recognition camera. As one of the founding members of the Open Security & Safety Alliance (OSSA), VIVOTEK, in its shared pursuit of a common standardised platform, will also reveal an innovative Android-based AI camera at its booth (#IF2324). Event highlights At IFSEC 2019, 4 highlights will be exhibited by VIVOTEK: Deep Learning Based People Detection: In the era of Artificial Intelligence, VIVOTEK aspires to bring more valuable analysis of human behaviour to its solutions. Based on its self-developed Deep Learning based People Detection technology, VIVOTEK has improved security with proactive detection and now focuses this technology on commercial opportunities. With accurate People Detection technology, only the activities of persons will trigger an event. It thus significantly reduces false alarms as well as enhances operational efficiency by making use of data insight reports. VIVOTEK will introduce the latest end-to-end Cybersecurity Management Solution Wide Coverage 180-Degree Solution and Cybersecurity Protection: VIVOTEK will demonstrate a series of 180-degree solutions offering panoramic supreme views for different applications. The 180-degree solution considerably reduces the total number of cameras required, and ultimately saves both cost and time spent on installation. In addition, VIVOTEK will introduce the latest end-to-end Cybersecurity Management Solution and display how it responds to a live cyber attack targeted on network cameras at its booth. New License Plate Recognition Solution: As the demand for License Plate Recognition (LPR) rises, VIVOTEK continues to develop more advanced solutions to meet user requests. In IFSEC 2019, VIVOTEK will reveal the latest H.265 bullet license plate recognition camera, the IB9387-LPR. Featuring edge-computing technology, the brand new IB9387-LPR is embedded with license plate recognition software capability and is able to identify license plates on a black list or white list. It allows users to receive real-time recognition without delay and effectively reduces loading of the backend server. All of these features are making this camera an ideal product for parking access control and STOP & GO toll applications. New Android-based AI Camera for OSSA: VIVOTEK is one of five founding members of OSSA, the alliance aiming to create a common standardised platform for security and safety solutions. To support its mission, VIVOTEK has dedicated itself to developing its very first camera prototype on the Android platform to be displayed at IFSEC 2019.
Barco, a pioneer in visualisation solutions with a significant heritage in LED technology, is introducing their newest LED series. Over the past years, high-res LED has established a certain dominance as the core technology in the world of display visualisation, and its use cases are booming across many segments. Barco’s XT series is specifically designed to provide premium quality and reliability, addressing a broad audience in a wider range of indoor LED applications. The XT series offers spectacular visual performance, high reliability and great operating flexibility, and is suited for many indoor applications – including corporate business and visitor centres, boardrooms, television studios, design centres and control rooms. Each XT LED tile has a 16:9 aspect ratio which makes it easy to create native Full HD or UHD screens“Barco has a long history in the LED market,” says Nicolas Vanden Abeele, Senior VP Entertainment. “With the XT series, we are bringing our high-end LED solutions into markets where Barco has been present for many years, but where LED has never been the leading technology. Now we can offer them three complementary display technologies: projection, LCD and LED.” Video content without compression With 16:9 being the dominant aspect ratio for video, PowerPoint slides and other content types, it makes sense to have a visualisation canvas with the same format. Each XT LED tile has a 16:9 aspect ratio which makes it easy to create native Full HD or UHD screens. It allows the displaying of video content in full without compression or unused canvas. Introducing 4 models, with pixel pitches of 0.9, 1.2, 1.5 and 1.9 mm, the XT series offers customers the ability to pick exactly the size that best suits their application. The field-proven image processing solution InfinipixTM offers perfect image quality in both maximum brightness and dimmed modes and is ensured to stay constant over time – a unique feature of Barco. Also, with InfinipixTM, no image tearing or video artefacts occur with fast-moving images. All this results in a pleasant viewing experience that is further optimised through the easy alignment and patented camera-supported seam correction technology from Barco’s healthcare division. Better performance and resolutions The improved robustness of the XT series facilitates easy installation with a reduced risk of pixel damage. The LED displays are designed for wall mounting, meaning they are fully accessible from the front – creating a shallow depth. Assisted Module Extraction makes sure that the tiles can be easily removed for maintenance or replacement. The ultimate versatility and 24/7 reliability of the XT series enable it to be deployed in many different environments “LED technology has matured and now offers higher performance and resolutions at a better price point,” says Bram Dieryckx, VP LED division. “This opens up opportunities for LED in high-resolution indoor applications, such as control rooms, meeting rooms, board rooms, flagship venues, digital prototyping labs and many more. The moment to introduce our LED solutions into these markets is now.” Suitable for different environments The XT LED platform implements all necessary features to maximise uptime of the wall, including redundancy of both power and data. Users can also be notified upfront of any warnings or failures, so proactive measures can be taken in advance rather than facing sudden complete wall downtime. The ultimate versatility and 24/7 reliability of the XT series enable it to be deployed in many different environments. Visitors of ISE 2019 already had a chance to get a first glimpse of the new XT series. The 27” Direct View LED tiles were showcased at the tradeshow, and received positive feedback confirming the premium seamless image quality. According to Bram Dieryckx, “customers who visited our booth at this year’s show were quite excited about the XT series. They were amazed by the accurate colours and seamless image quality of our LED tiles.”
Visix, Inc. is now shipping the full release of their AxisTV Alert software application for digital signage. This stand-alone alerting platform can be used with any content management solution, including Visix’s own AxisTV Signage Suite, and easily integrates with popular third-party alerting suites like Alertus and Rave Mobile Safety. AxisTV Alert “We’re excited to launch this new app after beta testing it since December,” says Trey Hicks, chief sales officer for Visix. “Today’s school districts, colleges and even corporate campuses are very serious about on-site safety, and our software is a great addition to their crisis communications toolkit. It’s very gratifying to help organisations keep their people safe.” AxisTV Alert is built around Common Alerting Protocol (CAP) standards, and has been designed for high reliability, scalability and performance. The user interface is streamlined and dedicated to alert functionality, with time-saving workflows to ensure that critical alerts and updates can be sent across a digital signage system in seconds. Clients can use the app to send out emergency alerts, safety notices or important reminders, with multiple messages running on the system at once or a single message overriding all screens for a selected time period. Central alert management system The platform combines a central alert management application (AxisTV Alert) with playback software (AxisTV Siren) for an unlimited number of players and can be used with both on-premise and hosted signage systems. AxisTV Alert uses asynchronous and multi-thread processing for high performance while 1) consuming CAP messages from third-party mass notification vendors and 2) rapidly communicating with media players running Siren. AxisTV Alert also provides customisation options, letting clients configure standard fields like headline, description, instructions, contact and web link. The software automatically sizes message text to fit the display area on screen, and clients can style their alert messages with choices for font, color, style, background image and more.
Hardly any other topic is creating as much excitement as Artificial Intelligence (AI) at the moment. High expectations and extravagant promises abound, particularly in the field of video security technology: Here, the ideas about what it can do range from detecting unusual behaviours such as attacks on individuals to recognising individual faces even in large crowds of people to automatic detection of the proverbial ‘bomb in a suitcase’. The Regensburg-based company Dallmeier has been working on and with AI technologies for years, and has now published four practical statements intended to help customers and providers to make a realistic assessment of AI. Video security technology People often ignore the fact that new technologies always require public debate and changes to very real framework conditions At the beginning of a hype cycle, when innovations are being introduced, people often ignore the fact that new technologies always require public debate and changes to very real framework conditions before they can be implemented wholesale. The still unresolved problem in autonomous driving – when it comes to accidents where the car has to make potentially fatal decisions – has become an almost classic example. There are similar unresolved questions when AI is used in video security technology: How much freedom to decide should a system be given? What quality criteria will be established for detecting objects, for example? Who is to be held accountable when an attack is not detected, for example, even though the expectation may possibly exist already among the people? What reaction times will be defined, by when must response teams reach the site in the event of an ‘AI alarm’? Are there even enough personnel available for the potential new intervention and search options? How are the many ‘false positives’ to be handled when facial recognition is used to find a suspect, for example? Video analysis systems Technical systems are becoming more and more complex. This is why it is essential to evaluate all of the parameters that affect the performance of a whole solution. The IT axiom ‘garbage in, garbage out’ is most apposite in this context: Neural networks for classifying objects or processes or good facial recognition software can only deliver results that are consistent with the quality of the video image they receive: AI-based video analysis systems can only be as good as the camera systems that capture the images for them. In this context, it will be particularly important to be able to define and plan minimum picture qualities properly in all parts of the video image, plan camera angles correctly, and consider many other details. And the person behind the system must be also be included in the overall consideration with regard to qualification and organisational questions. In short: Unless all factors are tuned to work together, it will not be possible to ensure compliance with standards – which by the way have not even been defined yet! Perimeter protection Initial deployment scenarios and functioning solutions already exist, whether it be in the optimisation and analysis of analogue processes With all due caution: It goes without saying that Artificial Intelligence will play a decisive role in video technology – or may even become a core component of the discipline. Initial deployment scenarios and functioning solutions already exist, whether it be in the optimisation and analysis of analogue processes, e.g., at a casino gaming table, in the improved classification of objects for perimeter protection, or in the assisted tracking of individuals in the context of urban surveillance. The key point in all of these systems: Today and probably for a long time to come a human is still at the centre – the operator, the policeman, the forensic specialist. And it is for these functions that AI in video technology now already delivers useful assistance systems. They are being improved rapidly and take over tedious, error-prone tasks. But contrary to all the advertising features on YouTube, automatic location of a planted ‘suitcase bomb’ in complex circumstances is still well beyond current technological capabilities. Technical innovation Every technical innovation is predestined to contend with ambiguous definitions, exaggerated expectations and variable interpretations of its capabilities: No one ‘really knows’, but everyone involved has an opinion. This is why it is important to examine and question closely: Which functions are market-ready and implementable – even if a little tweaking is needed –, and what is still purely in the realm of research? Particularly with a view to strategic decisions and investments, prospective users should always begin by asking themselves whether a given result can be expected in twelve months, five years, or ever. Otherwise, they run the risk of losing sight of obvious solutions to pressing problems.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organisation’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The next wave in IP technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analogue-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analogue audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial intelligence: hype vs. reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organisation’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting with the right partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labour, fair wages and sourcing minerals from countries in armed conflict. Go in with a plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
We’re here again. The end of another calendar year, and a time when many organisations are assessing their performance over the past 12 months and finalising strategic plans for 2019. Taking time to reflect on where our industry is at – and what’s likely to happen in the future – is important for all organisations as they set out their long-term goals and tactics. Here are some of the key trends to watch in the months to come and some predictions on their potential to influence, or disrupt, in 2019 and beyond. Providing value with A.I. computer vision No one will be surprised to see artificial intelligence (A.I.), computer vision and similar content analytics listed as a major trend shaping the physical security industry. Solutions employing A.I. (performing a task that would normally require human intelligence) and/or computer vision (extracting, analysing and understanding information extracted from digital images or video) are everywhere. And most would agree our industry has only scratched the surface in terms of their potential. We’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner While many companies are focussed on the efficacy of these analysis technologies, there’s been less discussion about how to best leverage them in real-world applications. Ensuring the accuracy of these products is certainly a must, as no one wants to repeat the cycle we saw with security analytics a decade ago, when their promise initially fell far short of expectations. Identifying the real benefit of analytics With A.I., computer vision and similar content analytics, it will be interesting to watch the companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Many of these organisations are true A.I. and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Hybrid solutions for data storage Expect to see more hybrid solutions on offer in 2019, incorporating both on-premise storage and cloud storage Another trend that will continue this year is the push toward centralised cloud storage, particularly in enterprise organisations. Expect to see more hybrid solutions on offer in 2019, incorporating both on-premise storage and cloud storage for the retention of more critical data for longer periods. Despite the buzz around cloud solutions the last few years, uptake has not been significant to date for several reasons. A majority of cloud solutions in the physical security space have been pure cloud solutions as opposed to hybrid solutions, and many organisations have yet to embrace the costs and understand the benefits. Most corporations considering a cloud solution are focussed on leveraging cloud storage as a back-up to on-premise storageMost corporations considering a cloud solution today are focussed on leveraging cloud storage as a back-up to on-premise storage in case of a hard drive failure or for archiving video for an extended period. But that’s only the starting point for the power of centralised data. The real benefits will be clear when organisations start applying cloud-based analytics to enhance business intelligence and improve operations including inventory management, marketing and customer service. Expect this to be a growing theme in 2019. Access to affordable bandwidth will also help with cloud adoption. While bandwidth remains an issue for some organisations, it’s becoming less of a barrier as enterprise customers continue to update their networks and capacity. Impact of GDPR on organisations Data protection was another key focus this past year, especially as Europe’s General Data Protection Regulation (GDPR) came into effect on May 25, 2018. The GDPR has impacted not only European organisations but most organisations doing business in Europe. Whether you’re a bank based in Dubai or a retailer headquartered in the U.S., more than likely you’re touching European soil at some point, and therefore you must follow GDPR legislation. The GDPR has impacted not only European organisations but most organisations doing business in Europe It’s now clear that the regulation is casting a much wider net that some anticipated. Expect to see a stream of announcements from manufacturers in 2019 as they continue to enhance and offer new features to customers to support GDPR compliance, or play catch up in some instances. In addition, we will certainly see other jurisdictions issuing their own versions of data protection legislation. California, for example, passed a similar Consumer Privacy Act in June 2018. Often considered a bellwether state, California’s Act likely signals the start of more data privacy legislation to come across the U.S. New companies entering the AI and analytics sector There are a number of startup companies focussed on A.I., computer vision and similar analytics emerging in our marketA final industry shift to track in 2019 is the entry of new companies in the physical security space. As I noted above, there are a number of startup companies focussed on A.I., computer vision and similar analytics emerging in our market. While the majority of them likely won’t make it as standalone companies, many of them will be acquired by larger organisations looking to enter the video-based business intelligence space and/or accelerate market penetration. Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focussing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Those are my top predictions for 2019, following what I would consider to be a pivotal past 12 months. It’s a time ripe with opportunity for those companies with a clear vision that correctly anticipates future market demand, and the ability to execute. I look forward to seeing how these next few months unfold.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated video cloud service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organisations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-accelerated solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM software platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial recognition software IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorised person and track him or her across non-overlapping cameras. Enhance situational awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-class security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimised to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic physical security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable productsUL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive automated system Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create significant value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT device security management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyses data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyse more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified vendor agnostic software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing connected devices from cyber threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent video analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognise threats, unauthorised access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete security solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analogue video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback. But Brouwers soon learned of the vast capabilities of modern systems. He turned his focus to finding one that went beyond basic video management to offer business intelligence. Identify suspicious customers Brouwers ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic In particular, he was interested in face recognition, which would enable Cosmo Music to identify suspicious customers to prevent shoplifting. Working with integrator Northern Alarm Protection Ltd. (NAP), Brouwers looked at a number of different systems, and ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic. “I was sold on Symphony when I got to actually use it,” said Brouwers. “It floored me how easy it is to work, how straightforward it is. It is so user friendly it is unbelievable.” Brouwers likes several of Symphony’s core features, including: the ability to save video for up to six months (he had been hoping for 90 days) customisation options (for example, recording only when motion is detected) ability to bookmark video the mobile app, which lets users connect to Symphony via a smartphone or tablet to view and playback video, control pan-tilt-zoom (PTZ) cameras, manage I/O devices, receive alarm notifications, and more. Face recognition analytic Before implementing Senstar’s Face Recognition video analytic, when a suspicious customer was identified through video surveillance, Brouwers would screen capture an image, email it to staff, and ask them to keep an eye out for that person. With Senstar’s Face Recognition video analytic, Brouwers can flag suspicious customers in Symphony. When that person enters the store again, Brouwers is automatically notified. One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up" Brouwers tested the analytic thoroughly and was amazed by its capabilities. “One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Mr. Brouwers. “That’s what sold me on it.” Symphony and the Face Recognition analytic, deployed on Senstar’s R-Series network video recorder (NVR) hardware, have been running at Cosmo Music since April 2018 and Brouwers couldn’t be happier. Business intelligence applications “It’s everything I dreamed of and more,” he said. From an integrator perspective, NAP, who had significant VMS experience but never used Symphony, thinks the product is a great option for business intelligence applications. “Symphony is the right fit for any application that requires enhanced security such as analytics. It’s superior to many other systems out there,” said NAP President and CEO Dave Koziel. “From a deliver what is promised standpoint, it’s 12 out of 10 on the scale.” Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment Identify known and unknown individuals Create allow and deny lists, and be alerted when someone on that list is identified Save time and resources with a robust search functionality that lets users look for registered and unknown people in video Search across multiple cameras, and filter search results by match score or date and time Two-factor authentication processes for access control applications
Cherokee Nation Entertainment (CNE) is the gaming and hospitality arm of the Cherokee Nation, operating multiple casinos and hotels across northeast Oklahoma, USA, including the prestigious Hard Rock Hotel & Casino Tulsa. Concerned that their security team was spending an overly large number of person-hours reviewing video recordings searching for a single person of interest, CNE sought to reduce the time it took to review security footage, so their security team could remain focused on proactive tasks, and optimise their day-to-day efficiency. CNE also wanted to obtain and assess accurate data on occupancy and visitor trends for business intelligence purposes. Furthermore, CNE wanted to be alerted to security-related events in real-time, in order to handle security issues as they developed. savVi’s video surveillance solution CNE selected savVi, Agent Vi’s on premise video analytics solution, due to the wide range of video analytics capabilities that savVi offers. Over 1,000 savVi licenses were purchased, allowing cameras at CNE’s ten Oklahoma-based casinos to be enabled with different combinations of real-time event detection, video search and business intelligence capabilities. CNE utilises the video search capability most widely – to enable rapid search through the surveillance video to pinpoint events of interest – and therefore video search capabilities are enabled on the majority of cameras at the sites. Business intelligence capabilities are mostly deployed around the various gaming machines, and at entrance and exit points, to show traffic patterns and real-time people counts. Real-time event detection capabilities are used largely for the high-security areas to ensure that CNE’s security team is informed regarding situations, as they unfold. savVi is deployed through integration with a range of Axis network cameras, primarily the AXIS P3225 and Q3505 fixed cameras, the AXIS P5635, Q6044 and Q6045 PTZ cameras, and for outdoor vehicle search, the AXIS Q3708 fixed camera with three sensors. CNE uses Milestone XProtect Corporate Video Management System (VMS), which is fully and seamlessly integrated with savVi, a Milestone Certified Solution. savVi’s video search capabilities allow for verification of personal injury claims by customers who may be trying to defraud the casino savVi’s real-time event detection savVi’s video search capabilities are of considerable importance to CNE. There is a prevailing need for the casinos to be able to swiftly locate specific events within masses of footage (“incident remediation” as it is known within the entertainment industry). Among other things, this allows for verification of personal injury claims by customers who may be trying to defraud the casino. Previously, the security team’s time was heavily occupied by observing hours of footage in search of a specific person or incident. savVi now enables CNE to run the search automatically, allowing far more effective use of the operators’ time, and reduced search time from as much as 16 hours for a single search, down to a matter of minutes. savVi’s real-time event detection capabilities are primarily used by CNE to ensure a safer and more secure environment within the casino parking facilities. By immediately alerting to any suspicious event, such as people loitering or cars moving in an unauthorised direction, the security team can monitor events and act accordingly as they unfold. savVi’s heat mapping capabilities savVi also allows CNE to gather and analyse essential business intelligence data on occupancy and visitor trends. savVi delivers accurate headcounts, meaning that the security team is constantly aware of how many people are on-site and using the casino facilities. This provides essential knowledge in the case of an emergency where a facility might need to be evacuated, and also helps prevent over-crowding. By utilising savVi’s heat mapping capabilities, CNE has knowledge of which areas of the casino are more heavily populated, and at what times. CNE can then leverage the data collected in a number of ways, including negotiating leasing deals for externally-owned casino equipment and knowing which internal locations require heavier investment of machines and personnel. This puts CNE well ahead of its competitors, as it is one of, if not the, first gaming company to employ Business Intelligence through video analytics. SavVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities" savVi’s video analytics capabilities “It was savVi’s swift and effective video search that caught CNE’s attention when searching for an enhanced security solution, in particular due to the automated query ability,” said Joshua Anderson, Director of Surveillance and Technology, Cherokee Nation Entertainment. “We have been extremely impressed with savVi’s capabilities and the quality of its performance, and fully expect savVi to increase efficiencies and provide true ROI which will have a major impact on the bottom line.” “Cherokee Nation Gaming Commission’s approval of savVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities offer to gaming concerns,” commented AJ Frazer, VP Business Development, Agent Vi. “Having selected to deploy the full range of savVi video analytics functionalities, savVi offers CNE valuable insights into the activities and customer experience at their multiple sites, benefitting both CNE and their customers.”
One of the UK’s largest video surveillance projects in recent years involving the deployment of 845 Wisenet cameras manufactured by Hanwha Techwin, is nearing completion. The video surveillance system, which is designed to play an important role in helping ensure the safe and reliable delivery of public transport across the West Midlands, is being used to monitor activity at over 50 railway stations, 11 bus stations, 3 Midland Metro park and ride sites, as well as the main Number 11 bus route around the City of Birmingham. Live and recorded images from all cameras are being monitored at an advanced control room, located in central Birmingham Wisenet HD IP camera integration The project which is targeted for completion in July 2018 has so far seen approximately 845 Wisenet cameras installed by Total Integrated Solutions Ltd. (TIS) on behalf of Transport for West Midlands which was set up by the West Midlands Combined Authority (WMCA) to co-ordinate investment needed to improve the region’s transport infrastructure. The remaining work includes the deployment of the latest generation of Wisenet high definition IP cameras at a number of car parks, together with significant camera upgrades in Walsall and Solihull, two of four Local Authority public space CCTV systems are already monitored by WMCA. Live and recorded images from all the cameras are being monitored at a £1.2M state-of-the-art control room located in central Birmingham. “Our approach to this very large, complex project was not simply one of agreeing to meet exacting KPI’s from a performance perspective,” said Eamonn Murphy, Coleshill based TIS’s key account manager. “We felt the route to success would be to adopt a more partnership type approach, where we were not only the provider of technical solutions but were also involved at a strategic level in identifying with Transport for West Midlands a pathway of system upgrade, improved efficiency, cost reduction, innovation and utilising latest technology such as video analytics to the best advantage.” TIS is assured seamless integration between Wisenet cameras and Veracity Coldstore ‘direct to storage’ solution Wisenet cameras & Veracity Coldstore solutions Transport for West Midlands evaluated cameras available from 9 different manufacturers. The subsequent decision to source all the cameras from Hanwha Techwin, (previously known as Samsung Techwin), was partly due to the price/performance ratio of its cameras, but there were two other important factors which were taken into consideration. Firstly, Hanwha Techwin has a close working relationship with its technology partner, Veracity. This meant TIS could be assured that there would be seamless integration between Wisenet cameras and the Veracity Coldstore ‘direct to storage’ solution. This negates the need for Network Video Recorders (NVRs) and thereby substantially reduces capital costs, as well as minimising setup and maintenance requirements. Open Platform cameras The Veracity Coldstore recording solution is unique in the linear way that data is written to the hard drives. Only 2 hard drives are spinning at any one time, meaning a significant reduction in power consumption, lower heat generation and greater longevity of the hard drives, reducing the overall cost of ownership. When drive failures do occur, the faulty drive can be swapped with a new drive allowing uninterrupted use. The second important factor was the capability of the Wisenet open platform cameras to accommodate a variety of edge-based analytics such as ANPR and heat mapping, should Transport for West Midlands wish to deploy these at some point in the future. Trials of the Wisenet People Counting application are currently being carried out. This utilises the analytics software developed by Facit Data Systems, another Hanwha Techwin technology partner. Wisenet SNP-6320H cameras are configured for the transmission of 25 images per second (ips) at 1080p resolution Intelligent Day/Night cameras A large percentage of the cameras installed are Wisenet SNP-6320H 2 Megapixel Full HD network PTZ dome cameras. In addition to being a true Day/Night camera which is able to capture high quality images in low light, the SNP-6320H’s powerful 32 x zoom capability enables operators to observe the close-up detail of any activity. Trials were conducted where the cameras were capped at 2 Mbps and configured for the transmission of 25 images per second (ips) at 1080p resolution. The performance at this low bandwidth level was impressive and further contributed to the selection of the Wisenet SNP-6320H, which are also equipped with intelligent auto-tracking capability to ensure a greater level of detail can be captured when no operator is present. Other Wisenet cameras deployed as part of the project include the SNV-6084R vandal-resistant IR dome and the SNB-6004 fixed camera, both of which are able to capture Full HD 2 Megapixel images. Video Surveillance Technology “Working on rail, Metro and bus station sites spread across the wider West Midlands area is a complex and challenging operation and the TIS team deserve recognition for its expertise and diligence,” said Mark Babington, Safety & Security Manager for Transport for West Midlands. Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment" “TIS’s engineers were qualified to the highest degree to support the latest video surveillance technology, as well as being experienced to cope with older legacy systems. Both were needed within the unique environment of a busy integrated transportation network which brings its own exceptional requirements of compliance with bespoke health and safety legislation.” “Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment in the West Midlands transport infrastructure.” Commenting on the success of the project, Bob (H.Y.) Hwang Ph.D., Managing Director, Hanwha Techwin Europe, said: “We greatly value the opportunity to have been involved in this project. It is a excellent example of the benefit of all stakeholders interacting with each other in partnership at an early stage of a project to ensure the most suitable products are specified and subsequently installed to the client’s satisfaction.”
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?
In the analogue era, videotape was the storage media of choice for CCTV systems. Since the advent of digital video, and of IP-based systems, a variety of other storage formats have come to the fore, including hard drives, flash drives, SD cards and others. Now we are in the age of the cloud, which offers new opportunities to store vast amounts of video and presents challenges such as bandwidth and cybersecurity. For a current perspective on storage, we asked this week's Expert Panel Roundtable: How are new developments in video storage impacting the video surveillance market?