Video content analysis
VuWall, a pioneer in video wall control and AV network management, announced new engineering and sales hires in the United States. Francisco Provencio has been appointed application engineer while Christian Cooper joins as account manager for the East Coast. These new positions will provide additional resources for customers throughout the U.S. as VuWall continues to grow globally. Currently, VuWall has more than 1000 deployments in over 45 countries, with more than 200 in the U.S. alone. As thi...
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, and Northdoor Ltd., a London-based IT consultancy, will sponsor, exhibit, and make a presentation at the upcoming IBM Think Summit London on Oct. 16 at the Olympia London event center. Scheduled for 12:39 p.m. as part of the Cloud and Infrastructure Think Tank, the presentation is titled "Machine Learning Meets Data Protection — the unstoppable force meets the immovable object?" The companies will be exhibiting in the...
ETSI is pleased to announce the creation of a new Industry Specification Group on Securing Artificial Intelligence (ISG SAI). The group will develop technical specifications to mitigate threats arising from the deployment of AI throughout multiple ICT-related industries. This includes threats to artificial intelligence systems from both conventional sources and other AIs. The ETSI Securing Artificial Intelligence group was initiated to anticipate that autonomous mechanical and computing entitie...
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualise incident and indicator flows, allowing security teams to better manage and automate incident response. Key updates to Demisto v5.0 include - Reimagined User Interface - Brand new UI that streamlines global navigation while also enhancing the delivery of information within each...
In the latest product update of Milestone XProtect 2019 R3 video management software, Milestone Systems introduces several new features and capabilities. These include centralised Search, a new Driver Framework, adaptive streaming and enhanced Device Password Management. With this product update, Milestone Systems continues to pursue ever higher performing software to fulfill the market’s rising demands for cost-effective video technology solutions. Centralised Search One of the main fea...
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intel...
Pyronix is delighted to provide even more value and capabilities to installers and users alike, with the addition of video verification to ProControl+. Now, using our Enforcer V10 control panel, Wi-Fi cameras and security and life safety peripherals, the system can be tailored to detect, notify and verify any activity. “We’re really pleased to add this latest feature to our ProControl+ app,” said Pyronix Marketing Manager, Laurence Kenny. "Video verification delivers fantastic upsell opportunities to video monitoring for our installers, while providing greater functions for the user; showing them exactly what activity has triggered an event or alarm.” The addition of video verification enables the linkage of Pyronix Full-HD Wi-Fi cameras to inputs on the system via the PyronixCloud. This simple setup process adds greater scope to security; providing a 25 second video clip directly to the user via ProControl+ when an event or alarm activation occurs. The clip, which can be downloaded and stored as an MP4 file, shows 15 seconds pre-alarm and 10 seconds post-alarm; allowing the user to truly verify the activation, before taking appropriate action. Voice push notification Whether it’s an existing system or maintainance, service can be offered to provide greater selling options for installers" For example, should an intruder be detected by an XDL12TT-WE outdoor detector, a push or voice push notification will be received by the user through their ProControl+ app, via the Enforcer V10 and PyronixCloud infrastructure. If this detector has been linked to an outdoor Mini Dome camera surveying the area, the user will also be provided with the 25 second video from the linked camera to verify the alarm. “By adding this new feature, we’re giving installers new services to offer their customers; expanding the security offering by providing real tangible benefits across both residential and commercial applications to users,” Laurence commented. "So, whether it’s an existing system, a maintenance visit or a brand-new installation, this added-value service can be offered to provide greater selling options for the installer and greater functions for the user. Simple to setup and deliver via the PyronixCloud, we want to make sure we continue to proactively provide more features, functions and capabilities via ProControl+.” Video verification for applications With video verification already added to ProControl+, more developments are in the pipeline “Now, the system not only alerts the user via voice push notification, but also shows exactly what activity has taken place on the system, so that appropriate action can be taken. Our objective is to continue to extend the potential of every installation and the level of function and value it adds to installers and users alike and we intend to do this as seamlessly and easily as possible.” Linking cameras with inputs can be set up to deliver video verification for various applications across the entire security system, from setting and unsetting, indoor detection, shock sensors and outdoor detectors, to life safety sensors, door and window contacts and even panic, hold-up and medical alerts; providing additional product upsell opportunities. With video, voice push notifications and now video verification already added to ProControl+ and many more developments in the pipeline, now’s the time to make the switch.
Video surveillance has evolved from a simple requirement for clear images to video content analysis (VCA) for improved management. Now, with deep learning, security solutions are enabled with sophisticated intelligence and efficiency at a whole new level. Hikvision AcuSense software Hikvision AcuSense makes advanced VCA and deep learning capabilities available to SMBs Hikvision AcuSense is newly born out of this, which makes advanced VCA and deep learning capabilities available to small and medium businesses, and residential customers for the first time. Small and medium businesses have many of the same surveillance and security requirements as larger organisations. They need to identify and react to perimeter breaches in real time, and to automate footage searches to fast locate true events. Another example could be the security and protection for residential areas. Perimeter protection When the need to look into the security of a property arises, the first line of defence would be securing its perimeter. The idea is to prevent intruders from breaking in. However, conventional surveillance system may not do the job well enough. Conventional surveillance systems provide certain detection features enabled by video content analysis (VCA), such as motion detection, line-crossing detection and intrusion detection, but, would simply compound all event detections, triggering frequent alarms when an object is detected. This could be an animal, a shadow, or other natural movements – we call them false alarms. As a result, the need to spend time to investigate each one is very consuming, potentially delaying any necessary response and generally affecting efficiency. Video content analysis So being able to identify the real threats – the presence of a human or a vehicle – would greatly improve the accuracy of perimeter VCA functions. Hikvision’s hassle-free AcuSense technology can help achieve this goal, and give a cost-effective way to protect locations and assets. Employed with advanced VCA and deep learning algorithms, Hikvision AcuSense helps maximise security with efficient human and vehicle detection by categorising alarm information into human, vehicle, and other objects. With high accuracy, the system disregards alarms triggered by other objects such as rain or leaves, and delivers alarms that are associated with human or vehicle detection. Quick target search and detection Hikvision AcuSense has a “quick target search” feature that allows security personnel to find footage quickly Hikvision AcuSense has a “quick target search” feature that allows security personnel or local police to find footage quickly in the event of a security incident. This saves many hours rather than searching for footage manually. Now, re-imagine perimeter security systems armed with Hikvision AcuSense technology. Video surveillance is in operation when an intruder tries to sneak in on a windy and rainy day. The intruder probably thought such bad weather would do him a favor, as there are no witnesses near your house. But this is not the case. Effective intrusion detection The security camera incorporated with AcuSense precisely captures the intruder entering the front yard. At the same time, the home owner receives a message on their smartphone and view the video feeds. With this verified alarm, action can be taken straight away. Hikvision AcuSense prevents problems before they escalate into would-be emergencies. The fully-integrated video surveillance makes it easy for owners to see and capture important activity with video alerts, live feeds and 24/7 digital video recording – all easily viewed from your Hik-Connect app. Hikvision AcuSense key features: False alarm reduction – Reduces false alarms triggered by inanimate objects to a minimum, vastly improves alarm efficiency and saving costs; Quick target search – More efficient and effective file searching based on human and vehicle classification, preventing security personnel from having to search through footage manually; Strobe light and audio alarm – Wards off potential intruders by combining siren with flashing light.
An agreement between site protection provider Orbis Protect and the makers of the UK’s most secure smart key safe is set to significantly improve security for site managers and FM staff across the country. Orbis Protect has agreed an exclusive distribution deal with Keynetics, the makers of the Bluetooth-enabled SentriKey®, to offer a full-proof security solution for thousands of contractors across the UK. Secure key management system It benefits users by saving time, increasing security and cutting costs, as it can be used up to 6,000 times" The agreement will see Orbis distribute the UK’s only commercially accredited Bluetooth-enabled key safe to its growing client list. The patented technology of SentriKey® is the only access solution on the market that provides flexible, traceable, easy and secure access using a mobile device. It is made of chromium molybdenum aircraft-graded steel, offering the most secure key safe on the market. Guy Other, CEO of Orbis Protect, said: “We’ve harnessed the power of Bluetooth technology and significant software engineering experience to create the most advanced easy-to-use and secure key management system on the market. It benefits users by saving time, increasing security and cutting costs, as it can be used up to 6,000 times, over a three year period.” Integrated lone worker protection “SentriKey® offers reports detailing access control by property managers, maintenance teams and contractors, which can be useful in any HR or insurance cases. This full-proof security solution will benefit those working on-site, as the system also offers an enhanced level of safety with integrated lone worker protection.” Our partnership with Orbis Protect, will seamlessly integrate SentriKey® into Orbis Protect’s day-to-day operations Stuart Wheeler, Managing Director at Keynetics, said: “Our exclusive partnership with Orbis Protect, one of Europe’s largest vacant property services companies, will seamlessly integrate SentriKey® into Orbis Protect’s day-to-day operations and service offerings, including safety-critical ecosystems, key storage, on-site security and data analysis.” Alarm integrated device “SentriKey® and Orbis Protect intend to collaborate on future cloud, digital and workspace security transformation technologies, with scope to be used by wider industries.” Orbis is launching three SentriKey® Lockbox options including a wall mount, portable configuration and alarm integrated device. SentriKey® has been approved by the Loss Prevention Certification Board (LPCB), the International Certification Body in the fields of security and fire protection. It is the only key safe in the World to have achieved the esteemed C1 security rating, making it the most secure key safe available on the market and the only one accredited for use on commercial buildings.
Security and Safety Things GmbH (SAST) will demonstrate their open IoT platform for video surveillance cameras at the Global Security Exchange (GSX) in Chicago, September 10 to 12, 2019 at McCormick Place. The world's first open and standardised operating system with a global IoT marketplace will feature applications from more than 15 partner software developers running on security cameras from more than five camera manufacturers in an innovative, airport-themed booth at GSX. "GSX is the ideal event for us to offer a sneak preview of our rapidly growing ecosystem, which includes camera manufacturers demonstrating prototype cameras with the SAST operating system,” said Hartmut Schaper, CEO of Security and Safety Things. “We’re particularly excited to present innovative AI applications as part of the SAST marketplace, ranging from real-time edge analytics to deep learning, using technology such as Microsoft Azure Cognitive Services.” Video analytics improve store operations 15 partners to help increase security, optimise operations and improve customer experiences at airports" The airport-themed booth will illustrate video analytics use cases in three core areas of an airport: The terminal, the boarding gate and the duty-free shops. The terminal section will feature a cross-domain use case together with Microsoft Azure Cognitive Services and Here Technologies, presenting how security and customer experience can be improved with deep learning. The boarding gate section focuses on security and safety use cases, such as showcasing applications to detect abandoned luggage. In the duty-free store, partner developers will illustrate how video analytics help improve store operations and how neural network learning solutions improve the shopping experience of customers. Camera analytics with mapping services “Together with our partner Here Technologies, we will for the first time present cross-domain use cases, showcasing how travel journeys can be improved by integrating camera analytics data with mapping services,” said Nikolas Mangold-Takao, VP Product Management, Security and Safety Things. "These benefits are part of our mission and that of our more than 15 developer partners to help increase security, optimise operations and improve the customer experiences at airports and many other industry verticals as well.” All applications will run on prototype cameras with SAST OS from members of the Open Security and Safety Alliance (OSSA).
The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced Video Content Analysis (VCA). H.265 compression By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras, data rate can be reduced by up to 50% compared with an H.264 stream without sacrificing resolution or image quality. When used in conjunction with the latest Dallmeier recording systems, a significant reduction in network and memory capacity can be achieved. Another advantage of the new 5000 series cameras is the new generation of Video Content Analysis (VCA) Another advantage of the new 5000 series cameras is the new generation of Video Content Analysis (VCA). Neural networks are implemented in the camera, supporting the classic VCA and thus enabling significantly more efficient object classification in the camera itself. After a short learning phase, the system is capable of delivering still more precisely defined analysis of the recordings and more effective use of automatic video analysis functions such as lossless and multiple auto tracking. Dallmeier Camera Series 5000 The camera models DDF5250HDV-DN and DDF5450HDV-DN (dome), DF5250HDV-DN/IR and DF5450HDV-DN/IR (box IR) and SDF5450HD-DN (fisheye) can be ordered now and will be ready for delivery from 19 August 2019 onwards.
Hikvision, global supplier of innovative video surveillance products and solutions, has released a new Thermal Bi-spectrum Deep Learning Turret Camera, which will bring enhanced capabilities of indoor fire detection, including an advanced temperature anomaly alarm and visual warning. This new cost-effective camera (DS-2TD1217/V1 Series) reduces the risks of fire and property loss. Thermal Bi-spectrum DL Turret Hikvision’s Thermal Bi-spectrum Deep Learning Turret Camera supports fire detection using high-quality internal hardware components to capture images using both visible light and infrared light, also called “bi-spectrum” image technology. The bi-spectrum image technology creates a picture-in-picture preview and image fusion The bi-spectrum image technology creates a picture-in-picture preview and image fusion, which can capture what caused the alarm and help personnel to check the situation quickly. It monitors through only one channel, reducing bandwidth and simplifying the live preview procedure of switching channels between thermal and optical channels. Bi-spectrum image fusion technology The bi-spectrum image fusion function also provides more image details under different environmental circumstances, making it easier to find hidden objects and document unusual events. The camera's image processing technology combines multiple image processing techniques to create the best thermal imaging results. It also utilises a ‘noise equivalent temperature difference’ (NETD) of less than 40 mK (this is a measure for how well a thermal imaging detector distinguishes between minute differences in thermal radiation within an image). This means that the lower the temperature difference sensed by the camera, the smaller the value and the better the image. Temperature anomaly alarm This new thermal camera also features a reliable temperature anomaly alarm, which will trigger an alarm once the temperature goes higher than a user-set limit. This setting effectively improves the pre-warning capability before a fire occurs and can alert safety personnel to eliminate hidden dangers before the temperature reaches ignition or combustion. In a practical application, it can help to detect smoking behaviors in the first place, especially for areas that are clearly prohibited from smoking like shopping malls or that are heavily banned like oil depots. Through effective alarms, staff can find and stop the person from smoking in time to reduce environmental pollution or fire damage caused by smoking. Deep Learning algorithm The camera contains a built-in GPU for running the deep learning algorithm for indoor monitoring In addition, the camera contains a built-in GPU for running the deep learning algorithm to effectively help indoor monitoring and detect illegal intrusion. Its intelligent video content analysis technology can help reduce false alarms by filtering out interference factors such as changes in lighting or movement of animals in the field of view. Only actual threats trigger alarms, making security measures vastly more efficient and preventing unwanted entry. Equipped for double-duty – fire detection and intrusion detection – this camera is highly recommended for use in indoor fire detection and intrusion detection solutions, especially in application scenarios such as warehouses, museums, data centers, and banks. Wide viewing angle (up to 90 degrees) along with relatively small and well-designed camera housings make them easy to install and convenient to use.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organisation’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The next wave in IP technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analogue-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analogue audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial intelligence: hype vs. reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organisation’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting with the right partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labour, fair wages and sourcing minerals from countries in armed conflict. Go in with a plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognise the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognising gun threats The technology is centred around a CNN that aims to replicate how a human brain would process informationAegis AI offers such a technology, which the company says enables existing security cameras to automatically recognise gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognise what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Aegis AI. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Aegis AI. “People are in fight-or-flight response and prioritise immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Aegis AI helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximise survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Aegis AI with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Aegis mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Aegis is a software-only solution that plugs into security camera hardware and software, including VMSAegis' solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Aegis. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Aegis is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Aegis’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Aegis can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Aegis is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organisations.” There are no privacy or compliance concerns because Aegis stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analysed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralised management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organisation. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent video analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognise threats, unauthorised access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete security solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analogue video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback. But Brouwers soon learned of the vast capabilities of modern systems. He turned his focus to finding one that went beyond basic video management to offer business intelligence. Identify suspicious customers Brouwers ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic In particular, he was interested in face recognition, which would enable Cosmo Music to identify suspicious customers to prevent shoplifting. Working with integrator Northern Alarm Protection Ltd. (NAP), Brouwers looked at a number of different systems, and ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic. “I was sold on Symphony when I got to actually use it,” said Brouwers. “It floored me how easy it is to work, how straightforward it is. It is so user friendly it is unbelievable.” Brouwers likes several of Symphony’s core features, including: the ability to save video for up to six months (he had been hoping for 90 days) customisation options (for example, recording only when motion is detected) ability to bookmark video the mobile app, which lets users connect to Symphony via a smartphone or tablet to view and playback video, control pan-tilt-zoom (PTZ) cameras, manage I/O devices, receive alarm notifications, and more. Face recognition analytic Before implementing Senstar’s Face Recognition video analytic, when a suspicious customer was identified through video surveillance, Brouwers would screen capture an image, email it to staff, and ask them to keep an eye out for that person. With Senstar’s Face Recognition video analytic, Brouwers can flag suspicious customers in Symphony. When that person enters the store again, Brouwers is automatically notified. One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up" Brouwers tested the analytic thoroughly and was amazed by its capabilities. “One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Mr. Brouwers. “That’s what sold me on it.” Symphony and the Face Recognition analytic, deployed on Senstar’s R-Series network video recorder (NVR) hardware, have been running at Cosmo Music since April 2018 and Brouwers couldn’t be happier. Business intelligence applications “It’s everything I dreamed of and more,” he said. From an integrator perspective, NAP, who had significant VMS experience but never used Symphony, thinks the product is a great option for business intelligence applications. “Symphony is the right fit for any application that requires enhanced security such as analytics. It’s superior to many other systems out there,” said NAP President and CEO Dave Koziel. “From a deliver what is promised standpoint, it’s 12 out of 10 on the scale.” Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment Identify known and unknown individuals Create allow and deny lists, and be alerted when someone on that list is identified Save time and resources with a robust search functionality that lets users look for registered and unknown people in video Search across multiple cameras, and filter search results by match score or date and time Two-factor authentication processes for access control applications
Cherokee Nation Entertainment (CNE) is the gaming and hospitality arm of the Cherokee Nation, operating multiple casinos and hotels across northeast Oklahoma, USA, including the prestigious Hard Rock Hotel & Casino Tulsa. Concerned that their security team was spending an overly large number of person-hours reviewing video recordings searching for a single person of interest, CNE sought to reduce the time it took to review security footage, so their security team could remain focused on proactive tasks, and optimise their day-to-day efficiency. CNE also wanted to obtain and assess accurate data on occupancy and visitor trends for business intelligence purposes. Furthermore, CNE wanted to be alerted to security-related events in real-time, in order to handle security issues as they developed. savVi’s video surveillance solution CNE selected savVi, Agent Vi’s on premise video analytics solution, due to the wide range of video analytics capabilities that savVi offers. Over 1,000 savVi licenses were purchased, allowing cameras at CNE’s ten Oklahoma-based casinos to be enabled with different combinations of real-time event detection, video search and business intelligence capabilities. CNE utilises the video search capability most widely – to enable rapid search through the surveillance video to pinpoint events of interest – and therefore video search capabilities are enabled on the majority of cameras at the sites. Business intelligence capabilities are mostly deployed around the various gaming machines, and at entrance and exit points, to show traffic patterns and real-time people counts. Real-time event detection capabilities are used largely for the high-security areas to ensure that CNE’s security team is informed regarding situations, as they unfold. savVi is deployed through integration with a range of Axis network cameras, primarily the AXIS P3225 and Q3505 fixed cameras, the AXIS P5635, Q6044 and Q6045 PTZ cameras, and for outdoor vehicle search, the AXIS Q3708 fixed camera with three sensors. CNE uses Milestone XProtect Corporate Video Management System (VMS), which is fully and seamlessly integrated with savVi, a Milestone Certified Solution. savVi’s video search capabilities allow for verification of personal injury claims by customers who may be trying to defraud the casino savVi’s real-time event detection savVi’s video search capabilities are of considerable importance to CNE. There is a prevailing need for the casinos to be able to swiftly locate specific events within masses of footage (“incident remediation” as it is known within the entertainment industry). Among other things, this allows for verification of personal injury claims by customers who may be trying to defraud the casino. Previously, the security team’s time was heavily occupied by observing hours of footage in search of a specific person or incident. savVi now enables CNE to run the search automatically, allowing far more effective use of the operators’ time, and reduced search time from as much as 16 hours for a single search, down to a matter of minutes. savVi’s real-time event detection capabilities are primarily used by CNE to ensure a safer and more secure environment within the casino parking facilities. By immediately alerting to any suspicious event, such as people loitering or cars moving in an unauthorised direction, the security team can monitor events and act accordingly as they unfold. savVi’s heat mapping capabilities savVi also allows CNE to gather and analyse essential business intelligence data on occupancy and visitor trends. savVi delivers accurate headcounts, meaning that the security team is constantly aware of how many people are on-site and using the casino facilities. This provides essential knowledge in the case of an emergency where a facility might need to be evacuated, and also helps prevent over-crowding. By utilising savVi’s heat mapping capabilities, CNE has knowledge of which areas of the casino are more heavily populated, and at what times. CNE can then leverage the data collected in a number of ways, including negotiating leasing deals for externally-owned casino equipment and knowing which internal locations require heavier investment of machines and personnel. This puts CNE well ahead of its competitors, as it is one of, if not the, first gaming company to employ Business Intelligence through video analytics. SavVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities" savVi’s video analytics capabilities “It was savVi’s swift and effective video search that caught CNE’s attention when searching for an enhanced security solution, in particular due to the automated query ability,” said Joshua Anderson, Director of Surveillance and Technology, Cherokee Nation Entertainment. “We have been extremely impressed with savVi’s capabilities and the quality of its performance, and fully expect savVi to increase efficiencies and provide true ROI which will have a major impact on the bottom line.” “Cherokee Nation Gaming Commission’s approval of savVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities offer to gaming concerns,” commented AJ Frazer, VP Business Development, Agent Vi. “Having selected to deploy the full range of savVi video analytics functionalities, savVi offers CNE valuable insights into the activities and customer experience at their multiple sites, benefitting both CNE and their customers.”
One of the UK’s largest video surveillance projects in recent years involving the deployment of 845 Wisenet cameras manufactured by Hanwha Techwin, is nearing completion. The video surveillance system, which is designed to play an important role in helping ensure the safe and reliable delivery of public transport across the West Midlands, is being used to monitor activity at over 50 railway stations, 11 bus stations, 3 Midland Metro park and ride sites, as well as the main Number 11 bus route around the City of Birmingham. Live and recorded images from all cameras are being monitored at an advanced control room, located in central Birmingham Wisenet HD IP camera integration The project which is targeted for completion in July 2018 has so far seen approximately 845 Wisenet cameras installed by Total Integrated Solutions Ltd. (TIS) on behalf of Transport for West Midlands which was set up by the West Midlands Combined Authority (WMCA) to co-ordinate investment needed to improve the region’s transport infrastructure. The remaining work includes the deployment of the latest generation of Wisenet high definition IP cameras at a number of car parks, together with significant camera upgrades in Walsall and Solihull, two of four Local Authority public space CCTV systems are already monitored by WMCA. Live and recorded images from all the cameras are being monitored at a £1.2M state-of-the-art control room located in central Birmingham. “Our approach to this very large, complex project was not simply one of agreeing to meet exacting KPI’s from a performance perspective,” said Eamonn Murphy, Coleshill based TIS’s key account manager. “We felt the route to success would be to adopt a more partnership type approach, where we were not only the provider of technical solutions but were also involved at a strategic level in identifying with Transport for West Midlands a pathway of system upgrade, improved efficiency, cost reduction, innovation and utilising latest technology such as video analytics to the best advantage.” TIS is assured seamless integration between Wisenet cameras and Veracity Coldstore ‘direct to storage’ solution Wisenet cameras & Veracity Coldstore solutions Transport for West Midlands evaluated cameras available from 9 different manufacturers. The subsequent decision to source all the cameras from Hanwha Techwin, (previously known as Samsung Techwin), was partly due to the price/performance ratio of its cameras, but there were two other important factors which were taken into consideration. Firstly, Hanwha Techwin has a close working relationship with its technology partner, Veracity. This meant TIS could be assured that there would be seamless integration between Wisenet cameras and the Veracity Coldstore ‘direct to storage’ solution. This negates the need for Network Video Recorders (NVRs) and thereby substantially reduces capital costs, as well as minimising setup and maintenance requirements. Open Platform cameras The Veracity Coldstore recording solution is unique in the linear way that data is written to the hard drives. Only 2 hard drives are spinning at any one time, meaning a significant reduction in power consumption, lower heat generation and greater longevity of the hard drives, reducing the overall cost of ownership. When drive failures do occur, the faulty drive can be swapped with a new drive allowing uninterrupted use. The second important factor was the capability of the Wisenet open platform cameras to accommodate a variety of edge-based analytics such as ANPR and heat mapping, should Transport for West Midlands wish to deploy these at some point in the future. Trials of the Wisenet People Counting application are currently being carried out. This utilises the analytics software developed by Facit Data Systems, another Hanwha Techwin technology partner. Wisenet SNP-6320H cameras are configured for the transmission of 25 images per second (ips) at 1080p resolution Intelligent Day/Night cameras A large percentage of the cameras installed are Wisenet SNP-6320H 2 Megapixel Full HD network PTZ dome cameras. In addition to being a true Day/Night camera which is able to capture high quality images in low light, the SNP-6320H’s powerful 32 x zoom capability enables operators to observe the close-up detail of any activity. Trials were conducted where the cameras were capped at 2 Mbps and configured for the transmission of 25 images per second (ips) at 1080p resolution. The performance at this low bandwidth level was impressive and further contributed to the selection of the Wisenet SNP-6320H, which are also equipped with intelligent auto-tracking capability to ensure a greater level of detail can be captured when no operator is present. Other Wisenet cameras deployed as part of the project include the SNV-6084R vandal-resistant IR dome and the SNB-6004 fixed camera, both of which are able to capture Full HD 2 Megapixel images. Video Surveillance Technology “Working on rail, Metro and bus station sites spread across the wider West Midlands area is a complex and challenging operation and the TIS team deserve recognition for its expertise and diligence,” said Mark Babington, Safety & Security Manager for Transport for West Midlands. Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment" “TIS’s engineers were qualified to the highest degree to support the latest video surveillance technology, as well as being experienced to cope with older legacy systems. Both were needed within the unique environment of a busy integrated transportation network which brings its own exceptional requirements of compliance with bespoke health and safety legislation.” “Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment in the West Midlands transport infrastructure.” Commenting on the success of the project, Bob (H.Y.) Hwang Ph.D., Managing Director, Hanwha Techwin Europe, said: “We greatly value the opportunity to have been involved in this project. It is a excellent example of the benefit of all stakeholders interacting with each other in partnership at an early stage of a project to ensure the most suitable products are specified and subsequently installed to the client’s satisfaction.”
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?