Retail security applications - Security beat

New security technologies driving excitement on busy ISC West Day One

ISC West in Las Vegas kicked off Wednesday with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of “the security industry.” Qognify QBlock and Cloudscann “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the...

London terror attack: Are other high-profile sites at risk?

The attack on Parliament in London is another reminder that a facility's security is only as strong as its weakest point. In this case, it was a frequently used gate in New Palace Yard that was left unlocked. Known as Carriage Gates, the entrance is generally monitored by police officers. Could the weakness have led to the attack? Could the attack have been prevented (or minimised) if the gate had been bolted shut? Planned ‘complete security overhaul’ Finger pointing in the wake of...

ARA’s asymmetric sensor approach adds focus to perimeter security

Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control centre. Instead, asymmetr...

CodeLynx adapts Microsoft HoloLens headset for security systems on the go

“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a s...

IronYun: How AI simplifies video search and lowers storage costs

Artificial intelligence and deep learning are poised to transform how video images are used and managed. In today’s surveillance systems, video from more and more cameras leave operators at risk of drowning in data, requiring hours of manual effort to track assets or persons of interest. They need more intelligent systems. Among the new tools is use of neural networks to create video analytics systems that are trained, not programmed. In effect, the systems have the ability to “lear...

NVIDIA Jetson TX2 GPU: Greater intelligence and computing power at the edge

Several of the hot trends in the physical security industry – robots, drones, video analytics – have one thing in common: The need for greater intelligence. More complex physical security systems that incorporate artificial intelligence, deep learning, speech recognition and other sophisticated functions depend on a higher-than-ever level of computing power inside embedded devices at the edge. Graphics processing unit Graphics processing unit (GPU) manufacturer NVIDIA is empowering...

Gunshot localisation solution ShotPoint triggers VMS in case of active shooters

A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. “For responders, the police department doesn’t have to manage cameras, but has the instant availability of a camera feed,” says Kathleen Grigg...

Milestone pledges to 'Make the World See' at upbeat MIPS 2017

Are the glory days of IP video behind us? Not by a long shot, if you listen to the upbeat message at ‘Milestone Community Days’ in San Antonio this month. Pledging to ‘Make the World See,’ the community of technology partners, distributors, integrators and customers joined in a celebration of past successes, with an emphasis on future possibilities, at the yearly gathering hosted by the video management system (VMS) vendor. Milestone software integrations "The industry...

Physical, cyber and network security enable Recovery Point’s business continuity services

What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large,...

Veracity expands scope with acquisition of software provider icomply

Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly, according to the company. Known for its COLDSTORE surveillance storage system and other video products, Veracity is expanding its scope with the acquisition of I-Comply Ltd. (icomply), a provider of command-and-control software whose UK customer base includes universities, hospitals, cities and power and...

CES 2017: Will consumer electronics transform the physical security industry?

Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to perform. We have heard the Internet of Things (IoT) buzzword in our market, and it is also a major force in the changing consumer electronics arena. Because consumer electronics are increasingly tied in with security, many in our industry keep a close eye on developments at the huge Consumer Electronics Show...

Could Amazon Go eliminate shoplifters? Customers ‘Just walk out’

Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving shoplifting Most of...

“Anti-surveillance clothing” creates a new wrinkle in facial detection

The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly common facial recognition technology It’s a...

Investigatory Powers Bill seeks to balance UK privacy and security

If you want more security, you have to give up some privacy. The familiar trade-off will be tested to new extremes in the United Kingdom in 2017 when the recently ratified Investigatory Powers Bill, a.k.a., the “Snooper’s Charter,” takes effect. Based on the levels of high-tech government surveillance of UK citizens ushered in by the bill, Britons should be very secure indeed. Britain’s new law is the latest reflection of the struggle to balance intelligence agencies&rs...

Bosch-Sony partnership amounts to a new variation on M&A

Long-predicted consolidation in the video surveillance market seems to have slowed somewhat lately – no big mergers or acquisitions have been announced. However, the announced “partnership” between industry giants Bosch and Sony this week presents a new variation on the theme. No companies changed hands, but the result is one fewer player selling video equipment into the market. In the latest deal, Bosch will handle the sales and marketing globally for all of Sony’s vide...

Panoramic cameras are everywhere, but it started with Arecont Vision

Arecont Vision created the category of multi-sensor panoramic cameras back in 2006. Now the market is taking off, and many manufacturers now offer panoramic cameras. I recently spoke with Jeff Whitney, Arecont Vision’s Director of Marketing, on the current market for panoramic cameras, and also about some other hot topics – from cybersecurity to making the installer’s job easier. SourceSecurity.com: Where do you see the category of multi-sensor panoramic cameras going from he...

Legacy of cybersecurity apathy plays into Mirai botnet attack

A big cyberattack on Friday impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cyber security attacks later in the day were more global in nature. But Oct. 21, 2016, will also be remembered as the day our physical security industry’s legacy of apathy toward cybersecurity came back to haunt us. Denial of service attack The cyberattack last week was carried out by a botnet, a network of bots, which are software applications (in...

Percepto demonstrates future of perimeter protection with autonomous drones

The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow d...

Rapid growth of data attracts Hitachi to the video storage market

The amount of data generated by today’s video systems – whether resulting from increasing camera counts and/or higher resolutions such as 4K – is presenting new challenges when it comes to storing the data and making it instantly accessible to end users. The surge in data is opening the way in our market for new, more sophisticated IT systems to manage and store the data. In fact, the sheer volume of video data and increasing application demands make some legacy approaches obso...

Mobile credentials are a hot topic at ASIS 2016

No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth of mobile credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of comp...

Video surveillance as evidence: Does human bias undermine reliability?

The power of video as evidence in a court of law is often seen as a function of specific variables: How clear is the video? What exactly does it show? Can it be authenticated? Possibly lost in the discussion is the fact that the value of video as evidence is decided almost completely by people, specifically by a small group of people; that is, the jury. Is there a gap between what the video “shows” and what people “see?” Are there psychological or even physiological vari...

IFSEC day 2: Integration and total security solutions stand out

Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasi...

Uncertainty over Brexit’s security implications spills into IFSEC 2016

Amid all the discussion of security integration and end-to-end solutions on the first day of IFSEC 2016 was an undercurrent of uncertainty. The international trade show opened at ExCel London just days before the historic "Brexit" vote, when Britons will decide whether to remain a part of the European union or to exit the politico-economic fusion of 28 member states. With the Brexit referendum this week, the polls are neck-and-neck, so the vote could go either way, hence the uncertainty. If "le...

Security industry challenges: From security education to meeting customer expectations

There are many challenges currently facing the security marketplace, and I asked several industry players recently to reflect on those challenges. Their comments highlight familiar subjects to us all: The need for education. The challenge to meet customer expectations. The dilemma of combining old technologies with new ones. Security education and training Education is a big issue, especially as it relates to the transition to IP systems. “I think there are a number of integrators who...

What is an open system? Interoperability rises as a security trend, but lacks an exact definition

Recently at a conference, one of my media colleagues asked an interesting, and basic, question: What exactly is an open system? Many of us think we know what an open system is, but the ensuing discussion provided several different answers, many of them centred on what an open system is NOT (rather than what it is). An open system does not limit a customer’s options. An open system provides maximum flexibility as a system evolves over time. In other words, an open system doesn’t lo...

New access control technologies offer flexible locking solutions for enterprise security

End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15...

AMAG focuses on "operationalising" security technology and good customer outcomes to re-invent themselves beyond access control

It seems every company is seeking to re-invent itself in our changing market. A case in point is AMAG, which has long been associated with access control. Today, AMAG’s proposition to the market is much broader than that, now also encompassing Symmetry CONNECT, a policy-based platform providing safety, security and risk management capabilities enabling organisations to manage their enterprise security functions. This spring, AMAG is introducing Symmetry GUEST, a new identity management sys...

ISC West 2016: Ivideon cloud video system and subscription paves way for recurring revenue for distributors and integrators

Cloud-based video systems have been slow to take off, but a new offering being introduced at ISC West seeks to give the concept new life. Unveiling the new system is Ivideon, a provider of hosted Cloud-based video, which is joining forces with Global Innovations, manufacturer of the Oco line of smart cameras. New Oco Pro cameras are pre-configured to interface easily with the Ivideon Cloud system, and distributors and integrators who sell the cameras make money both on the camera and installat...

ISC West 2016 to centre around big data, IoT, social media, and integration

ISC West is on the immediate horizon, and I asked several industry players what they expect new and different at the industry’s big show. The answers included buzz-worthy topics from Big Data to the Internet of Things, but also mention of a perennial industry theme – integration. Video embracing social media? Tom Chamard, Executive Vice President of Sales, Salient Systems, expects social media to emerge as a larger topic of interest at ISC West, especially considering how social...

Security control rooms embrace the sit-stand workstation trend to improve operators’ working conditions & health

It’s common knowledge today that sitting all day is bad for your health. Researchers have found that the negative impact of excessive sitting can even outweigh the benefit we get from exercise. Many of us have seen the long list of negative health effects of sitting at work. But what about all those security control room operators, perpetually vigilant, and perpetually tied to their stations? New sit-stand workstations are providing a solution, and the new stations are more popular than...

Quick poll
What's the primary benefit of integrating access control with video surveillance?