Oosto - Experts & Thought Leaders
White papers from Oosto
The rise of ethical facial recognition
DownloadLatest Oosto news & announcements
Intellicene, the trailblazing pioneer in integrated, intelligent security software platforms, has announced a strategic partnership with Oosto, a provider of Vision AI solutions including facial biometrics. The collaboration supports the integration of Oosto's advanced facial recognition technology within Intellicene's suite of intelligent security software, enhancing Intellicene’s technology offerings to the company’s customer base. Intellicene's Symphia platform Oosto’s AI-driven technology enhances Intellicene’s Symphia platform’s capabilities, providing an additional layer of protection that can effectively identify, track, and alert of any potential security threats in real-time. Organisations place their trust in Oosto's facial recognition technology, which is known for its precision, user-friendliness, and efficacy. Intellicene's Symphia platform is used extensively in critical operations across the world. Organisations place their trust in Oosto's facial recognition technology, which is known for its precision "We're thrilled to align our business with Intellicene, a company that shares our vision for leveraging AI technology to improve security,” said Avi Golan, CEO, Oosto. “By integrating our facial recognition technology into Intellicene's trusted platform, we're able to bring more sophisticated and intuitive watchlist alerting solutions to a wider market." Oosto's facial recognition technology Intellicene has invested heavily in R&D efforts to revolutionise the security industry with its intelligent, data-driven approach and this partnership underscores its commitment to staying at the forefront of technology. By leveraging Oosto's facial recognition technology, as part of Symphia FaceDetect, Intellicene can offer more sophisticated, comprehensive, and reliable security solutions to its clients. "Combining our security management software, Symphia, with Oosto's facial recognition technology not only extends our capabilities but also enables us to offer our customers a truly intelligent security solution that empowers them to receive and use the data needed to mitigate risks," said Alan Stoddard, CEO, Intellicene. "The power of this synergy will ensure our customers are provided with security that is both robust and highly adaptable to their individual needs."
Oosto’s Chief Technology Officer and Chief AI Scientist presented a bold new vision for video analytics leveraging contextual scene understanding and semantic segmentation at this week’s ISC East, the International Security Conference & Exposition, in New York. In their presentation, Oosto laid out how the use of these new technologies can deliver real-time contextual analytics and more accurate alerts based on a more holistic understanding of a scene. Providing limited insights Historically, the AI in video analytics is usually single-threaded and purpose-built to perform a specific function like facial recognition, object detection, or licence plate recognition. This limits an organisation’s ability to have a more complete understanding of a scene from video surveillance. This also means that the metadata is limited to the single use case, disconnected from the other algorithms, and unable to holistically make sense of a scene. Today’s video analytics provide limited insights which can translate to poor and missed alarms" “Video analytics is still in its infancy. Today’s video analytics provide limited insights which can translate to poor and missed alarms,” said Dieter Joecker, Oosto's Chief Technology Officer, adding “Wandering through ISC East and talking to enterprise customers and the partners who serve them, it's clear that the world of physical security needs to move out of the dark ages and help organisations prevent incidents of violence and vandalism, or to minimise the damage immediately after.” Live video surveillance Dieter Joecker said, “Tomorrow, commercial enterprises will harness the power of contextual scene analysis – multithreaded AI – to deliver real-time contextual analytics and precision alerts based on a more holistic understanding of live video surveillance.” He adds, “For example, when someone falls down in a store, this could mean any number of things: Were they actually bending over to tie their shoes? Were they pushed by another person? Was it a staged ‘slip & fall’ to generate a fraudulent claim? Is the person having a legitimate medical emergency? How an organisation responds in real-time is based on the timeliness and quality of the alert.” Semantic scene understanding We can also start to capture more metadata to gain greater context about what’s occurring in real-time" “Leading Vision AI companies are starting to exploit the power of semantic segmentation and edge computing to deliver real-time contextual analytics and alerts to achieve a more holistic understanding of video footage,” said Professor Marios Savvides, Director of Carnegie Mellon University’s CyLab Biometrics Center and Oosto Chief AI Scientist. He adds, “We can also start to capture more metadata to gain greater context about what’s occurring in real-time and ensure that the right types of alerts are sent to the right personnel. Instead of relying on surveillance professionals to monitor video footage 24x7, security teams can use their skills to respond to very precise alerts. It’s not just about adding more algorithms. Leading companies are going to use the power of semantic scene understanding and edge computing to deliver real-time contextual analytics and alerts based on a more granular and complete understanding of a scene.” First responder practitioners The International Security Conference & Exposition, also known as ISC East, is the Northeast’s leading security & public safety event, hosted in collaboration with the premier sponsor Security Industry Association (SIA). The show brings together security dealers, installers, integrators, and consultants, along with corporate, government, and law enforcement/first responder practitioners, to share best practices and technologies designed to keep the communities safe and secure. At the conference, Oosto presented its access control and watchlist alerting solutions based on facial recognition, which are used today by government organisations, airports, casinos, hospitals, and many other entities to improve security and safety in physical spaces. In addition, Oosto’s leadership was invited to speak at the conference and present the future concept of AI-based video analysis.
Oosto announced the latest release of its Vision AI software platform, which includes significant video analytics enhancements for video surveillance hardware and access control systems. The version release is accompanied by the company’s introduction of its proprietary edge device, the new OnPoint touchless reader tablet. This output allows security teams to further reduce organisational risks associated with outdated physical security systems, better manage controlled access, and identify safety threats. Physical security Edge computing in smart video surveillance offers many advantages including improved response times Oosto is harnessing the power of edge computing, facial recognition, and Vision AI to bring physical security into the modern age. Edge computing in smart video surveillance offers many advantages including improved response times, a smaller physical footprint (because fewer servers are required for video processing), improved scalability, and even built-in failover so that if a network failure occurs, edge devices continue operating without pause. Vision AI platform With Oosto’s latest edge enhancement, the Vision AI platform offers a “no-compromise” solution that de-risks video analytics at the edge while maintaining high performance and accuracy. Oosto leverages state-of-the-art Kubernetes technologies to protect its algorithms by containerising the application (vs. running the neural networks directly on edge devices). Performance-wise, Oosto’s neural networks have been optimised to support low-power edge devices while still offering superior performance and recognition accuracy. Based on internal benchmarks, Oosto’s algorithms are seven times more efficient in terms of a watts-per-video stream than the company’s next nearest rival. Video surveillance and access control systems “It was only a matter of time before real-time video surveillance and access control systems would harness the power of the edge,” said Dieter Joecker, Chief Technology Officer, Oosto, adding “With our recent enhancements to our Vision AI platform, Oosto is transferring compute workloads from expensive on-premise servers to the edge but, perhaps more significantly, we’re doing this without sacrificing recognition accuracy, security, and performance in real-world scenarios or expanding the physical footprint of the system.” Real-time alerts The global edge computing market is expected to grow to $155.9 billion (USD) by 2030, with an annual growth rate of 38.9% Many organisations are increasingly moving critical processes from central servers to a variety of edge devices and its adoption is growing across industries, use cases, and geographies. The global edge computing market is expected to grow to $155.9 billion (USD) by 2030, with a compound annual growth rate of 38.9%. This shift enables edge devices such as smart cameras, gates, and access control systems with local decision-making to open gates for authorised employees or send real-time alerts to security teams when a person of interest enters a commercial space. Release features A few of the key enhancements offered in Oosto’s version 2.6 release include: Optimised Neural Networks Oosto’s neural networks have been optimised to operate on a wide variety of edge and near-edge devices. Historically, video images required compute-intensive GPU servers. Currently, Oosto’s neural networks for watchlist alerting can support very large datasets (which are often required for smart cities and other related use cases) and enable image-rich watchlists to be automatically pushed to mobile personnel in the field. OnPoint Reader OnPoint touchless reader eliminates surface contact and incorporates 3D liveness detection to prevent spoofing The new Oosto OnPoint reader is an edge device that can function autonomously and grant/deny access to employees and visitors even during a network failure. OnPoint readers leverage facial biometrics and edge computing to quickly and accurately recognise authorised personnel, even with obscured faces. The OnPoint touchless reader eliminates surface contact and incorporates 3D liveness detection to prevent spoofing (where a visitor uses a picture or video of an authorised employee to circumvent security). Near-Edge Processing Oosto is launching an updated near-edge device (e.g., NVIDIA Jetson) that operates on a much smaller physical footprint and is equipped with Oosto’s state-of-the-art neural network models for video analytics. While the latest version of the Vision AI platform still requires a central server, it can now interoperate with several leading GPU-less mini-servers. Smart Camera Integration Oosto is pioneering the concept of “camera as a sensor” by embedding our state-of-the-art neural networks (SDK) into the latest AI-enabled CCTV cameras. Because image processing and face vectoring happen on the camera, these smart cameras reduce the need for computing requirements on the server side and enable powerful capabilities such as watchlist alerting, frictionless access control, tailgating detection/prevention, and other video analytics capabilities. Genetec VMS Integration Oosto’s latest release also provides Genetec VMS customers with a single pane of glass to view real-time alerts of security threats (i.e., individuals spotted on a company’s watchlist) by accurately identifying persons of interest in real-time, even under adverse conditions (e.g., acute camera angles, people in crowds, less-than-optimal lighting conditions). Oosto’s integration enables surveillance operators with a complete history of all POI detections (video playbacks) within Genetec Omnicast™ VMS to facilitate and expedite investigations. Modernising security By leveraging edge and near-edge technologies, Oosto is helping to revolutionise, modernise and de-risk physical security while dramatically lowering the total cost of ownership for video surveillance and access control systems.
Insights & Opinions from thought leaders at Oosto
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
We must leverage existing technologies like social media monitoring, gunshot and weapons detection, and real-time watchlist alerting. We owe it to our children. The recent news of the Dallas elementary school shooting absolutely gutted me. It’s a tragic and incomprehensible loss of life. A question I hear being asked again and again – could technology have made a difference? From my experience, modern technologies can help schools mitigate some of the damage and provide an early warning to law enforcement so they can mount a faster and more effective response. Early warning technologies The fact is technologies exist – and are in production – that can provide an additional safety net and potentially slow a would-be attacker and at least give law enforcement a few more moments of notice to mount an effective response. Naturally, people will argue for stronger gun controls and better mental health programs Seconds are precious. And they’re being lost because schools often don’t have the requisite early warning technologies to trigger the alarm. Naturally, people will argue for stronger gun controls and better mental health programs. They’re absolutely needed, but schools and law enforcement need real-world tactical solutions that exploit the power of today’s technologies. Real-world tactical solutions Social media monitoring: The shooter apparently made three social media posts, about 30 minutes before the shooting. The FBI and local police can monitor public social media posts in real-time to identify threats and respond quickly. Gunshot detection: Gunshot detection systems use acoustic sensing technology to identify, discriminate, and report gunshots to the police within seconds of the shot being fired. A gunshot detection system usually involves a number of sensors to detect the sound of a gunshot and transmitters to send a message to the police dispatch center. Weapons detection: Weapon detection systems use high-performance object detection algorithms using deep neural networks. These AI algorithms work with your existing video surveillance systems to automatically detect automatic knives, guns, and firearms using deep learning models. Watchlist alerting: Many schools in the U.S. have lists of known security threats. This often includes ex-students, parents, and faculty who were prone to violence in the past and sexual predators who live in the immediate vicinity. Watchlist alerting works with a school’s video surveillance system to identify persons of interest (POI) through both face and attribute recognition in real-time and sends instant alerts instantly when a POI approaches school property. Watchlist alerting solution If someone is not watching that camera at that time - the camera is almost worthless" After a tragic event on one of their campuses, a public-school district in Santa Fe, Texas invested in a watchlist alerting solution, an AI-based face recognition security solution to create a safer environment for the thousands of students, teachers, and staff who populate their schools and facilities. This was in 2019. According to Kip Robins who was then the Director Technology at the Santa FE ISD: “We have almost 700 cameras throughout the district, but if someone is not watching that camera at that time - the camera is almost worthless.” Metal Detectors: Once dismissed as something only needed for schools in areas with a high crime rate, many schools across the U.S. are now considering the use of metal detectors. It should be obvious by now that living in a ‘nice neighbourhood’ is not an insurance policy against school shootings. They can strike any community - large or small, rural or suburban. Use of metal detectors To be clear, there is no single technology that will prevent this type of tragedy. But, let’s act now and at least have the technologies in place to help expedite a better response – while we simultaneously debate the deeper questions about the nature of education, mental health and guns in American society. We owe it to our children. Avi Golan is CEO of Oosto, a Vision AI pioneer enabling organisations to better protect their students, customers and employees by identifying security and safety threats in real-time.
Technology is driving new opportunities in the security industry. Innovation trends include artificial intelligence (AI), edge-based systems, mobile systems, a greater focus on software, and efforts to simplify operation of security systems, even as capabilities become more complex. ISC West 2022 reflected these changing trends. “In addition to emphasising technology innovation, ISC West also reflected an industry that is resilient, dedicated and passionate,” said Mary Beth Shaughnessy, the Event Director of ISC Security Events. ISC West 2022 “Almost 12,000 dealers, installers, integrators, end users and consultants reconnected at ISC West 2022, and there were nearly 20,000 total industry professionals in attendance (including manufacturers),” adds Mary Beth Shaughnessy. The 550 exhibitors and brands on display reflected an industry that has come through the COVID-19 pandemic in better shape than ever, poised for even greater success in the years ahead. Turning video and access control into knowledge Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time Motorola Solutions emphasized several themes that were heard repeatedly throughout the show. “One trend is fulfilling the need to turn video and access control into sources of knowledge, inside the enterprise,” said John Kedzierzski, Motorola Solutions’ Senior Vice President of Video Security and Access Control. Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time, while monitoring access control yields the equivalent of an operating system inside a building. Using the Cloud offers consumer ease-of-use to systems The second trend listed by Motorola Solutions is working to bring the consumer ease-of-use experience into enterprise security solution applications. Professional security systems were previously complicated to buy, install, manage and upgrade. However, using the Cloud, even distributed enterprises can bring consumer ease-of-use to systems, from improving the out-of-box installation experience to boosting the ability to manage the system. Transition to ‘mobile first’ interfaces The third trend emphasised by Motorola Solutions is transition to ‘mobile first’ interfaces, reflecting the need for busy security executives to be on-the-go, but with full access to their systems, without being chained to their desks. Since the last springtime ISC West show in 2019, Motorola Solutions has grown rapidly, both organically and through acquisition of IndigoVision, Pelco, Openpath, Envysion, and Ava Security. Cloud-based Orchestrate system Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code In addition, the company is making it easier to integrate video and access control systems with Motorola’s radio systems, typically carried by security guards. The cloud-based Orchestrate system translates ‘events’ from access control and video, to trigger notifications on a mobile radio. Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code. Simplifying implementation of AI Artificial Intelligence (AI) has traditionally been associated with the use of large servers or even intelligence in the Cloud. Several exhibitors at ISC West helped to change that misconception. For example, Oosto offers a simpler and more economical approach. They supply edge appliances for AI. The purpose-built Vision AI appliance, a small box, puts intelligence at the ‘near edge’, by connecting to up to five cameras. Easy and dependable ‘failover’ ensures redundancy without a big investment, and the system can work with any IP camera, including an end user’s installed base of cameras. Oosto’s TCO (total cost of ownership) calculator Oosto’s TCO (total cost of ownership) calculator spells out how much a customer can save versus using a big server, including lower costs such and power and cooling. AI was probably the biggest buzzword at ISC West, but there was also emphasis on the practical results of applying AI to physical security. Artificial Intelligence (AI) - the biggest buzzword at ISC West I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users" “What surprises me (at the show) is that there is a lot of generic marketing of AI, but we are trying to step back from our analytics and look at applications that serve certain end-users,” said Jeff Corrall, Vice President - Product Management at March Networks, adding “As an industry, we are still at the stage of AI as a buzzword.” Jeff Corrall further said, “I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users. We have to live with the buzzwords, but what we really want is to apply them. That creates a stickiness with the end-user — when high technology is making a difference.” March Networks Labs address specific end-user problems and then apply their systems to provide a solution. Jeff Corrall adds, “A lot of AI is responding to what the customer is asking for, and we are stepping back and making sure the end-user will use it on a consistent basis.” ‘Edge versus cloud’ was a common theme at ISC West Edge versus Cloud ‘Edge versus cloud’ was a common theme at ISC West, pondering where in a system the ‘intelligence’, such as AI and machine learning, as well as other functionality, should reside. Among the companies addressing the quandary was Axis Communications, which focused on the issue using a racing theme at their presentation to the industry press. The winner of the ‘race?’ - The combination of both approaches working together as a team, of course. AXIS Speed Monitor on exhibit One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP Axis Communications also highlighted the deep learning analytics of the ARPEC 8 camera chip (introduced during the COVID-19 pandemic), which will be deployed across their camera line. One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP (Axis Camera Application Platform), the capability to load ‘apps’ onto camera chips at the edge. They also introduced the D4100-E Network strobe siren (a smart edge device), the Audio Manager Pro (a cloud-based software system enabling zoning and callouts for specific areas in a building), the W101 body worn cameras with GPS capabilities, and a Barcode Reader for doorstop applications (another ACAP app). ‘App Store’ approach to expanding applications Azena is at the centre of expanding applications at the edge, promoting new applications through an ‘App Store’ approach that sells software apps that can be loaded onto cameras that are equipped with Azena’s operating system. In the last couple of years, the company (formerly known as Security and Safety Things) has expanded its offerings. There are currently 108 apps in the store from 30 to 40 app developers. There are 14 camera models (from six manufacturers) that are commercially available and run their operating system. The newest camera is a fisheye model from Vivotek. “What we have seen is that a lot of the use cases are pretty unique,” said Fabio Marti, Vice President - Marketing for Azena. Two examples are an application that monitors a flame to ensure it is burning cleanly (no smoke). Another system monitors nets covering fish farms to avoid birds getting tangled up in the nets. Fabio Marti said “A challenge is to find new business avenues for integrators. Everybody is not eager to look beyond their comfort zone.” Focusing on software to ensure user experience Software systems are one of the major focal points for innovation in security systems Software systems are one of the major focal points for innovation in security systems and Verkada is focusing on how software innovation can improve systems. “For decades, innovation was on the hardware front,” said Filip Kaliszan, Verkada’s Founder and Chief Executive Officer (CEO), adding “We saw an opportunity for more innovation on the software side. The customer experience revolves around software.” Ensuring an end-to-end experience “We want to guarantee an end-to-end experience,” adds Filip Kaliszan. As a new company with a ‘hybrid cloud’ approach, Verkada focused on appealing to end users to convince them of the value proposition. Once an end user was convinced, Verkada brought in an integrator partner to deliver the solution. In effect, Verkada finds demand and brings that demand to the integrator. Software-centric operation of a modern building Verkada is broadly focused on ‘software-centric operation of a modern building.’ After starting out in video, Verkada has since expanded into systems for access control, alarm systems, and other categories. They use a combination of third-party hardware and equipment that is custom designed to work seamlessly with their software systems. Verkada’s end goal is to put the various systems together into a platform. They will continue building each product category, which will eventually be unified into ‘the operating system for the building of the future.’
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download