Facial recognition systems
HID, a worldwide pioneer in trusted identity and physical access control solutions, announces the 2024 State of Physical Access Control Report, identifying five key trends that are shaping the future of access control. Produced by IFSEC Global in partnership with HID, the report surveyed over 1,200 security professionals across the globe to paint a picture of an industry that has been going through considerable transformation. Conducted between November 2023 and January 2024, the survey reveals...
Blackline Safety Corp, a pioneer in connected safety technology, has announced that it has secured a $3.9 million contract renewal with one of the largest utility companies in the U.S. Headquartered in the Midwest and serving more than four million customers, the company became a Blackline customer in late 2021. The renewal adds two more years of monitoring by Blackline’s Safety Operations Center (SOC), as well as push-to-talk services for the utility company’s 2,200 G7 devices. The...
Secure Logiq and Ivideon are pleased to announce a strategic partnership aimed at enhancing cooperation and delivering unparalleled video surveillance capabilities. Harnessing the strength of both companies, this partnership merges Secure Logiq’s advanced server technology with Ivideon's comprehensive cloud solutions, creating a hybrid approach that meets the dynamic needs of modern video surveillance. On-premises solutions With over 12 years of experience, Ivideon has emerged as a rapi...
With approximately 3,000 sheriffs covering 70% of the United States, managing resources efficiently is paramount. The integration of security cameras, drones, and body cameras with powerful facial recognition systems enables law enforcement to scan large areas in real-time or retrospectively, identifying suspect appearances and gathering valuable information. Some of these technologies will be showcased at the National Sheriffs' Association Conference in Oklahoma this week. Drones enhanc...
Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to announce the rollout of its Phase 1 Kiosk Program across 28 locations in the U.S. This initiative includes live product demos at participating distributors, designed to offer customers a hands-on experience with the latest Hikvision technologies and equipment. Range of Hikvision products "The Hikvision Kiosk Program is...
Matrix, a pioneer in advanced security and telecom solutions, is thrilled to announce its participation in the upcoming Police Expo 2024. Scheduled for July 4th-5th at Pragati Maidan, New Delhi, this premier event will serve as a platform for Matrix to exhibit its innovative IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions. OWASP ASVS 4.0 L2 standards Revolutionising Security with Advanced Solutions At Police Expo 2024, Matrix will demonstrate its robust security...
News
Pioneering global access solutions provider Salto Systems, part of SALTO WECOSYSTEM, is thrilled to announce the launch of the new Design XS Keypad Wall Reader series. With a sleek design that is ideal for any space, this revolutionary product represents a breakthrough in access control technology. Designed for ease of use for both physical credentials and mobile access, the reader is built to last with a durable keypad. To assist the visually impaired, numbers and symbols are embossed with 5-point braille. Design XS Keypad Wall Reader Design XS Keypad Wall Reader is designed to set new industry norms in smart access control The Design XS Keypad Wall Reader is designed to set new industry standards in smart access control. With multi-factor authentication and the option of PIN code access, this wall reader provides double authentication and enhanced opening modes which significantly increases security. What sets the Design XS European Keypad Wall Reader apart is its seamless integration into any facility. Since it's designed to fit standard electric boxes, installation is seamless. The wall reader, in combination with a Salto BLUEnet access controller, simplifies network infrastructure with the latest advancements in wireless access control technology and connectivity. Cloud access control and mobile applications are supported, providing a streamlined and efficient access management system that controls lifts, sliding doors, perimeter access, and electronic gate doors. New standards for access control Design XS Keypad Wall Reader also offers a wide range of credential options for users "We’re extremely excited to introduce the Design XS European Keypad Wall Reader to the market," said Sheila Alvarez Lancho, UK Marketing Manager at Salto. "This product not only provides advanced security features but also offers a seamless and convenient user experience. We believe it will set new standards for access control applications." The Design XS Keypad Wall Reader also offers a wide range of credential options for users. With seamless mobile and physical credential access, users can tap NFC, RFID cards, key fobs, or Bluetooth LE for quick and convenient entry. This versatility ensures that individuals can choose the access method that best suits them. Long-lasting performance and reliability The Design XS Keypad Wall Reader has been rigorously tested and is compliant with all certifications, ensuring long-lasting performance and reliability. It’s designed to withstand even the harshest of conditions, making it the perfect choice for environmentally exposed locations. With the launch of the Design XS Keypad Wall Reader series, Salto continues to innovate and lead the way in smart access solutions. Salto is committed to providing its customers with top-of-the-line products that offer security and convenience.
Telaeris, Inc., a pioneering provider of handheld solutions for Physical Access Control Systems (PACS), announces its new XPressEntry handheld badge and biometric reader support for all HID Mobile Access® solutions including HID employee badge and Student ID in Apple Wallet. Traditional credentials are easily lost or forgotten creating a variety of physical security risks. In response to these challenges, organisations can now improve physical security and convenience by issuing mobile credentials on smartphones which are always in their users’ possession and are less likely to be lost in workplace and educational settings. Implementations of digital credentials Safety and physical security professionals can rely on Telaeris and XPressEntry to solve XPressEntry is a critical component of the mobile credential revolution and ensuring identity has never been easier and more secure with a digital wallet. Most campus or facility implementations of digital credentials will be incremental, with both legacy badges and new mobile credentials being used and deployed in parallel. Without the ability to visually inspect traditional credentials like before, the need to challenge and communicate with mobile credentials, as well as legacy badges using the identity information on record in the access control, becomes even more important. Safety and physical security professionals can rely on Telaeris and XPressEntry to solve these new and unique opportunities. Credentials in digital wallets In higher education settings, existing mobile campus one-card credentials are similarly being transitioned to credentials in digital wallets. These credentials stored in the digital wallet are utilised at universities and colleges as an integrated ID, payment, and access solution. This means that XPressEntry can be used by guards and administrators to track students for event entry, attendance, emergency accountability and more. Existing mobile campus one-card credentials are similarly being transitioned to credentials in digital wallets "The smartphone will be the home for any credentials in the future; credit cards, government IDs, student IDs, passports, and access control credentials are all moving into the digital wallet, and we are ready," said Dr. David Carta, CEO of Telaeris. "We are thrilled that XPressEntry is among one of the first handheld, mobile readers to work with HID employee badge and Student ID in Apple Wallet. Telaeris is a proud, longtime HID partner and we will continue to innovate and add value to this important relationship." Specific safety and security challenges Telaeris‘ XPressEntry handheld badge and biometric readers enhance access control and security management by providing a flexible, mobile solution that goes beyond traditional door readers and addresses specific safety and security challenges. Handheld Badge Verification: Superior security with handheld authentication to confidently control access to and manage any secured space plus ENTRY/EXIT tracking. Emergency Evacuation Mustering: Ensure everyone is safely accounted for during a true emergency to improve evacuations, employee safety and OSHA/regulatory compliance. Corporate Events & Training: Use existing security badges for access management to manage attendees and deny access when necessary to events and training. Handheld Biometric Verification: Superior security with biometrics and multi-factor authentication to deliver enhanced identity authentication in high-security areas. Workplace Surveys: Pre-screen workers with questions and deny access when necessary to help prevent the spread of illness and to keep the workplace safe. Other Use Cases: Time and Attendance, Confined Space Management, Bus Entry Validation, Guest / Visitor Tracking, Remote Parking, Mobile Enrolment, and more. Solution for access control systems “The Telaeris‘ XPressEntry handheld badge readers with HID credential support including HID Mobile Access and HID employee badge and Student ID in Apple Wallet is a game changer in the handheld verification market”, said Rick Winter, Sr. Manager & Embedded Mobile BDM of Extended Access Technologies at HID. “Real-time personnel image verification and ACS integration provide the customer flexibility and convenience to manage emergency evacuation mustering, corporate events & tracking of training, and on-prem/campus employee/visitor management validation, which enhances the security and safety of their facility.” XPressEntry handheld readers proudly lead the industry with the most access control integrations, proudly lead the industry with the broadest support for badge technologies plus biometrics and facial recognition, and the industry's first handheld solution for access control systems with Android 13 revealing enhanced security and performance.
RecFaces, a provider of advanced facial biometric software, is excited to announce its upcoming India business trip from June 17 to June 28, 2024, for exclusive, face-to-face meetings and is inviting all interested distributors, partners, and end users. Their experts will be available in Mumbai (June 24-25), Bangalore (June 26), Hyderabad (June 27), and Delhi (June 17,18, 28). This strategic trip aims to foster deeper collaborations and offer personalised insights into the revolutionary capabilities of RecFaces’ facial recognition solutions. Engage with RecFaces experts During their business tour, RecFaces' experts Sukrit Varma, Sergey Allenov, and Boris Zaytsev will be available for one-on-one discussions with potential distributors, end users, and partners. These sessions are designed to provide comprehensive insights into emerging facial recognition technologies, live demonstrations, and tailored support. Distributors will learn about the myriad benefits of partnering with RecFaces, including access to cutting-edge technology, enhanced security solutions, and significant business growth opportunities. Security and operational efficiency Additionally, Sukrit Varma, RecFaces representative in India can be reached out to schedule a meeting with the visiting team. Sukrit Varma, Global Marketing Partner, APAC & MENA region at RecFaces said, “India's burgeoning market for facial recognition technology presents significant opportunities. We are committed to delivering personalised support and showcasing how our solutions can enhance security and operational efficiency across various sectors.”
Being the catalysts of growth, smart cities are founded on a technology-powered infrastructure. Digitisation in global economies has led the way to a transformative shift to smart security, universal convenience, and accelerated advancements. By 2026, smart cities will be expected to generate an economic benefit of USD 20 trillion globally. Reliable technological solutions Unfortunately, crimes and offences are also becoming high-tech, challenging the balance in the socio-economic ecosystem. To secure the frontiers of growth, security operations need to be spearheaded by reliable and pervasive technological solutions that also elevate the prospects of unified development. Easy-to-use technologies Facial biometrics offer one-of-a-kind security solutions that cater to the diverse infrastructural requirements In the past decade, facial recognition technology (FRT) has gained momentum, contesting to be one of the most reliable and easy-to-use technologies for modern economies. With a focused trend toward technology and AI advancements, facial biometrics offer one-of-a-kind security solutions that cater to the diverse infrastructural requirements of a smart city. Transport security Public transport is the backbone of a social infrastructure. Smart transport aimed at sustainable and convenient commuting stands out as a benchmark of inclusive growth. Digitisation of transport processes not only ensures optimal utilisation of resources but also solidifies commuters’ trust in the administration. However, security in smart transport continues to be a primary source of stress. Misconduct, theft, security breaches, and the presence of repeated offenders create a sense of insecurity among commuters. This insecurity can only be resolved through a strong security ecosystem that reassures safe and hassle-free travels. Facial recognition system (FRS) Entry and exit access through turnstiles enabled with facial identities allows for smooth and unobstructed access A facial recognition system (FRS) deployed in the video surveillance system at transport terminals to identify blacklisted individuals is effective in avoiding incidents and clashes. Entry and exit access through turnstiles enabled with facial identities allows for smooth and unobstructed access to transportation modes, maintenance of travel accounts, and integration of security with experience. Not only does FRS help prevent security lapses but also extends the capabilities of the on-ground security department to attend to incidents promptly. Cyber security The core of smart cities is the intricate network of cloud-based operational infrastructure, integrated economic functions, and the Internet of Things (IoT). This augments the cruciality of protecting the virtual boundaries and resources to protect the smart infrastructures. As a byproduct of global integration, data intelligence, and networked management, the threats of data leaks, cyber-crimes, and identity thefts are on the rise. Cyber breaches at such a scale do not affect only a single individual but are detrimental to the security of the city’s effects and in turn, the economies at large. Multi-factor authentication Efficient protection of cyber confines can only be executed through reliable and multi-functional solutions While the smart infrastructure can not function without cyber support, efficient protection of cyber confines can only be executed through reliable and multi-functional solutions. Multi-factor authentication enabled through facial recognition allows for verification and re-verification of identity, preventing access breaches. Digital data, guarded by unique facial biometrics powered by liveness detection to differentiate an actual person from a synthetic identity, are protected from leaks, misuse, and identity breaches. Border security With smart solutions redefining physical security, border security comes under the lens of indefectible control. A considerable amount of resources and efforts are allocated to secure border access portals like airports, train terminals, and sea ports. It is important to protect the physical and virtual boundaries of a smart city to ensure the safety of citizens, data protection, economic balance, and preservation of property, resources, and the environment. While the legality procedures and compliances are closely maintained, border management greatly relies on intelligent technologies that lend a hand to speed up compliance procedures. Sense of safety Facial recognition-powered surveillance at border access portals allows for quick background checks Facial recognition-powered surveillance at border access portals allows for quick background checks, verification of legal compliance to enter the premises of a smart city, and whether the individual is subject to cross-border restrictions. It provides a sense of safety to the entrants and helps maintain trust in the otherwise tiring and complex verification formalities. Integrated video management systems Not only this, the video management systems with facial recognition integration elevate the quality of video surveillance and raise alarms for efficient intrusion detection. Additionally, it strengthens the essence of a smart infrastructure by automating the security process and integrating all the border access terminals on one common system - FRS. Estimates suggest that the market size for smart security globally is to grow at a CAGR of 15.1% to reach USD 211 billion by 2033. Investigation and crime control At the foundational level, identification and authentication accuracy are the primary factors In a smart city, Law and order enforcement, extending to crime control, confides in intelligent solutions for investigation and circumvention. At the foundational level, identification and authentication accuracy are the primary factors that determine the monitoring and control of security violations. Legal investigations are increasingly becoming technology-driven, in terms of video monitoring, lie detection, global database integration, and smart alert systems. However, these processes are not entirely automated and depend on manual commands. This leaves the scope of human errors, risking false convictions and response delays. Real-time compliance In a smart city, citizens, software, and crime control are interlinked on an integrated network, making them interdependent. For accurate identification, incident detection, and controlled monitoring, facial recognition can be more beneficial than expected. It allows checking for compliances in real-time, like social curriculum, healthcare precautions, and guarded access to sensitive resources. Persecuted criminals can be accurately identified through facial recognition, facilitating easy access to their criminal records and previous litigations supported by globally integrated databases. Facial recognition - the smart technology Facial recognition is a revolutionary technology exhibiting the unique features of remote and digitised control In a nutshell, security in smart cities is governed by technologically advanced solutions that not only cater to the requirements at present but also impede a stronger foundation of smart infrastructure. Facial recognition is a revolutionary technology exhibiting the unique features of remote and digitised control to execute complex security protocols. The best-in-use applications include access control, video surveillance improvement, and vigorous record verification. AI-based algorithms This technology is powered by advanced algorithms and top-class AI, ensuring accuracy, unbiased decision-making, and solutions that improve with changing times. “The cutting-edge technology of facial recognition perfectly complements the smart city ecosystem. It is quick, error-free, and seamless, enabling unequivocal security of the resources and residents of the smart city,” says Tamara Morozova, Chief Executive Officer, of RecFaces.
Matrix, a pioneer in cutting-edge security and telecom solutions, is excited to announce its participation in the SAFE South Expo 2024, scheduled to be held from July 5th - 6th at the Chennai Trade Centre. This premier event will provide a platform for Matrix to showcase its innovative offerings in IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions. Advanced security solutions At SAFE South Expo 2024, Matrix will demonstrate its robust security portfolio designed to meet the diverse needs of modern enterprises. Ruggedised IP Camera Matrix will showcase its recently released Ruggedised IP Camera, which meets EN50155 standards Matrix will showcase its recently released Ruggedised IP Camera, which meets EN50155 standards, ensuring suitability for demanding settings such as roadways and railways. These cameras deliver top-notch video quality, excellent low-light performance, and flexible monitoring capabilities, including the ability to capture images within fast-moving vehicles. Bullet and Dome Cameras, NVRs Furthermore, Matrix will showcase its Project Series and Professional Series Bullet and Dome Cameras, recognised for their cybersecurity functionalities aligning with OWASP ASVS 4.0 L2 standards and verified by STQC, Delhi. Additionally, the company will display its assortment of Network Video Recorders and Server-grade Enterprise-NVRs equipped with integrated VMS. Access Control and Time-Attendance solutions The Access Control and Time-Attendance solutions provide a unified approach to managing and securing physical access while ensuring accurate time-keeping and workforce management. Matrix will showcase its GDPR-Compliant Access Control and Time-Attendance Solutions. Whatsapp integration, COSEC ARGO FACE200T Matrix will unveil its state-of-the-art facial recognition time-attendance terminal, COSEC ARGO FACE200T One of its major highlights will be its latest feature of Whatsapp integration, providing users with real-time alerts and notifications. Moreover, Matrix will unveil its state-of-the-art facial recognition time-attendance terminal, COSEC ARGO FACE200T, renowned for its exceptional accuracy, swift identification speed, and extensive user capacity. This device provides seamless connectivity options, including PoE and Ethernet. Top-notch telecom solutions Matrix, a veteran in the telecom industry, will also present its latest Telecom Solutions at the expo. Our range of IP-PBX systems, Unified Communication servers, and VoIP gateways are designed to streamline business communication and enhance operational efficiency. As businesses continue to evolve, Matrix’s telecom solutions are engineered to support scalability and provide reliable, robust, and top-notch communication infrastructure. Expanding market presence in Chennai Matrix has been making significant strides in expanding its market presence in Chennai and the surrounding regions. Our commitment to delivering high-quality, reliable, and scalable solutions has earned us a growing customer base in this thriving metropolis. The SAFE South Expo 2024 presents an excellent opportunity for Matrix to engage with industry stakeholders, showcase our comprehensive suite of solutions, and further strengthen our foothold in the Southern Indian market. Meeting organisational needs Kaushal Kadakia, the Marketing Head at Matrix Comsec, is eagerly looking forward to the SAFE South Expo Kaushal Kadakia, the Marketing Head at Matrix Comsec, is eagerly looking forward to the SAFE South Expo. He sees it as an outstanding opportunity to showcase Matrix's innovative security solutions to industry leaders, project managers, and consultants. The aim is to understand their specific needs and demonstrate how Matrix products can effectively meet the requirements of their organisations. SAFE South Expo 2024 Matrix invites all attendees to visit the Matrix booth, 1.111 in Hall 1, at Chennai Trade Centre to experience firsthand the latest innovations in security and telecom solutions. Matrix team of experts will be on hand to provide live demonstrations, answer queries, and discuss how the solutions can be tailored to meet specific business requirements.
Iris ID, the global pioneer in iris recognition technology and research for over 25 years and uClockit, the provider of a cutting-edge cloud-based platform revolutionising HR and administrative management have partnered to humanise the approach that organisations have towards administering workforce management. Iris ID and uClockit realise that a high-quality workforce management user experience and organisational efficiency are not mutually exclusive. Together these two companies will deliver a level of service and customisation that modernises how people are managed and time and attendance solutions are implemented. uClockit software solution The uClockit software solution is a complete human resources and time and attendance tool The uClockit software solution is complete human resources and time and attendance tool. With its intelligent digital assistant concept and adaptable modular approach, uClockit.pt empowers users with a robust suite of tools to streamline time and attendance, manage vacations, schedules, shifts, productivity across cost centres, and more. Together the multimodal iT100 and the uClockit.pt software will help organisations build the solutions they need, reduce payroll and administrative costs, eliminate time fraud with the use of biometrics and create a more informed and productive workforce. This is a win-win scenario for all. Advanced security multimodal iris uClockit.pt software is easily paired with the IrisTime™ Timeclock for the Modern Workforce “This collaboration is based on mutual values of technological resourcefulness and a shared belief in prioritising people above all,” said David Barnabé, founder and CEO, uClockit. “With both teams sharing a rich history of collaboration with major breakthroughs in the early 2000s, and a deep understanding of the importance of user-centric solutions, this partnership thrives on trust in the expertise of the teams and the unparalleled support provided.” The uClockit.pt software is easily paired with the IrisTime™ Timeclock for the Modern Workforce, also known as the iT100. This advanced security multimodal iris and facial recognition device is the only solution on the market that allows ISV (Independent Software Vendors) to use REST API web-based applications to create custom software solutions to meet the specific needs of any organisation. Flexibility of the device Iris ID also offers an Android SDK which allows apps to be developed and installed on the iT100 Iris ID also offers an Android SDK which allows apps to be developed and installed on the iT100. The flexibility of the device was a key selling point to cement the partnership as they continue to grow the IrisTime iT100 App ecosystem. Mohammed Murad, Vice President, Iris ID said, “The team at uClockit understands that time and attendance solutions are not a one size fits all. That’s why the iT100 is the perfect answer to empower companies to build for their future.” Benefits of Iris ID’s iT100 biometric solution The benefits of Iris ID’s iT100 biometric solution are far-reaching, including that the device is suitable for any work environment, is fast, accurate and that identification takes less than a second. The iris face fusion mode is another customisation feature that companies can use to suit their needs. The alliance between uClockit and Iris ID is timely as the global time and attendance software market was valued at $2.7 billion in 2022. The market is projected to reach $8.3 billion by 2032, growing at a CAGR of 12.1% from 2023 to 2032. The integration between uClockit and Iris ID will be shown at the Iris ID booth (#226) at Identity Week Europe, June 11-12 at the RAI Amsterdam Convention Centre.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialogue and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organisation so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organisation. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of the machine and deep learning algorithms to recognise or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the colour of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours Analytics, on the other hand, refers to the process of analysing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behaviour. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognise. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behaviour information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilised. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organisation. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realise that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the colour of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognise something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognise unique, customisable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organisation might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognise that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity. Integrated, interoperable solutions They’d also discover that it’s not just about levers, deadbolts, and other products. Instead, it’s a system of many systems, integrated, interoperable security solutions that cover everything from access control, video surveillance, fire alarms, and communications to server rooms, IT networks, energy efficiency, and more. Partnerships to keep up with changing needs A manufacturer’s support of their customers is how prepared they are to respond with high-quality advice Integral to the future success of the openings solutions industry is how well manufacturers and security experts keep up with the changing threat landscape and their customers’ evolving needs. Part of a manufacturer’s support of their customers is how prepared they are to respond with high-quality advice, service, and innovations that address the questions and concerns that arise. That’s why more developers, designers, and end-users alike are leaning on partnerships with visionary manufacturing companies and systems integrators who proactively keep their ear to the ground and an eye on the future. Caution: curves ahead As we look toward that future here in North America, there will always be forces of change to contend with and the accompanying impact on people’s safety, security, health, and livelihoods that our industry will need to address. The forces range from the incessantly unfolding threat scenarios in our country and the world’s geo-political dynamics to climate change and a host of other shifting factors, including the ways we want to work post-pandemic. Bypassing tailored approach Commoditisation poses risks to customised systems integration, good design, the environment Like many industries, ours has seen a change in the level of commoditisation in recent years. While this may give some customers access to cheaper door products in the short term, it usually means bypassing a tailored and more effective approach to security solutions that better meet risk assessment needs for the long haul. It can also get in the way of fulfilling a customer’s forward-thinking requirements for sustainable and aesthetic building materials. In other words, commoditisation, with its tendency toward “sameness” and dependency on less sustainable, corner-cutting materials and processes, poses risks to customised systems integration, good design, the environment, and potentially security itself. Change for the better Fortunately, change has its upside, especially as it applies to innovation, the counterforce to commoditisation. It’s the primary reason why progressive architects, integrators, and security professionals in North America keep gravitating to manufacturers with the instincts and resources to make bold investments in people, new ideas, and processes that produce advanced, planet-friendly solutions. From our view of the door security industry, sustainability will be a central component of innovation from here on out, where the development of new solutions and products is guided by practices and values that reduce their environmental footprint and increase their positive impact. Sustainably-made solutions Transparency in the form of documentation and third-party certifications to back up sustainability claims Along with being a top-down priority for certain manufacturers, sustainably made solutions and products are in higher demand than ever from the design, building, security, and end-user communities. They want to know about the carbon footprint and health impact of product ingredients, their recyclability, and how responsibly things are being made, packaged, and delivered. And they expect transparency in the form of documentation and third-party certifications to back up sustainability claims. Resilience Along with sustainability, a greater focus on resilience has emerged. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of windstorms and flooding. There will continue to be an expanding need moving forward for FEMA-rated storm shelters, fire- and water-resistive doors, and even blast-resistant openings for certain locations. On the near horizon Facial recognition has long been in use in government and other high-security applications The door security industry is also seeing a fusion of technologies, including newer touchless/contactless opening solutions that incorporate improved biometric access credentials like facial recognition. Facial recognition has long been in use in government and other high-security applications, and we’re starting to see more adoption and willingness to use advanced biometrics devices for door access. Video sensing data and analytics Fortunately, there are new strides regarding the transparency of the algorithms relating to facial recognition. Reassurances about the prevention of bias will help further that adoption. Voice and video will also soon become more prevalent for building and security management by using video sensing data and analytics to inform door security solutions. These developments often stem from the convergence of application engineering and systems integration. Application engineering It also advances the de-commoditisation of security and access control solutions Openings solutions innovators and manufacturers receive vital feedback and insight from both channel partners and customers about the characteristics of a vertical market and/or region. Not only does this partnership require trust and close working relationships, but it yields near and longer-term advantages to all participants. It also advances the de-commoditisation of security and access control solutions. Serving underserved communities Smaller businesses need to manage the security and safety of their personnel and assets just as larger operations do. The challenge has been how to offer the right fit of robust door security solutions that also fit these organisations’ budgets. Historically, they’ve been caught between having to choose an enterprise system that would provide the security they need but comes with a high price tag or settling for mechanical locking doors and a fire alarm system that will at least satisfy a certificate of occupancy requirement. Smart lock system Many small business owners want technology that’s simple to install, even DIY in some cases Many small business owners would like to add a smart lock system to enhance their company’s security which also gives them the flexibility to issue mobile credentials and manage employee and visitor access remotely. Ultimately, they’re looking for a higher level of functionality than what’s available at the low end but something with far less infrastructure and at a lower cost than what’s inherent with higher-end solutions. They also want technology that’s simple to install, even DIY in some cases. Scalable electronic access control Supporting these underserved customers requires developing scaled solutions to match the fewer doors, employees, and amount of space that smaller businesses need. This unique approach to electronic access control is new, but it’s already proving to be successful in helping organisations better manage their time, resources, and security. Training The need for expanded solutions awareness, product knowledge, and installation training is also growing The need for expanded solutions awareness, product knowledge, and installation training is also growing. Retirements and other changes within the locksmithing, systems integration, and facilities management sectors continue to affect how our industry needs to recruit, develop, and retain talent. So do technological advancements in electronic access control and door security hardware overall. Change, innovation, and learning A manufacturer or organisation that can offer comprehensive training led by seasoned professionals will go a long way toward expediting the onboarding of new hires and providing continuing education for experienced professionals at all levels and from all disciplines connected to safety and security. Ultimately, door security experts and companies who embrace change, innovation, and learning will gain the extra edge customers are always looking for to add value to their investments in security.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Corsight AI is proud to announce its involvement in a groundbreaking security project at the 14th Battalion in Osasco, a neighboring city within the metropolitan area of São Paulo. The initiative marks a significant step forward in leveraging advanced technology to enhance public safety. Comprehensive security solution Captain David, a key sponsor and advocate for this initiative, has been instrumental in integrating Segdboa's comprehensive security solution at the battalion. The solution features Corsight AI's cutting-edge Facial Intelligence platform, Digifort's Video Management System (VMS) and License Plate Recognition (LPR), IP Extreme's video analytics for gun detection, smoke detection, fall detection, and fight detection, as well as Dahua's cameras, video walls, and touch screen TVs positioned throughout the battalion. Faster response times "This project is a significant milestone in our efforts to enhance public safety in Osasco and beyond," said Captain David, coordinator of activities at the 14th Battalion. "With the advanced technology provided by Segdboa and Corsight AI, we can respond more quickly and effectively to potential threats." Real-time monitoring Segdboa also installs surveillance poles with cameras in front of critical private and public venues This initiative is part of a Public-Private Partnership (PPP) spearheaded by Segdboa, which donates fully-equipped monitoring rooms to each battalion, outfitted with the latest security technology. These rooms enable real-time monitoring and rapid response to potential threats. Segdboa also installs surveillance poles with cameras in front of critical private and public venues such as shopping centres, condominiums, bridges, and parks. These cameras detect suspects and alert the Military Police forces within the battalion’s jurisdiction, ensuring swift action and increased public safety. Accuracy in public safety "We are proud to support this initiative and bring our cutting-edge technology to the forefront of public safety efforts," said Roberto Rocha, CEO of Segdboa. "Our goal is to create a safer environment for everyone by integrating the best technology available with the dedicated efforts of our police forces. We chose Corsight AI's technology for its proven accuracy in real-world conditions and its unbiased performance across gender and ethnicity." Advanced technology Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city To date, Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city. The project aims to eventually deliver monitoring rooms to each of the 380 battalions of the Military Police of São Paulo state, known as Brazil's powerhouse and often sets the standard for the nation. "We are excited to be part of this innovative project that leverages our Facial Intelligence platform to enhance security and public safety," said Geraldo Sanga, Corsight AI's Brazil Regional Sales Director. "This collaboration demonstrates the power of combining advanced technology with dedicated public service." Efficient law enforcement operations Additionally, Segdboa plans to integrate each battalion's facial recognition database with the national Cortex system from the Ministry of Justice. This national database includes photos of all citizens with legal mandates and records of stolen vehicles, facilitating more efficient law enforcement operations across the state. Corsight AI is committed to supporting this vital initiative and enhancing public safety through innovative facial recognition technology. It looks forward to continuing the collaboration with Segdboa and the Military Police of São Paulo.
In a groundbreaking initiative to bolster security measures, Indian Railways has successfully implemented Herta's state-of-the-art facial recognition solutions across its extensive network of train stations in the Eastern region. This transformative project marks a significant step towards ensuring the safety and well-being of passengers and staff throughout the railway system. The project becomes the largest one in the world in the transport sector. Herta has also been awarded two more regions that will be implemented after the Eastern one. Facial recognition technology The deployment of Herta's cutting-edge facial recognition technology is part of IndianRailways' commitment to embracing advanced solutions for enhancing security. By leveraging Herta's expertise, the railway network aims to create a safer environment for passengers, mitigate potential security threats, and streamline operational efficiency. Key features Key features of Herta's facial recognition solutions implemented at 230 train stations using thousands of video surveillance cameras include: Real-time Identification: Herta's technology provides real-time facial identification capabilities, allowing for swift and accurate recognition of individuals within the train station premises. Enhanced Security: The implementation of facial recognition enhances security by automatically identifying and alerting authorities about the presence of individuals with potential security concerns, contributing to the overall safety of passengers and staff. Efficient Monitoring: Herta's system enables efficient monitoring of the train stations, offering a proactive approach to security management. The technology assists in the quick response to incidents and ensures a rapid resolution of security issues. User-Friendly Interface: The intuitive user interface of Herta's solutions facilitates easy integration with existing security systems, providing a seamless experience for railway personnel responsible for monitoring and managing security. Stringent security requirements Mr. Rahat Jain, IDIS INDIA - MD, expressed his enthusiasm about the successful implementation, stating, "We are delighted to announce the successful integration of Herta's facial recognition solutions at Indian Railways." Startologic, the official partner overseeing the deployment of Herta's facial recognition solutions at Indian Railways, is proud to be part of this transformative project. The successful implementation showcases the capability of Herta's technology to meet the stringent security requirements of one of the world's largest railway networks.
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
The institute encountered significant challenges stemming from the absence of CCTV cameras and a video management system. This jeopardised patient and staff safety, impeded equipment protection, compromised data integrity in research, posed regulatory compliance risks, and heightened liability concerns in the absence of visual records for verification. Further, the client faced a significant challenge in efficiently managing attendance for staff working in multiple shifts. With an extensive workforce, manual tracking became cumbersome, leading to operational inefficiencies. To address this issue, the client sought a solution to streamline attendance management while ensuring accuracy and convenience for employees. Challenges Patient and Staff Safety Concerns: The absence of CCTV cameras hindered staff and patient safety. This also led to delays in assistance or emergencies going unnoticed. Equipment Protection: The absence of a video management system made it difficult to monitor and protect expensive research machinery and medical equipment from damage, theft, or misuse. Data Integrity Concerns: Lack of surveillance compromised the integrity of research data, as there were no visual records of experiments or laboratory procedures. Regulatory Compliance Challenges: The institute faced regulatory compliance hurdles, including data security, patient safety, and privacy standards, risking penalties or sanctions due to inadequate surveillance measures. Liability Risks: The absence of surveillance could increase the hospital's liability in case of accidents or incidents, as there would be no visual records to verify events or actions taken. Lack of Efficient Attendance System: The absence of a streamlined system for attendance management created operational challenges, making it difficult to maintain accurate and up-to-date attendance records. Challenges with Diverse Shifts: Managing a workforce with diverse shift patterns posed specific challenges, requiring a tailored solution to address the complexities associated with varying work schedules. The client also needed help in effectively monitoring the attendance of staff members working in multiple shifts, pioneering to operational inefficiencies. Need for Facial Recognition: The client sought a solution that utilised face recognition as a credential for attendance marking, emphasising the need for a secure and convenient method to track staff attendance. Solution This ensured continuous monitoring of patient and staff activities and adherence to protocols A total of 200 Matrix 5MP Dome Cameras with audio support were strategically installed indoors at the institute, covering patient wards, operation theatres, reception areas, treatment rooms, waiting areas, administrative offices, and laboratories. This ensured continuous monitoring of patient and staff activities and adherence to protocols. Outdoors, 200 Matrix 5MP Bullet Cameras were deployed at entrances, exits, parking lots, outdoor pathways, emergency exits, and long corridors. This enhanced perimeter security, and monitored visitor and vehicle traffic. Centralised video surveillance of all the cameras was achieved with Matrix SATATYA SAMAS - Video Management Software, along with four CAM100 licences for seamless integration and control of all 400 cameras. The institute opted for a USER3 licence which allowed three users to efficiently manage live feeds, review footage, and perform critical tasks from a centralised location. Furthermore, in the realm of time attendance, the absence of an efficient attendance system led to operational challenges, prompting the adoption of a server-based solution with automated reporting capabilities and centralised data storage. Managing a diverse workforce with varying shift patterns was tackled through a tailored workforce management system with scheduling capabilities. Matrix Time-Attendance system was implemented for real-time monitoring and reporting The client faced challenges in monitoring staff attendance, particularly for those in multiple shifts, causing operational inefficiencies. To address this, the Matrix Time-Attendance system was implemented for real-time monitoring and reporting across diverse schedules. A labour-intensive process of manually tracking attendance for varied shifts was streamlined through a comprehensive Attendance Management System, reducing manual efforts and enhancing overall efficiency. Recognising the importance of secure and convenient attendance tracking, the client implemented a Facial Recognition Attendance System with 25 Nos of Matrix COSEC ARGO FACE, integrating biometric technology for enhanced accuracy and security. This fulfilled the client's need for a secure method of attendance marking, successfully addressing specific challenges and optimising overall workforce management. Products offered SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100 (4 Nos.): Licence for Adding 100 Additional Cameras SATATYA SAMAS USER03 (1No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA CIBR50MVL12CWP (200 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIDR50MVL12CWP (200 Nos.): 5MP IR Dome Camera Motorised Varifocal 2.8-12mm Lens With Audio Matrix VMS Dongle: USB Dongle to Run Matrix SATATYA SAMAS COSEC CENTRA PLT1000 (3 Nos.): Platform-based User Licence COSEC CENTRA FR 1000 (3 Nos.): Face Recognition User Licence COSEC CENTRA TAM 1000 (3 Nos.): Time-Attendance User Licence COSEC ARGO FACEE (25 Nos.): Instant Face-based Door Controller Benefits The Cameras with Motorised Varifocal Lens enabled the ability to remotely adjust focal length and zoom, allowing the capture of detailed images over varying distances in the institute. With the help of user-defined roles and rights, administrator, operator, and viewer rights were given which enhanced security, as only designated officials could access the footage. The E-map monitoring feature in SAMAS allowed the users to navigate between various buildings, floors, and cameras, facilitating easy centralised video surveillance throughout the campus premises. Camera Grouping, Page Sequencing, and Window Sequencing in SAMAS made it very easy to manage such a large number of cameras. The Interactive Smart Client in SAMAS allowed for Quick Investigation. Video Footage could be easily bookmarked, and exported as required. Reduced manual efforts with a comprehensive Attendance Management System leveraging advanced software. Enhanced operational efficiency through automated attendance tracking for diverse shift schedules. Streamlined data collection and reporting, improving overall efficiency in attendance management. Improved accuracy, reliability, and security in attendance tracking with Face Recognition based biometric technology.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that Park City School District (PCSD) of Summit County, Utah has deployed its proactive gun detection and intelligent situational awareness solution to mitigate gun-related violence. Park City School District (PCSD) Nestled within the mountains of the year-round resort town, PCSD encompasses four elementary schools, a middle school, a junior high, a high school, and a learning centre. The district educates nearly 5,000 students annually and boasts a graduation rate in the top 1 percent of the nation. Intelligent situational awareness software AI gun detection and intelligent situational awareness software is layered on existing digital security cameras PCSD is highly focused on student safety, collaborating with the Summit County Sheriff's Department and the Park City Police Department to deploy advanced electronic, physical, and procedural security measures. ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras at all eight student-occupied PCSD buildings. ZeroEyes Operations Centre If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local staff and first responders in as fast as 3 to 5 seconds from detection. AI algorithms The platform does not store personal or biometric data or conduct any kind of facial recognition The company's AI algorithms only search for guns, not faces or bodies. Until a gun is identified, the monitoring screens in the ZOC stay blank; the ZeroEyes Operations team does not see a live feed from any cameras. Further, the platform does not store personal or biometric data or conduct any kind of facial recognition. Gun-related violence “We hold a deep commitment to safeguarding our students and staff, and ZeroEyes is a compassionate ally in our mission,” said Michael Tanner, COO of Park City School District. He adds, “By addressing the concerns of gun-related violence while also respecting the need for privacy, this solution allows us to provide a secure yet welcoming campus environment.” Proactive safety measures “Between its collaboration with local law enforcement and the deployment of proactive safety measures throughout its schools, Park City School District has shown that it is on the cutting edge of security,” said Mike Lahiff, CEO, and Co-Founder of ZeroEyes, adding “We are proud to work alongside this dedicated leadership team to protect students and staff against gun-related threats.” Park City School District was introduced to ZeroEyes through the company’s exclusive Utah reselling partner Aegix, a provider of industry-pioneering resources, technology, equipment, and training for first responders.
A prominent participant in the Central African mining industry, this company focuses on the exploration and extraction of copper and cobalt. Boasting a substantial cobalt reserve and expansive copper assets, it is presently undergoing a significant restructuring to establish itself as a prominent global player in mining. Through strategic collaborations with major entities in the sector, both domestically and internationally, the corporation aims to enhance its competitive standing. An impactful project currently under evaluation aims to achieve an annual copper output of 200,000 tons, underscoring its dedication to expansion and prominence in the worldwide mining landscape. Overview Faced with the necessity for an enhanced attendance management system across widely spread mines and a sizable workforce, the client approached Matrix for a solution. The particular challenge involved consolidating attendance management and facilitating rapid attendance marking for approximately 10,000 users across various mines and the central headquarters. Matrix was enlisted to tackle the challenge, with the client specifically desiring a high-speed face-based attendance system Matrix was enlisted to tackle this challenge, with the client specifically desiring a high-speed face-based attendance system as the primary credential for marking attendance. The collaboration was geared towards achieving a seamless and centralised attendance management process across different mine locations. Client challenges Matrix demonstrated a nimble response to the client's urgent requirements, strengthening their attendance management infrastructure. The challenges encompassed the consolidation of attendance management and are outlined below: Requirement for Centralised Employee Attendance Management: Operating across diverse mining locations, the client encountered difficulties in efficiently handling employee attendance. To address the challenges faced by the mining conglomerate, there was a clear need to implement a centralised solution to streamline and enhance attendance management effectively. Need for an Employee Portal: Another challenge faced by the client was the absence of an easy-to-use platform for attendance and leave management, visible to their employees. Swift Identification of Mine Workers and Employees: There was a critical demand for the rapid identification of employees and mine workers, emphasizing the urgent need to expedite attendance processes. Matrix's solution Matrix efficiently addressed these requirements by offering solutions that enhanced its client's attendance management systems. The company implemented its Instant Face-based Time Attendance Management Solution, delivering the following benefits: Centralised Attendance Management for Streamlined Employees: Matrix provided a comprehensive time attendance solution with centralised management capabilities. This allowed the client to have unified control over employee attendance from various mine locations, simplifying the overall management process. Employee Self-Service Portal for Quick Access to Leave and Attendance Management: In addition to the time-attendance solution, Matrix introduced its employee self-service portal, offering employees convenient ways to update leave information and facilitating smoother leave approval processes. Instant Face Recognition for Seamless Employee Identification: Matrix deployed COSEC ARGO FACE for rapid face recognition. With a recognition speed of less than 0.5 seconds, this device enabled the client to achieve high-speed face-based attendance. This accelerated the attendance marking process across all mine locations. The integration of Matrix's face-based Attendance Solution, along with an instant face recognition door controller, significantly enhanced the client's attendance operations, leading to heightened operational efficiency throughout the organisation. Application scenario Results Instant Face-based Time Attendance Management Solution Employee Self-Service Portal facilitated seamless leave and attendance management for employees Matrix adeptly tackled the intricate challenges faced by this Central African mining entity, elevating attendance management and employee engagement. By implementing the Instant Face-based Time Attendance Management Solution, Matrix not only centralised attendance management across diverse mine locations but also introduced an Employee Self-Service Portal. This portal facilitated seamless leave and attendance management for employees, promoting transparency and efficiency. Operational efficiency The integration of COSEC ARGO FACE ensured rapid face recognition, reducing identification time to less than 0.5 seconds. The holistic solution significantly enhanced operational efficiency, providing the mining company with streamlined attendance processes, improved employee interaction, and heightened overall organisational effectiveness.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Security systems are often seen as an investment, but usually not one that pays dividends. However, newer technologies are enabling end users to extend their efforts to cost-justify a security system beyond the mirage of “measuring what didn’t happen.” Nowadays, security systems provide quantifiable benefits that yield a return on customers’ investments. We asked this week’s Expert Panel Roundtable: How can security systems maximize return on investment (ROI)?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![Best practices for asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1699974817.png)
Best practices for asset management
Download![AI in security solution](https://www.sourcesecurity.com/img/white-papers/612/920x533_1697466392.png)
AI in security solution
Download![The rise of ethical facial recognition](https://www.sourcesecurity.com/img/white-papers/612/ethics-facial-recognition-920.jpg)
The rise of ethical facial recognition
Download![Protecting critical infrastructure through facial recognition](https://www.sourcesecurity.com/img/white-papers/612/safrrrrr.gif)
Protecting critical infrastructure through facial recognition
Download![Six things to look for when adding AI cameras to your operation](https://www.sourcesecurity.com/img/white-papers/612/hanwha-pic.jpg)
Six things to look for when adding AI cameras to your operation
Download![The security behind financial security](https://www.sourcesecurity.com/img/white-papers/612/shutterstock-269312057.jpg)
The security behind financial security
Download![How to overcome the storage challenges of adopting surveillance AI](https://www.sourcesecurity.com/img/white-papers/612/seagate-landing-page.jpg)
How to overcome the storage challenges of adopting surveillance AI
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)