License plate recognition
Traffic monitoring systems are the silent sentinels of the roads, ensuring the safety and efficiency of the transportation networks. However, environmental challenges such as fog, heavy rain, dust storms, and even glare from the sun can hinder their effectiveness. Although standalone radar technology can operate in these environmental challenges, it lacks the ability to provide the detailed visual context which is so important for comprehensive traffic management. In this blog, they explore a...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced a new partnership with Access Technology & Integration (AT&I) Systems, an end-to-end systems integrator, to protect U.S. schools and other organisations against gun-related threats. AT&I leverages cloud and AI technology to provide security solutions that grow with an organisation, including access control, gate entr...
Pioneering global access solutions provider Salto Systems, part of SALTO WECOSYSTEM, is thrilled to announce the launch of the new Design XS Keypad Wall Reader series. With a sleek design that is ideal for any space, this revolutionary product represents a breakthrough in access control technology. Designed for ease of use for both physical credentials and mobile access, the reader is built to last with a durable keypad. To assist the visually impaired, numbers and symbols are embossed with 5-p...
Robotic Assistance Devices, Inc., a subsidiary of Artificial Intelligence Technology Solutions, Inc., is thrilled to announce the successful deployment of 4 RAD RIO™ (ROSA Independent Observatory) solar-powered mobile surveillance units (MSU) during the 2024 CMA Fest in Nashville, Tennessee. The CMA Fest, one of the most significant country music events in the world, saw tens of thousands of fans flock to Nashville for an unforgettable weekend of music and e...
Genetec Inc., a major technology provider of unified security, public safety, operations, and business intelligence solutions announced AutoVu™ Plate Finder, a new feature that enables parking operators and law enforcement professionals to quickly identify and validate licence plate numbers directly from their Apple or Android mobile devices. AutoVu Plate Finder AutoVu Plate Finder increases efficiency by reducing the time spent manually checking difficult-to-read or obstructed licence p...
Financial landscape is growing expeditiously, offering new opportunities of economic and commercial growth. And experts suggest that facial recognition can be uniquely profiting to lever and protect this growth. RecFaces, an international facial recognition software vendor, is excited to announce their upcoming webinar focusing on the transformative role of Facial Recognition Systems in the Banking Sector. The webinar, titled ‘Facial Recognition In Banks: A Win-Win Game To Improve Securi...
News
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, will proudly unveil its Solar Solutions lineup at a May 23 webinar, showcasing this unprecedented solution to security challenges in standalone sites and hard to reach remote locations. Attendees will receive a 50% discount on the 4 MP Kit DS-2XS2T47G1-LDH/4G/C18S40 when purchased within 30 days of the webinar. Solar Kits with ColorVu technology “From highly affordable 4 MP Solar Kits with ColorVu technology to options with 8 MP resolution and features like Licence Plate Recognition, Hikvision is bringing unmatched technology to remote and hard-to-reach locations, everywhere from rural farms to urban parking lots,” said John Xiao, Vice President of Marketing, Hikvision USA. Unlike rival products, Hikvision offers a complete system, ready to deploy, with all parts included “In an era where sustainability meets innovation, Hikvision is driving the charge, with competitive technology that is easy to deploy and ready to solve end-user challenges.” Unlike competitor products, Hikvision offers a complete system, ready to deploy, with all components included. It is easy to select the best model and install it, and the entire system has been tested for safety and reliability. Six models with a broad feature Hikvision’s Solar Solutions include six models with broad feature sets for various applications: The 4 MP ColorVu Solar-Powered Security System features 24/7 full-color with ColorVu technology, human detection, and two-way audio for real-time deterrence. The 4 MP Motorised Varifocal Bullet Solar Kit is available in two models: the DS-2XS6A47G1-IZS/C36S80 2.8-12 mm (focal length/FOV) and 8-32 mm. Both feature an 80-watt solar panel and 360 WH chargeable lithium battery. Other technology includes WDR, deep-learning human and vehicle target classification, smart battery management, and a high-capacity 1TB built-in SSD. The 4 MP ANPR Licence Plate Recognition (LPR) Bullet Camera Solar System is available in two versions: 2.8-12 mm focal length/FOV and 8-32 mm. Each one boasts all the features of the motorised varifocal model above delivering valuable licence plate recognition and road traffic controls where wired network and electric supply lines are impractical or otherwise impossible. The 8 MP ColorVu Fixed Bullet Solar-Powered Camera System has 24/7 colourful video with ColorVu, WDR technology, deep-learning human and vehicle target classification, and smart battery management. It boasts a larger 80-watt solar panel and 360 WH chargeable lithium battery. By harnessing the power of the sun, Hikvision empowers businesses to improve ROI, eliminate power cords, and bid farewell to internet cables. The Solar-Powered Camera Kits deliver full-colour video security, anytime, anywhere, without the need for a traditional power supply or internet connection.
Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, is pleased to announce its plans for the Passenger Terminal Expo 2024, taking place in Messe Frankfurt, Germany from April 16 – 18, 2024. Airport portfolio The company will be present at stand #D220, demonstrating its full airport portfolio designed to reduce security risk, improve planning, and automate airport operations. Representatives will be on hand to discuss the latest Genetec innovations that are helping airports such as Istanbul and Tampa International to enhance every aspect of the airport experience. "Passenger Terminal Expo serves as an excellent platform for Genetec to connect with the industry and to showcase our latest solutions, proven to enhance public safety and streamline operations,” comments David Lenot, Critical Infrastructure Practice Lead at Genetec.
DigiCert, Inc., a pioneering global provider of digital trust, announced accelerated adoption of its Digital Trust solutions as the company closed a record total of new bookings in Q4 of its fiscal year as well as a record number of patents filed. Product innovation and key partnerships, coupled with the increasing demand for Digital Trust, were behind the strong customer demand. As the need for Digital Trust continues to rise – from quantum computing and connected devices to content provenance – DigiCert has accelerated its market position, driven record bookings, bolstered its executive bench, expanded innovation, introduced new products to market, and earned respected industry recognition. Consequences of innovation “While we experienced a lot of great momentum in fiscal 2024, we are even more excited about the opportunities we see for Digital Trust over the next 24 months as more and more organisations endeavour to become quantum ready, coupled with the growing need for trusted devices and content authenticity,” said Amit Sinha, CEO of DigiCert. “What we’re seeing is a crescendo of trust issues brought by the unintended consequences of innovation, and as a long-established provider of the foundation on which trust is built, DigiCert is well positioned to address these issues.” Key business highlights for FY2024 Closed largest bookings quarter in company history in Q4 Appointed Jugnu Bhatia as CFO and Dave Packer as CRO Published inaugural ESG report Signed new strategic partnerships with Oracle Cloud Infrastructure, TD Synnex, and Deutsche Telekom Hosted first annual Digital Trust Summit in Vegas, where 300+ attendees convened to hear presentations from Oracle, Microsoft, Amazon Devices & Services, Zscaler, RSA Conference, and B. Braun, in addition to DigiCert’s executive leadership team Earned a Net Promoter Score of 76 Published 2024 State of Digital Trust Report and commissioned study on Preparing for a Safe Post Quantum Future Products and innovation Operationalized innovation and filed 32 patents, the most in the company’s history, bringing the total number of patents to 113 issued and 55 pending Launched DigiCert® Trust Lifecycle Manager, which includes Discovery, Management, and Automation, breaking down silos of managing trust across enterprise and brings public & private trust together in a way that hasn’t been done before Expanded the offering in DigiCert® Software Trust Manager to combine continuous code scanning with policy enforcement and monitoring necessary to secure software supply chains Introduced DigiCert Labs that included a free PQC Playground to allow the industry to test NIST-recommended quantum-safe algorithms Launched CertCentral® Europe to support customer requirements for data residency Introduced DigiCert® KeyLocker, cloud-based secure delivery and storage of private code signing keys to comply with the new requirements issued by the CAB Forum Expanded pioneering authoritative DNS network to include an additional point of presence (POP) in Atlanta, enhancing performance for customers in that region Executed various CertCentral enhancements, including webhooks to better support automated workflows, and hosting for Verified Mark Certificates and logo files to speed deployment and VMC renewals Expanded DigiCert® Trust Lifecycle Manager support for third-party certificate authorities: Microsoft CA and AWS Private CA Industry and standards leadership Established the first unaffiliated root of trust for the U.S. EV (electric vehicle) infrastructure initiative (Plug & Charge) and ISO 15118-2 standard Eclipsed one billion televisions with CI Plus certificates in Europe Surpassed 180 billion DNS queries in a single day Completed EU Qualified audits and received certifications for CertCentral and the DigiCert ONE platform Accomplished first-ever DNSTrust SOC2 Audit successfully Successfully conducted 31+ compliance audits, pioneering the industry and showcasing commitment to global security and trust standards Garnered industry recognition including 2023 CRN Channel Chiefs, Top 100 Women in Security, and 2023 Globee Cybersecurity Award.
IDEMIA Public Security, the premium provider of convenient and trusted biometric-based solutions, announced it has been recognised as a Microsoft Entra Verified ID partner for remote onboarding. This new collaboration will extend Microsoft Entra Verified ID’s capabilities to help both organisations and employees benefit from a seamless onboarding experience using IDEMIA’s liveness & document verification technology. This strategic collaboration expands the relationship between IDEMIA and Microsoft. Identity proofing process The identity proofing process is completed using biometric liveness and document capture The identity proofing process is completed using biometric liveness and document capture via the users’ smartphones. The result is a trusted user identity that gives organisations the assurance they need to proceed with employee onboarding. This allows users to proof their identity once, then use the credential created from that proofing process and stored in the Microsoft Authenticator app to authenticate themselves in multiple other contexts, including employee, customer, and partner onboarding, secure access to high-value data and systems, and self-service account enrollment and recovery. IDEMIA and Microsoft partnership Ea Chaillioux, the Vice President (VP) of Strategic Alliances, IDEMIA Public Security, said “We’re proud and excited to strengthen and expand our collaboration with Microsoft, which will bring together IDEMIA’s advanced identity solutions and longstanding industry expertise with Microsoft’s Entra Verified ID capability.” Ea Chaillioux adds, “This will ensure both organisations and employees have access to trusted user identities. This collaboration enables users to authenticate themselves easily, accessibly, and securely and with a fully digital experience during the remote onboarding process and when they want to access systems & services.” Entra Verified ID’s Face Check Ankur Patel, Head of Product Entra Verified ID, Microsoft, said “Entra Verified ID’s Face Check compares a user’s real-time facial image against a signed and trusted image embedded into a digital credential held by the user based on their government issued ID (e.g. Driver’s license) or credentials issued by an employer.” Ankur Patel adds, “We are pleased to partner with IDEMIA as one of the leading identity verification providers, so organisations can ensure only the correct person has access to apps and devices.”
Robotic Assistance Devices (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc. announced a significant addition to its suite of AI analytics. This innovation equips RAD’s robotic security solutions with the capability to detect the rampant threat of hook-and-chain ATM attacks plaguing the banking industry. Hook and Chain attack A Hook and Chain attack involves attaching one end of a chain or cable to an ATM and using a vehicle to exert force on the machine, usually by pulling the chain with the vehicle, to forcefully open the ATM’s safe doors, and allow thieves to access the cash inside. With this development, RAD continues to lead the charge in providing cutting-edge security solutions tailored to meet the evolving challenges faced by financial institutions and other enterprise clients. AI analytics Steve Reinharz, CEO/CTO of AITX and RAD commented, “This important addition to our growing suite of AI analytics is just another example of how RAD is listening, and responding, to the needs of our clients and prospects." "Since the very beginning, RAD has been in the business of saving clients’ money through innovative AI-powered solutions. This new analytic is the embodiment of that mission.” Increased ATM crimes According to a report by ATM Marketplace, the FBI reported 254 thefts in 2021, up from 229 in 2020 According to a report by ATM Marketplace, the FBI reported 254 thefts in 2021, up from 229 in 2020 and 31 in 2019. Hook and chain attacks were the pioneering ATM crime, in which thieves steal cash from an ATM and cause extensive property damage, sometimes with loss and damages approaching $500K per incident. Mark Folmer, CPP, PSP, FSyI, President of RAD, added, “The Hook & Chain analytic was requested during discussions with a pioneering national bank with over 1000 branches. It’s foreseeable that soon a large number of these locations will implement a ROSA or RIO to provide that extra layer of defence, security, and safety.” Reputational and financial impacts ATM attacks result not only in direct financial losses from stolen cash and property damage but also in significant reputational and financial impacts for banking institutions. The public perception of a bank’s security and trustworthiness can be severely damaged in the aftermath of such attacks, causing a loss of customer confidence and potential erosion of market share. Moreover, the costs associated with investigating and resolving these incidents, including legal fees, regulatory fines, and public relations efforts to restore trust, can further strain financial resources. ATM attack detection analytics Troy McCanna, RAD’s Senior Vice President of Revenue Operations, expressed optimism, stating, “This new analytic has the potential to propel RAD further into the banking and finance market segments." "We currently have highly satisfied banking clients who are eager to implement ATM attack detection analytics. Additionally, our sales pipeline includes several significant banking opportunities, and this enhancement should help move them closer to completion.”
North American Video (NAV), the security integrator with more casino security system installations and gaming partners across the U.S. than any other systems integration firm, is thrilled to announce its continued support of the World Game Protection Conference (WGPC) 2024 as the exclusive Surveillance Technical Integration Sponsor. The WGPC 2024, taking place February 28-29 at the Tropicana Las Vegas, marks NAV's fourth consecutive year holding the prestigious title. Sponsorship of WGPC 2024 "We view our longstanding sponsorship of the WGPC as an investment in the industry itself and all the people that work tirelessly behind the scenes to ensure a fair and safe gaming environment,” said Laurie Smock, Vice President, NAV. Laurie Smock adds, “We look forward to engaging with these industry professionals firsthand to learn more about their most pressing security needs and how we can tailor our cutting-edge solutions to address these evolving challenges.” Innovative integration solutions BriefCam is a recognised pioneer in video analytics with software solutions that provide valuable insights Having served the gaming market for twenty-nine years, NAV continues to drive the migration from reactive to proactive integrated systems solutions with partners like BriefCam®, who will be featured in NAV’s WGPC booth T2. BriefCam is a recognised pioneer in video analytics with software solutions that provide valuable insights for accelerating investigations, increasing situational awareness, and enhancing operational intelligence. Show attendees will have the opportunity to meet NAV’s team of professionals to discuss new and innovative integration solutions that proactively address emerging threats to gaming facilities. Surveillance and security technology NAV’s primary focus is designing, selling, installing, and servicing enterprise-class video management and security systems that are tailored specifically for casino surveillance applications. NAV holds gaming licences in multiple geographical and tribal jurisdictions in order to support their long-term tribal and corporate gaming customers who rely on NAV to meet their surveillance and security technology needs. NAV’s technology expertise spans IP video management, AI, access control, networking, point-of-sale, facial recognition, licence plate recognition, intrusion detection, emergency call, intercom, and visitor management solutions, all coupled with a premier reputation for outstanding customer service.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Case studies
Corsight AI is proud to announce its involvement in a groundbreaking security project at the 14th Battalion in Osasco, a neighboring city within the metropolitan area of São Paulo. The initiative marks a significant step forward in leveraging advanced technology to enhance public safety. Comprehensive security solution Captain David, a key sponsor and advocate for this initiative, has been instrumental in integrating Segdboa's comprehensive security solution at the battalion. The solution features Corsight AI's cutting-edge Facial Intelligence platform, Digifort's Video Management System (VMS) and License Plate Recognition (LPR), IP Extreme's video analytics for gun detection, smoke detection, fall detection, and fight detection, as well as Dahua's cameras, video walls, and touch screen TVs positioned throughout the battalion. Faster response times "This project is a significant milestone in our efforts to enhance public safety in Osasco and beyond," said Captain David, coordinator of activities at the 14th Battalion. "With the advanced technology provided by Segdboa and Corsight AI, we can respond more quickly and effectively to potential threats." Real-time monitoring Segdboa also installs surveillance poles with cameras in front of critical private and public venues This initiative is part of a Public-Private Partnership (PPP) spearheaded by Segdboa, which donates fully-equipped monitoring rooms to each battalion, outfitted with the latest security technology. These rooms enable real-time monitoring and rapid response to potential threats. Segdboa also installs surveillance poles with cameras in front of critical private and public venues such as shopping centres, condominiums, bridges, and parks. These cameras detect suspects and alert the Military Police forces within the battalion’s jurisdiction, ensuring swift action and increased public safety. Accuracy in public safety "We are proud to support this initiative and bring our cutting-edge technology to the forefront of public safety efforts," said Roberto Rocha, CEO of Segdboa. "Our goal is to create a safer environment for everyone by integrating the best technology available with the dedicated efforts of our police forces. We chose Corsight AI's technology for its proven accuracy in real-world conditions and its unbiased performance across gender and ethnicity." Advanced technology Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city To date, Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city. The project aims to eventually deliver monitoring rooms to each of the 380 battalions of the Military Police of São Paulo state, known as Brazil's powerhouse and often sets the standard for the nation. "We are excited to be part of this innovative project that leverages our Facial Intelligence platform to enhance security and public safety," said Geraldo Sanga, Corsight AI's Brazil Regional Sales Director. "This collaboration demonstrates the power of combining advanced technology with dedicated public service." Efficient law enforcement operations Additionally, Segdboa plans to integrate each battalion's facial recognition database with the national Cortex system from the Ministry of Justice. This national database includes photos of all citizens with legal mandates and records of stolen vehicles, facilitating more efficient law enforcement operations across the state. Corsight AI is committed to supporting this vital initiative and enhancing public safety through innovative facial recognition technology. It looks forward to continuing the collaboration with Segdboa and the Military Police of São Paulo.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety, announced that the Arkansas Department of Corrections (DOC) has chosen to modernise its surveillance camera system with i-PRO network cameras and recorders. More than 4,000 cameras help the Arkansas DOC oversee 17,000 inmates and 32 facilities. Working closely with system integrator Progressive Technologies, The Arkansas DOC has already replaced approximately 60% of their analog cameras with a mix of high-resolution i-PRO multi-sensor, fisheye, PTZ, bullet, dome, and compact dome cameras, and modernised their NVRs with i-PRO NX and NU recorders. Resolution, reliability, and cybersecurity Reliability is also a must-have for the DOC in an environment hostile to technology Arkansas DOC Containment and Surveillance Coordinator Drake Palmer talked about the impact of moving from analog to high-resolution digital cameras. “It’s like night and day. 4K is what allows us to see if someone’s handing an inmate a pen or a shank. We went from having blurry images to complete clarity. From a narrow field of view to a wide field of view. There are a hundred different things that these cameras have made easier and safer for inmates and staff.” Reliability is also a must-have for the DOC in an environment hostile to technology. Cybersecurity is also a key concern, which is why they replaced existing IP cameras that lacked cybersecurity features at a facility they took over. At that site, Palmer brought in the easy-to-install i-PRO NU all-in-one recorder, took out the low-end cameras and recorder, deployed i-PRO cameras and the NU recorder and had everything up and running in 10 minutes. Exploring video analytics At each of the DOC’s facilities, an officer monitors the video surveillance system on site. But with as many as 800 cameras on some sites, it’s impossible for one person to watch them all. Palmer anticipates taking advantage of i-PRO’s video analytics in the future to help with that. He is also exploring using line-crossing analytics to phase out the legacy microwave solution in place to surveil the facilities’ perimeters and identify/prevent contraband drops. Licence plate recognition is also of interest to Palmer as a way to identify vehicles of interest that frequent the facilities. As the Arkansas DOC continues to modernise its surveillance system in phases, Palmer says, “We’ll be able to move gradually from reactive to proactive use of our camera system.”
San Luis Obispo (SLO), the gem of California's central coast, is renowned for its picturesque vineyards, historic architecture, and vibrant community life. Quiet but lively, it is also home to the California Polytechnic State University, located halfway between San Francisco and Los Angeles. Ensuring safety and security Because of its distance from major metropolitan areas, SLO has retained its rural, small-town character, along with a bustling downtown and beautifully preserved Spanish Mission. The San Luis Obispo Police Department (SLOPD) is focused on ensuring safety and security across expansive terrains, reducing crime, and enhancing the quality of life while upholding the principles of service and integrity. The challenge The secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins For San Luis Obispo, two priorities were crime prevention and the protection of sprawling outdoor spaces popular for hiking and biking. Hidden from public view, the secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins. However, its remote nature made installing a traditional security system nearly impossible. The initial cost to secure three city parking structures was also cost-prohibitive, with quotes of over $1 million for network connectivity alone. Need for a robust and reliable solution "We've dealt with products that were essentially consumer-grade equipment repackaged as professional security solutions,” said Chad Pfarr, Administrative Lieutenant. "We needed a more robust and reliable solution. Creating our own was time-consuming and beyond our expertise, highlighting the need for a specialised, cost-effective solution.” Why Verkada A system that could operate in remote locations, areas typically beyond the reach of standard CCTV “We were drawn to the hardware and software quality. But what truly set Verkada apart was the willingness to innovate in ways that traditional security solutions did not. We can now bring Verkada devices into the wild, in the middle of nowhere, without traditional city network infrastructure." A system that could operate in remote locations, areas typically beyond the reach of standard CCTV technology was a leap forward for community safety. Use cases include: Protecting remote locations with the GC31 Cellular Gateway. Licence Plate Recognition (LPR) monitoring to streamline vehicle investigations. Protecting evidence in cold storage with Air Quality Sensors. Improving check-in and registrant compliance with Workplace solutions. "Verkada's willingness to venture into uncharted territory with us to ensure security systems could be deployed where they were most needed, regardless of existing connectivity, was what got us so excited. Beyond just adapting to what’s available, it’s continuously improving to meet our needs." Protecting remote locations with the cellular gateway In San Luis Obispo, the GC31 Cellular Gateway bridges the gap between the need for remote security and limited infrastructure. The police department protects areas previously deemed inaccessible without the high costs of traditional network installations, leading to savings of over $1 million for connectivity alone. Bridging the connectivity gap "Before Verkada, the idea of installing a security system in remote locations was a logistical nightmare. The cost of establishing connectivity alone was prohibitive, not to mention the technical hurdles of operating without power or a network." "But with the Cellular Gateway, we've been able to overcome these barriers, bringing security and peace of mind to once vulnerable areas." Licence Plate Recognition (LPR) capabilities SLOPD can install Verkada products in locations that are hard to wire or lack connectivity SLOPD can install Verkada products in locations that are hard to wire or lack connectivity, such as parking lots, construction sites, trailheads, and natural terrain. Within the city, the GC31 also protects busy intersections by supporting cameras with Licence Plate Recognition (LPR) capabilities. Streamline vehicle investigations Paired with the cellular gateway, CB62 outdoor bullet cameras are deployed on streetlight poles to monitor moving traffic, covering up to three lanes with a single camera. Using Verkada’s edge-based processing and computer vision technology, the LPR solution captures licence plates at speeds of up to 80 mph (128 kph). Flexibility and versatility The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics to each location. This includes monitoring busy intersections, remote trailheads, or railroad crossings. This flexibility is crucial in a community that values its open spaces and balances accessibility with safety. "We've not only deterred potential criminal activities but also enhanced the overall safety for residents and visitors alike. The ability to monitor these areas remotely has been a game-changer, allowing us to extend our reach without stretching our resources too thin." Protecting evidence in cold storage with air quality sensors The introduction of Verkada's air quality sensors into the SLPD’s evidence management protocol has marked a significant improvement in securing critical evidence that requires refrigeration. “Sensors protect the evidence entrusted to us." "They monitor the conditions within our cold storage facilities in real-time, ensuring that any deviation from the norm is immediately flagged. This allows us to act swiftly to address any issues before they impact the evidence.” Sensors mitigate the risk of loss and help maintain the overall integrity of the evidence, which is crucial for the judicial process. Ensuring that evidence is stored under optimal conditions preserves its validity and reliability, which can be decisive in court cases. Guest and Workplace Solutions Verkada Guest supports security and compliance as well as administrative processes At the police department, Verkada Guest supports security and compliance as well as administrative processes and community interactions. "We're not just looking at improving how we manage security systems; we're also opening up opportunities to better serve our community in every interaction they have with us. This is about making our department more accessible, efficient, and responsive to the needs of San Luis Obispo.” Automated notification "Registrants can sign in digitally, similar to the check-in process at a doctor's office. This system automatically notifies the assigned detective, who can then prepare before meeting the registrant." "It's a welcome shift from our current, more manual process, and we're excited about the potential to make our operations more efficient while improving the experience for everyone involved.” Digitisation of visitor check-in The registration of certain types of visitors is a legal requirement that, until now, has placed a burden The registration of certain types of visitors is a legal requirement that, until now, has placed a burden on the department's space and resources. By digitising the initial check-in and form completion process, the department can handle sensitive registrations with greater discretion and efficiency. "We can integrate specific forms and requirements into the Guest system." Minimising congestion "This customisation ensures that we can maintain legal compliance while respecting the needs of our community and the constraints we operate under." "Guest reduces wait times, frees up essential space in the lobby, and minimises the congestion that can occur during peak registration periods.” Solar and Battery SLOPD is also exploring alternate power options to enable more deployments across San Luis Obispo, further ensuring the safety and security of their community. "Our partnership with Verkada has already improved our operations. The next step involves incorporating solar and battery backup systems for our cameras and bridge devices. This will not only expand our public safety reach but also ensure that our security measures are sustainable and resilient against power outages."
The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driven approaches to law enforcement. Through initiatives like "Smart Policing," a collaboration with the local community and Winston-Salem State University, the department aims for systemic change in crime reduction and community safety. Real-time intelligence Lieutenant Ben Jones oversees the Real Time Crime Center (RTCC) housed in the Criminal Intelligence Bureau, a crucial nerve in the department’s operations. Under his stewardship, the team assists officers in protecting over 253,020 people across 133.7 square miles. “A more informed officer makes better decisions. We provide as much real-time intelligence as possible to detect, deter, and solve crime.” The challenge Get Connected Winston-Salem campaign integrates community-owned cameras into the police's video security Facing violent crime and an annual increase in homicides, the WSPD emphasises rapid responses underpinned by precise and accurate data. A particularly innovative step is the "Get Connected Winston-Salem" campaign, which integrates community-owned cameras into the police's video security system through Fūsus. This not only broadens the scope of crime monitoring but also exemplifies the department's commitment to collaborative crime-fighting. However, finding suspects’ vehicles was a logistical nightmare and still relied heavily on witness accounts. “We began looking at LPR solutions to assist in shootings, homicides, and cases involving vehicles.” Intelligence gathering with LPR and Multisensor To elevate its crime-solving capability, the city has strategically placed Verkada License Plate Recognition (LPR) and Multisensor cameras at traffic light intersections. “Our goal is to improve the solvability and speed of investigations by being able to identify suspects' vehicles across different intersections. We tie LPR with the Multisensor, which gives a four-way view across the intersection. No other solutions we evaluated offer this capability.” The nature of the incident When an incident is reported, the initial call is directed to the Patrol Divisions, and first responders are dispatched accordingly In partnership with the Winston-Salem Department of Technology (DoT), Jones plugs Multisensor cameras directly into the city system where there's Fiber and power. When an incident is reported, the initial call is directed to the Patrol Divisions, and first responders are dispatched accordingly. The nature of the incident determines its next course: for instance, serious shooting incidents are relayed to the Violent Firearms Investigative Team, while homicides are dealt with by the Criminal Investigation Division. Real-time Verkada Analytics “Before, we relied on witness information. Now, with Verkada and Fūsus, finding what we need can take just minutes instead of days.” The Verkada software, in conjunction with Fūsus, enhances the accuracy and speed of investigations, particularly in locating vehicles associated with a crime and finding missing people. People and Vehicle Analytics allow for the swift identification of both suspects and missing people throughout the city. Finding missing people - Detailing a success story, Lt. Jones recounts, “We found a missing person on a Verkada camera, and used People Analytics to find her at different times. We were able to confirm that she was alive at particular times, which gave investigators a starting point.” Coupled with ShotSpotter, a gunfire detection system, the team swiftly locates suspects using real-time analytics Finding suspects by vehicle - Coupled with ShotSpotter, a gunfire detection system, the team swiftly locates suspects using real-time analytics. “As soon as there is a shooting, the team uses Verkada to quickly locate suspects’ vehicles based on their description and colour." "A high percentage of violent crimes involve suspects who arrive, leave, or commit the crime from a vehicle. Verkada helps us identify where they’ve been, where they are, and where they’re headed.” Alerting with video context - Verkada goes a step beyond the image of a vehicle tag, providing a video of the car, its tag, and other vital details. “In the past, we might’ve stopped every red car. With Verkada, we have higher accuracy and less chance of mistaken identity." "I've been in the LPR market for a while and found that most solutions only give you a picture of the tag and vehicle. Verkada associates a video with each tag, so we have additional context easily available for intelligence gathering.” What's next Entering phase two, the goal is to place Multisensors closer together and increase the Verkada security These use cases with Verkada are just the beginning. Lt. Jones envisions a future where the department can seamlessly locate vehicles from one intersection to another, making suspect identification efficient and precise. Entering phase two, the goal is to place Multisensors closer together and increase the Verkada security coverage across the city. Real-time problem solving "The LPRs and Multisensor fit into our overlapping technology strategy, and we plan to increase the density of our deployment. If we’re pursuing an active shooter for example, having the cameras near our shotspotter areas allows us to use both technologies in conjunction with one another to locate the shooter.” Furthermore, by showcasing the efficacy of Verkada to other police departments, Winston-Salem aims to set a benchmark in crime-solving on the East Coast. Lt. Jones adds, “My goal is real-time problem solving; witnessing events as they unfold, not after. With Verkada, we’re turning that goal into reality.”
Renowned as a significant entity in the power industry, the Indian Power Giant stands as a key player in India's public sector power utility domain. Under the auspices of the Ministry of Power, Government of India, it specialises in hydroelectric power generation and associated endeavours. With a steadfast commitment to providing clean, sustainable, and cost-effective energy, the Power Giant has successfully executed numerous large-scale hydroelectric projects, making substantial contributions to India's energy landscape. Business challenge The Indian Power Giant encountered a formidable obstacle with its existing video surveillance infrastructure, comprising 128 IP cameras and NVRs of disparate makes and models dispersed across its facility. Lack of video management software capable of seamlessly merging with third-party IP cameras This diversity in camera types presented a significant hurdle to centralised surveillance efforts, resulting in delayed detection of security incidents, prolonged response times, and an overall compromised security stance. Moreover, the lack of video management software capable of seamlessly integrating with various third-party IP cameras and NVRs compounded the issue. Key challenges Absence of a centralised video management solution for over 100 IP cameras and NVRs deployed at multiple locations within the facility. Difficulty in finding a Video Management Software (VMS) compatible with diverse third-party IP cameras and NVRs. Varied user interfaces of IP cameras and NVRs from different brands causing user confusion. Inability to integrate the Automatic Number Plate Recognition (ANPR) system with the existing VMS, missing out on enhanced access control and vehicle tracking opportunities. The Power Giant faced issues related to manual monitoring and tracking of vehicles entering or leaving their premises. Solution Remote surveillance became feasible from any location, ensuring continuous monitoring of the facility The deployment of Matrix SATATYA SAMAS-Video Management Software emerged as the solution to the Indian Power Giant’s challenges. SATATYA SAMAS seamlessly integrated all 128 third-party IP cameras and NVRs across the facility, facilitating smooth centralised video surveillance operations. The Admin Client simplified the addition of cameras and NVRs, while the Smart Client enabled effortless playback and monitoring. With the Mobile Client, remote surveillance became feasible from any location, ensuring continuous monitoring of the facility. SATATYA SAMAS effectively addressed the hurdles, providing a user-friendly video management system that significantly enhanced overall security system efficacy. Furthermore, Matrix introduced an Automatic Number Plate Recognition (ANPR) solution at 12 entry points within the power plant premises. This strategic implementation mandated vehicle authentication at the entry gates, allowing access only upon successful authentication. The ANPR solution captured licence plate data, converted it into digital format, and securely stored it in the database, bolstering security measures and establishing a robust record-keeping system for enhanced monitoring and vehicular access control. All in all, Matrix enhanced security for the Indian Power Giant. Products offered Matrix Licence Dongle 200: USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100: Licence for Adding 100 Additional Cameras SATATYA SAMAS CAM20: Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM05: Licence for Adding 5 Additional Cameras SATATYA SAMAS USER03: 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR10: Automatic Number Plate Recognition (ANPR) Licence for 10 Cameras SATATYA SAMAS ANPR01: Automatic Number Plate Recognition Licence for 1 Camera Benefits Interoperability: SATATYA SAMAS facilitated seamless integration with all third-party IP cameras and NVRs, regardless of their models or brands, ensuring a unified and interoperable video management system. Efficient Monitoring: The centralised video surveillance system enabled comprehensive monitoring from a single interface. Effortless Management and Playback: The user-friendly Admin Client simplified camera and NVR management, while the Smart Client facilitated easy playback and monitoring for prompt security responses. Remote Monitoring: The Mobile Client enabled on-the-go surveillance from any location, coupled with instant notifications and alerts for swift response. Enhanced Access Control: Matrix's ANPR solution enhanced access control by authenticating vehicles. Improved Vehicle Tracking: The ANPR solution facilitated accurate vehicle tracking and security through licence plate capture and storage.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The advantages of security systems as forensic and investigative tools are well understood and demonstrated in the market. However, the new trend is toward systems that are useful in real-time and that even predict a security event, before it happens. We asked this week’s Expert Panel Roundtable: Which security systems are becoming more proactive than reactive?