Video Management System
Siemens and Genea recently announced a second collaborative effort to provide security professionals and facility managers with improved security using the cloud. The security solution allows teams to leverage their existing technology, like security cameras, door readers, controllers and more, and manage it all from a modern dashboard, anytime, anywhere. Siemens’ security customers Through Genea’s customisable, cloud-based, open API platform, Siemens’ security customers ca...
According to the 2024 Access Control report by Omdia, Genetec., the pioneer in enterprise physical security software, has consistently gained market share over the last six years, solidifying its position as a worldwide market pioneer and building upon its #2 global position for access control software. In the Americas market, access control software has evolved beyond the physical security department to become an essential component of business operations. 2024 Access Control report Accordin...
AMAG Technology is pleased to announce the appointment of Chris Meiter as AMAG Technology's Vice President of Global Business Development for Video Solutions. This new role underscores the organisation’s continued expansion support to its entire technology suite. Chris Meiter comes from Salient Systems, which is a decade-long strategic video partner of AMAG Technology. The appointment of Chris to this new position is a strategic win for both AMAG Technology and Salient Systems, offering e...
At ISC East 2024, Hanwha Vision (Booth 607) is redefining the role of surveillance technology as a total business solution. The company is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence tools delivering new data-driven business insights. AI in Hanwha Vision’s IP cameras Attendees will see new applications of AI in Hanwha Vision’s IP cameras and new c...
Luminys Systems Corp (Luminys), a provider of smart, sustainable, and connected technology solutions announced the launch of its latest suite of security technology products designed for the North American market. The release is scheduled for a public unveiling during the "Luminys Phase 2 Product Launch" webinar on Nov. 15, showcasing an innovative product lineup that meets the modern demands for scalable, intelligent, and compliant security. Product lineup The new suite includes an array of...
Milestone Systems, a global provider of open-platform video management software (VMS), announced the release of the R2 2024 update to its XProtect platform. This release introduces XProtect Remote Manager, a cloud-connected service that enhances the value of Care Plus subscriptions. The update also includes improvements to user experience and expanded language support. Enhancing the Value of Care Plus As organisations increasingly seek flexible, efficient ways to manage their video secu...
News
ONVIF®, the renowned global standardisation initiative for IP-based physical security products, has released the first course in a new online learning initiative designed to promote greater knowledge and understanding of the workings of ONVIF. The new 'Introduction to ONVIF' course offers a comprehensive overview of how the organisation and its standardised interfaces work for the interoperability of IP-based physical security products and services. Benefits of ONVIF standards The e-learning course is free of charge and is available to anyone interested in learning more about ONVIF Available on the ONVIF website, the interactive course educates users on the ONVIF mission and organisation, the benefits of ONVIF standards, what ONVIF profiles and add-ons are and practical applications for both, and the importance of the conformance process. The e-learning course is free of charge and is available to anyone interested in learning more about ONVIF. “With today’s rapidly advancing technology advancements, education and knowledge sharing is increasingly important for organisations of all types to achieve their business goals,” said Leo Levit, Chairman, ONVIF Steering Committee. Understanding of ONVIF Leo Levit added: “This e-learning course will help increase the understanding of ONVIF and the advantages of incorporating ONVIF conformant products into a security system.” ONVIF member companies can also access the e-learning course for use on their internal learning management platforms to provide this information to their staff and customer base. IP-based physical security products ONVIF is an industry forum driving interoperability for IP-based physical security products Founded in 2008, ONVIF is a pioneering and well-recognised industry forum driving interoperability for IP-based physical security products. The organisation has a global member base of established camera, video management system and access control companies and more than 30,000 profile conformant products. ONVIF offers Profile S for streaming video; Profile G for video recording and storage; Profile C for physical access control; Profile A for broader access control configuration; Profile T for advanced video streaming; Profile M for metadata and events for analytics applications and Profile D for access control peripherals. IP interoperability solutions ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide. Further information about ONVIF conformant products, including member companies and their conformant models, is available on the ONVIF website.
i-PRO Americas Inc. (formerly Panasonic Security), a global pioneer in professional security solutions for security and public safety, announced the integration of Triton ULTRA, a multi-function health, safety, and drug detection device, with its Video Insight VMS. This integration enables educational institutions to enhance campus safety through real-time environmental insights while ensuring full privacy compliance in sensitive areas like bathrooms and locker rooms, where traditional surveillance is not feasible. Key features Triton ULTRA is specifically designed to detect potential health and safety concerns without cameras, audio recording, or collecting personally identifiable information. Key features include: Vape & THC Detection: Utilising eleven unique chemical metrics and AI, Triton ULTRA distinguishes between vape, THC, cigarette smoke, and other aerosols. Aggression and Gunshot Detection: Triton ULTRA’s advanced sound recognition can also detect gunshots and signs of aggression based on sustained noise levels. Keyword Detection: the system also enables schools to detect specific trigger words in multiple languages that immediately alert security personnel to emergencies. People Counting and Loitering Detection: the system can also accurately monitor the number of people in a room and detect loitering with customisable thresholds. Triton ULTRA’s advanced technology Video Insight users can access real-time data from Triton ULTRA’s advanced sensor technology Through the integration, Video Insight users can access real-time data from Triton ULTRA’s advanced sensor technology directly within the VMS dashboard, enabling them to monitor environmental conditions such as chemical levels, noise anomalies, and occupancy. Using the built-in rule manager, administrators can configure specific event triggers—like changes in air quality or sound detection—and automatically initiate security responses, such as sending alerts or activating cameras. This flexible, rules-based system allows schools to proactively address potential incidents while maintaining privacy in sensitive areas like restrooms and locker rooms. Integrating with Triton ULTRA “Video Insight has built a strong reputation in the education sector for its intuitive interface, ease of use, and low cost of ownership,” said Adam Lowenstein, Product Director at i-PRO Americas. “By integrating with Triton ULTRA, we are further empowering schools to harness cutting-edge analytics for real-time, data-driven insights directly within our video management system. This integration allows schools to take a proactive approach to critical health and safety concerns, like vaping and aggression, without sacrificing privacy. It’s a significant step forward in campus security, delivering enhanced protection where it’s needed most.” i-PRO’s Video Insight With Video Insight VMS’s scalable platform, clubs can easily raise their security systemsWith Video Insight VMS’s scalable platform, institutions can easily expand their security systems as their needs evolve. Whether deployed on-premises or in the cloud, the combined solution offers schools the flexibility to manage all monitoring from a single platform, improving overall safety and response efficiency without compromising privacy. “The integration of Triton ULTRA with i-PRO’s Video Insight marks a significant step forward in campus safety solutions,” said Lance Parthemore, Operations Director at Triton. i-PRO’s network partners Parthemore added: “By combining Triton’s advanced sensor technology with the comprehensive management capabilities of i-PRO’s Video Insight, customers can monitor private and sensitive spaces seamlessly from a single platform. This partnership unlocks cutting-edge insights without compromising on privacy.” The new integration is available immediately from i-PRO’s network of distribution partners. The Triton Sensor can also be purchased through i-PRO.
Precisely, the global pioneer in data integrity, announced it has been named a Leader in the first-ever Aspire Leaderboard for Interaction Experience Management (IXM). This is the fifth time Precisely has been named a Leader in Aspire Leaderboard categories across the customer communications management (CCM) and customer experience management (CXM) landscape. New IXM category Aspire made the new IXM type to reflect the growth of capturing and validating customer data The customer experience ecosystem has evolved dramatically in recent years, with advancements in AI and machine learning enabling rapid analysis of high volumes of customer data, and interactive experiences fast becoming an expectation. In recognition of this shift, Aspire created the new IXM category to reflect the evolution of capturing and validating customer data via digital forms management to multi-channel customer engagement. This includes real-time customer data gathering as well as advanced interactions such as personalised video, augmented reality, chatbots, and voice assistants. EngageOne™ Communicate In the new IXM Leaderboard, Precisely is praised for its comprehensive customer engagement solutions, including EngageOne™ Communicate, which is called out for uniquely offering a wide range of interactive capabilities, including chatbots and personalised interactive video, via a single platform. EngageOne™ RapidCX, a unified SaaS-based CCM solution, is also recognised as being an industry first for personalising, automating, and auditing customer communications in data-intensive, highly regulated industries. Data integrity solutions Aspire further owns the firm's robust data integrity keys, which allow clients to easily leverage accurate Aspire further acknowledges the company's robust data integrity solutions, which allow customers to easily leverage accurate, consistent, and contextual data to power its CCM and CXM products. This unique combination allows for hyper-personalised, trustworthy communications to be delivered across a wide variety of messaging channels, including bespoke video, chatbots, dynamic PDFs, and more. Future of customer engagement "Precisely empowers companies with the ability to seamlessly connect data integrity with customer engagement through powerful solutions like its RapidCX and Communicate platforms," said Kaspar Roos, Founder and CEO at Aspire. "Their leadership in this space reflects a deep understanding of the future of customer engagement and the evolving need for highly bespoke, secure communications." Customer engagement solutions Precisely portfolio of customer engagement keys empowers firms to provide a seamless client experience The Precisely portfolio of customer engagement solutions empower businesses to provide a seamless customer experience through data-driven, personalised communications, smart self-service platforms, and the ability to rapidly adapt communications as market and customer needs change. Dedicated solutions support even highly regulated industries such as financial services, insurance, health care, and telecommunications, where companies often face pressure to offer dynamic, personalised experiences while managing increasingly complex regulatory requirements. End-to-end solutions "This recognition by Aspire underscores our unique approach to customer engagement - empowering businesses with end-to-end solutions that combine data integrity with the delivery of powerful customer communications," said Greg Van den Heuvel, Executive Vice President and General Manager – Customer Engagement Solutions at Precisely. "We're proud to support customers in highly regulated sectors to harness trusted data for secure, hyper-personalised interactions, giving them a competitive edge without compromising on governance." Additional Aspire Leaderboards Precisely has received recognition for its leadership across additional Aspire Leaderboards, including the following: AnyPrem CCM Software – for CCM solutions that can be deployed either on-premises or in a hosted cloud environment Communications Experience Platform (CXP) – for managed solutions that combine traditional CCM offerings with capabilities from adjacent fields of expertise CCM-CXM Communications Outsourcing – for providers who design, manage, produce, and fulfil communications on behalf of their customers Vendor Hosted SaaS CCM – for cloud-native CCM solutions delivered as SaaS, hosted and managed directly by the provider.
As demand for high-efficiency security systems rises among large enterprises, the global security solution provider VIVOTEK (3454-TW) introduces new software service “Device Manager”. Remote management service This all-in-one remote management service allows large enterprises to manage thousands of network cameras, assign IPs, and update firmware remotely, significantly reducing time and labor costs, and acting like a dedicated security manager for the company. For instance, when a camera goes offline, the system immediately sends a notification, effectively preventing potential security incidents and helping businesses improve their operations. IP camera market The IP camera market is projected to reach $14.74 billion by 2024 and grow to $28.25 billion by 2029 According to a report, the IP camera market is projected to reach $14.74 billion by 2024 and grow to $28.25 billion by 2029, with a compound annual growth rate (CAGR) of 13.9%. As the security industry sees broader applications, many companies are recognising security as a critical part of their operations. AI-powered services and products For businesses with large-scale security systems, effectively simplifying management processes is the key to staying competitive. VIVOTEK, understanding this need, has introduced a diverse range of AI-powered network cameras, recorders, and the VORTEX cloud security service, it has also optimised its software systems to enable easier security management for its clients. Key features The VIVOTEK Device Manager is available for free download on the official website and can be used effortlessly by entering the IP address of a VIVOTEK camera. Key features include: Batch Deployment for Fast Setup: Quickly configure cameras, assign IPs, and update firmware to ensure the system is always up-to-date and running smoothly. Stay Informed 24/7: The Device Manager runs around the clock, and whenever an abnormal event is detected—such as a device going offline—an instant notification pops up, giving clients valuable time to respond to incidents. Enhanced Remote Management for Maintenance: Users can monitor and adjust equipment at multiple locations without needing to be on-site. Devices can also be grouped for easier system maintenance. Synergy with third-party VMS To strengthen its enterprise security ecosystem, VIVOTEK has partnered with industry-pioneering Video Management System (VMS) platforms such as Genetec and Milestone to integrate its network cameras and provide more efficient video analysis. With the Device Manager, VIVOTEK increases synergy with third-party VMS platforms and delivers a more comprehensive security management experience for large-scale enterprise customers.
AMG Systems of the United Kingdom and USA introduced the AMG810/816 series of cost-effective Network Time Protocol (NTP) Servers. NTP Servers are required in closed networks with no internet connection to assign time codes accurately. AMG810/816 series Accurate time is critical on a network, most security protocols, such as 802.1x, CCTV video, and all types of system logging, such as Syslog require time-stamped data. The AMG810/816 series are Stratum 1 devices, meaning they are just 1 level away from the source time clock, either atomic clock or satellite. The AMG810/816 models are Stratum 1 devices as they take their time directly from GNSS satellite constellations. Four models AMG offers multiple antenna options, including window, surface, and pole mount The AMG810/816 series consists of four models; the differentiation is two are DIN Rail Mount units, and two are 19-inch rack models. Power options include 12-24VDC, 85 – 264 VAC, and POE powered. AMG offers multiple antenna options, including window, surface, and pole mount. The line is fully hardened and can operate outdoors in a suitable IP-rated housing and extreme temperatures (-20 to +70°C). TAA and NDAA compliant Unlike other products originated in Asia, the AMG810/816 Series PoE time servers are designed in the USA and UK and manufactured in an ISO9001-certified facility, are fully TAA and NDAA compliant, and unlike similar products from other Asian countries, can be used in all US Government installations. AMG products, including the AMG810/816 products, are backed by the AMG industry-pioneering lifetime warranty. Accurate time stamps Steve Clarke, AMG's Managing Director, said, “Network Time Protocol (NTP) Servers are critical to any network, particularly those not directly connected to the internet." "That now includes most security, ITS, and factory networks that cannot risk having unauthorised access. Our AMG 810/816 helps to eliminate any threat of that happening by providing accurate time stamps." Additional security "The AMG810/816 series sets the quality standard. Our engineering team looked at what was currently available, identified weaknesses, and engineered our product line to overcome those weaknesses." "Plus having a product made in the USA/UK gives your network an added layer of security.” Features of AMG810/816 series Tom Exley, AMG Technical Director, adds, “We designed the AMG810/816 Series to set the standard to which all competitive products should be measured." "Our AMG810/816 series supports four different satellite constellations with the possibility to enable 3 of them at the same time for improved coverage and the time needed for the initial time fix. Most competitors rely on a single GPS satellite constellation. Additional features such as an integrated super-capacitor backup ensure the AMG810/816 series offers market-leading performance.” Lifetime warranty AMG believes having products in stock, being fully supported by the AMG design team, and being covered by the AMG Lifetime Warranty gives worldwide AMG customers a measurable advantage in today’s competitive marketplace. AMG Systems offers an extensive line of fiber optic, copper, and wireless Ethernet, fiber optic video, and data transmission equipment uniquely designed to meet the needs of the Security, Intelligent Transportation Systems, Utility, and Industrial markets.
Long gone are the days of choosing a security installer for a single installation and then moving on. Security pioneers are choosing installers based on the long-term value and strategic partnership they can offer. The best installers remain on top of new trends and developments — and advise their customers accordingly. In doing so, they create many opportunities to upsell new solutions to improve their customer’s operations. Customer’s lifetime value Customers find more value from the firm and, in turn, boosts the bottom line Upselling describes an approach in which a supplier makes their customer aware of a superior version of a product, while cross-selling is when a complementary product to those a customer has purchased is proposed. Upselling and cross-selling can significantly increase a customer’s lifetime value - how much revenue they generate over their time with a supplier - by 20-40%, according to research. It helps customers find more value from the firm and, in turn, boosts the bottom line. Seven easy ways Here are seven easy ways to upsell and cross-sell to customers. Easy AI upgrades AI is becoming a “must have” and customers are seeking easy ways to leverage the benefits of AI into their existing infrastructure and new installations — without the disruption and cost of a re-fit. Hanwha Vision offers an AI Box, the AIB-800, that makes it easier to implement powerful AI analytics such as object detection (people, vehicles, and vehicle type), and virtual-line and area crossing detection, to reduce false alarms and improve operator efficiency. Increase coverage As sites expand and needs evolve, the customers may need additional surveillance coverage. Likewise, for temporary increases in footfall, for example, during events or high season for a retail, multi-use or tourism space, a PoE Extender camera can be a valuable addition to a customer’s security stack. It is designed as a cost-effective and quick solution for integrators and end users when there is a need to add a camera or another PoE-enabled device to an existing system. Multi-directional AI solutions Alternatively, end users may discover that they require coverage for large and complex areas and that it is more cost-effective to purchase a multi-directional AI camera. Hanwha Vision’s PNM-C34404RQPZ, for example, features a PTZ camera and four 4K sensors, with each sensor able to individually pan, tilt, zoom and focus. Meanwhile, accurate AI video analytics reduce false alarms and enable efficient forensic search. With just a single network cable, licence and IP address, multi-directional cameras enable a single device to take the place of several conventional cameras, resulting in a lower total cost of ownership. Add an IP audio system They can suggest migrating a customer’s site from an analogue to an IP audio system. An IP audio system, such as the range by Hanwha Vision, delivers superior audio quality and greater scalability, with a reduced need for cabling and an option for centralised management with a video management system. If an existing audio system is not in place, adding one can provide useful benefits such as broadcasting informational announcements, playing background music, and deterring unwanted behaviour. Rapid identification with bi-spectrum cameras Adding perimeter detection functionality can prove a significant enhancement for installations in low light or where intrusion is a concern. Thermal cameras are a value-add in such environments, giving additional coverage in challenging weather conditions, complete darkness or when foliage is blocking a scene. Hanwha Vision’s bi-spectrum AI range provides dual (thermal and visible) channels in one device making it simple for operators to use the thermal lens for perimeter detection and the visual lens to identify and determine if an event requires their action. This enables detection and rapid identification without having to install two separate devices – saving time, equipment and ongoing maintenance costs. Unified entry systems: access, intercom and camera solutions Investing in an intercom that integrates with a video management system and includes a camera, such as the TID-600R, means operators can benefit from an additional camera channel plus an access control and help point solution. The compact size of a combined intercom and camera system also suits a multitude of installations. Improve system architecture Sites often start with a simple security system that consists of a handful of cameras and a network video recorder. Over time they will invariably grow; at this point, there is an opportunity to upsell a video management system (VMS) such as Wisenet Wave, that consolidates data streams and system management in a single place. An open VMS also offers futureproofing and flexibility to add more devices as needs evolve. Likewise, if a customer’s annual software licence costs are up for renewal, it is worth considering the benefits of using Wave as there are no yearly or intermittent upgrade costs. Long-term loyalty The moment they complete an installation is just the start of a customer journey with the organisation. Thanks to advances in video surveillance and connected devices, there are many opportunities to continue building a relationship with the customers and to uncover new installations and features that can help the customers reach their goals. From implementing AI for higher efficiency and reduced false alarms, to unifying surveillance systems and bolstering architecture, the customers will need guidance to decide on the best security solution for them.
Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
Security beat
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
Ohio’s Nationwide Arena, home of the Columbus Blue Jackets of the National Hockey League (NHL), is protected by an outdated, end-of-life security system. The cost to maintain and repair it was becoming unsustainable. The system is composed of multiple disparate systems with different interfaces and management systems, and multiple requirements for software updates and support. Situational awareness The Security Director of the Arena wanted to modernise the system to enable proactive alerts for situational awareness and a unified platform to manage and visualise all 350 cameras installed across the venue. Offering a camera-agnostic solution, Hive Logic chose to keep the existing camera deployment and retrofit it with a powerful video management system. A 3-cluster enterprise server is used to manage all video streams and access control systems, empowered by Hailo’s AI accelerators for high-computer workloads. The Product The Hive software enables video management, access control, and AI video analytics running applications such as: People count to monitor the entrance and exit of the venue. Zone management for high traffic/dwell time. Security forensics to identify regulation violations and crime. Storage and search to identify past events and provide video evidence. Iron Link servers from Velasea are used in a cluster, sharing data to distribute workload and uptime. Each server is equipped with a HailoCentury 0804 PCIe acceleration card with 104 TOPS. Why Hailo? Lower Cost: The previous system did not include AI capabilities. GPUs were considered in the past but were too expensive to deploy at such scale. Hailo brought the most cost-effective solution while maintaining high computing capabilities. Scalability: Hailo’s scalability allows more cameras without overloading the central processing infrastructure while maintaining high accuracy in detecting and identifying objects. AI/ML pipeline “Hailo is the ideal choice for our product because it enables real-time analytics on camera streams, without relying on a central analytics server. This enhances bandwidth efficiency and overall performance while reducing power consumption." "Now we have a very robust AI/ML pipeline to rapidly deploy new AI models onto our edge devices," said Nate Green, Hive Logic, CEO. Effective and simple “I am grateful for HIVE and the wonderful technologies they offer as a standard package," Barry Kirby Security Director, Nationwide Arena. "The introduction of Hailo then makes it a highly effective and simple system to navigate.”
Type of Site: Apartment Building Location: Chodkiewicza 10, Warszawa, Poland The situation This housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. One entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution highlights Easy Intercom Retrofitting with Existing Cables. Remote Access with App-based Features. Good Scalability for Easy Addition of New Units or Expansion. Installed products S615 4.3” Facial Recognition Android Door Station 290-S8 7” Linux Indoor Monitor (2-wire Version) Solution benefits Future-proofing: With DNAKE 2-wire IP intercom solution, residents can enjoy high-quality audio and video communication, multiple access options including remote access, and integration with surveillance systems, providing a more versatile and secure living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
Motorola Solutions announced that Lancashire Police will deploy the M500 in-car video solution across its entire fleet of vehicles. The new video solution observes the vehicle’s environment from multiple viewpoints to provide officers with real-time awareness of their surroundings, whilst capturing video evidence that can provide accurate incident documentation to aid investigations. Motorola Solutions M500 "Police officers face unpredictable challenges and fast-moving events every day,” said Chris Hardy, chief superintendent for Lancashire Police. “The ability to respond quickly is paramount. The Motorola Solutions M500 can live-stream video back to the control room, enabling our team to build a clear picture of unfolding events by giving us eyes on the scene. It is a highly configurable, easy-to-use system that can automate processes such as triggering video recording when the blue lights are activated, helping officers to focus on the job at hand.” Technological and organisational capabilities Lancashire Police has made some recent investments in new technological and organisational capabilities Lancashire Police has made a number of recent investments in new technological and organisational capabilities. Since its establishment in June 2023, Lancashire Police’s Roads Crime Team and Roads Policing Unit, with support from wider police departments in the county, has been integral to efforts to locate and recover vehicles and assist with road traffic collisions. The deployment of the M500 in-car video solution will provide front-line officers with an additional tool to help fulfil its priority of making the roads safer for the community. Motorola Solutions VideoManager The M500’s interface is designed to be intuitive for officers to operate in demanding situations. Video captured is automatically uploaded to the Motorola Solutions VideoManager for secure, auditable storage that is intelligently organised. Recorded footage is tracked and audited to protect the chain of custody so that the police, public and judicial systems can be confident in the integrity of video evidence. VideoManager’s consolidated incident overview also helps to ensure that incident information, including footage recorded by the M500, as well as Lancashire Police’s body cameras, can be easily viewed from one location. Video security solutions “Video security solutions are a vital tool for police officers as they work to help keep their communities safe,” said Fergus Mayne, U.K. and Ireland country manager, Motorola Solutions. “As part of the Motorola Solutions safety and security ecosystem, the M500 connects with Lancashire Police’s existing mission-critical technologies, providing productivity and agility to the forces operational response to help protect people, property and places." Motorola Solutions’ Pronto application Motorola Solutions has been trusted by Lancashire Police throughout its digital transformation, supporting the force’s evidence capture, data storage and workflow efficiency. The M500 will complement the force’s existing technology infrastructure which includes Motorola Solutions’ Pronto Digital Policing application, TETRA radios and VB400 body cameras.
České Budějovice is a city located in Southern Bohemia in the Czech Republic that serves as the regional capital, with important commercial and political ties, and is the seat of many large corporations. An important trans-European road, the E55, that runs from Sweden to Greece also passes through the city. Protecting the citizens and visitors of České Budějovice on the roads is extremely important, both for strengthening the tourist attractiveness of the city and for ensuring smooth travel. The city of České Budějovice (the municipality) was awarded a tender for the installation of a traffic system with more than 170 cameras. The system was to ensure the protection of road users and pedestrians. Automatic incident detection Camera models include the X series cameras-XNO-6080R, XNO-6120R, XNP-6400R and XNO-6123R The winner and supplier of the contract were Swarco Traffic Cz s.r.o. and Telmo a.s., having proposed the best solution in cooperation with distributor, Abbas, a.s. This solution included cameras from manufacturer Hanwha Vision, combined with a video management system (VMS) by Genetec and an automatic incident detection and traffic collection system from the Italian technology company, Sprinx. The solution provides continuous recording and analysis of major roads in the city. Camera models include the X series cameras - XNO-6080R, XNO-6120R, XNP-6400R and XNO-6123R, the PNB-A9001LP 4K RoadAI camera, the multi-sensor camera PNM-9031RV, and the PNO-A9081R 4K AI bullet camera. PNO-A9081R for business intelligence The PNO-A9081R camera features 4K resolution with real-time day/night recording and integrated infrared illumination up to 30 metres away, enabling continuous outdoor surveillance. Edge AI in the camera provides accurate AI object detection and classification as well as valuable business intelligence including people, vehicle and heatmap analytics within pre-defined areas. This solution improves the accuracy of object detection and alerts, reducing time-consuming false alarms caused by wildlife, waving trees and shadows. PNB-A9001LP for efficient traffic management The camera is ideal for monitoring busy urban traffic and covers up to two lanes at speeds up to 100 km/h The PNB-A9001LP, 4K RoadAI camera is a comprehensive traffic monitoring solution with pre-installed and licenced ANPR, Make/Model and Colour Recognition (MMCR) and vehicle classification analysis. The camera is ideal for monitoring busy urban traffic and covers up to two lanes at speeds up to 100 km/h. Edge AI provides valuable insights and reduces false alarms, with analysis performed within the device itself to reduce server requirements and save energy and costs. In addition, the camera is equipped with a licence plate list management function, while the camera output can be connected to an access control system, helping operators manage parking lots and toll roads. PNM-9031RV for panoramic view The PNM-9031RV outdoor multi-sensor IP camera is equipped with four 5MP sensors and a 192° panoramic view that covers wide areas. Each sensor can also be remotely adjusted with pan and tilt capabilities. Operators can transmit surveillance footage through four separate channels or as a linked panoramic view. Artificial intelligence for faster responses MKDS project was funded by the Transport Infrastructure Fund and a grant from the European Union AI-powered features enable better situational awareness, supporting faster responses to emergencies such as accidents or stopped vehicles, evidence for investigations, and detailed insights for future city planning. This includes vehicle counting and classification, which can be used to inform road management and parking. Meanwhile, the detection of stopped vehicles and congestion means that operators can take appropriate action when necessary, such as opening new routes and rerouting vehicles to keep traffic flowing in the city. The MKDS project was funded by the Transport Infrastructure Fund and has a contribution from the European Union. Monitoring and analytical features Ing. Zuzana Trousilová, Deputy Director for Internal Affairs and Methodology from the Municipal Police of České Budějovice, said: "When it comes to monitoring and ensuring safety on the roads of our city, Hanwha Vision cameras fully meet the specified requirements for camera parameters and are compatible with the integration needs of the operational software applications." With its monitoring and analytical features, the video surveillance system provides the city with vital information for solving traffic and safety issues in the municipal area of České Budějovice.
One of the pioneering players in the global packaging ecosystem, this manufacturing facility transforms over 100,000 tonnes of paper, paperboard, and laminates annually into diverse, high-value packaging solutions. Established in 1925, it caters to industries such as food and beverage, personal care, and consumer goods, with a robust presence across India and select global markets. Recognised for operational excellence and innovation, the business holds numerous prestigious awards and certifications. With a strong focus on customer delight and sustainable packaging, it partners with major brands like P&G, Nestle, and Unilever. Business Scenario To address these challenges effectively, the facility of a video surveillance system was felt essential Without a video surveillance system in place, the company faced recurring security breaches and unauthorised access to its manufacturing units, which raised significant concerns for employee safety and the protection of assets. Instances of product mishandling and operational inefficiencies went unnoticed, underscoring the critical need for a video surveillance system. To address these challenges effectively, the installation of a video surveillance system was deemed essential. Additionally, they wanted a video surveillance system that ensured uninterrupted monitoring to avoid missing crucial events. Challenges Security Vulnerabilities: The absence of a video surveillance system posed risks to employee safety and the protection of valuable assets such as machinery, raw materials, and finished products. Operational Oversight: Instances of product mishandling were not promptly detected or addressed due to the lack of a robust video surveillance system. This compromised productivity, and quality control within the manufacturing unit. Loss Prevention: The inability to monitor activities effectively increased the risk of inventory shrinkage, theft, or damage to goods. This not only affected financial losses but also disrupted supply chain operations and customer deliveries. Inaccurate Weighbridge Monitoring: Inaccurate weighbridge monitoring made it difficult to verify truck weights before and after loading, which caused fraud and serious operational issues. Regulatory and Compliance Risks: Without a proper video surveillance system, it was challenging for the manufacturing unit to meet stringent regulatory standards, potentially leading to regulatory penalties. Solution Solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the digit plate All the vehicles entering and exiting the premises were monitored with Matrix Automatic Number Plate Recognition Solution. This solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the number plate. SATATYA SAMAS - Video Management Software then uses OCR technology to convert this captured number plate image into a digital number and store it in the database. The loading and unloading facility was closely monitored with the help of Matrix Weighbridge Monitoring Solution. This aided in the accurate tracking of shipments, which prevented fraud. Matrix 5MP Dome Cameras were strategically placed above production floors, assembly lines, packaging areas, and quality control stations within the manufacturing and warehouse facility. These cameras provided detailed monitoring of manufacturing processes, ensuring product quality and operational continuity with clear footage. Additionally, they were installed in administrative offices, break rooms, and training areas contributing to workplace safety. Matrix 5MP Bullet Cameras were deployed for robust outdoor and perimeter surveillance. They monitored loading docks, outdoor storage yards, parking lots, and security checkpoints. These cameras secured critical infrastructure such as HVAC rooms and electrical rooms, ensuring the safety and integrity of vital systems. SATATYA SAMAS - Video Management System The video surveillance system was configured in such a way that ensured uninterrupted recording All 100+ cameras were integrated with SATATYA SAMAS - Video Management System aiding in live view, and playback of the network cameras in the premises. The facility also opted for the CREAM (Cognitive Response Engine and Automated Monitoring) module in SATATYA SAMAS to improve employee safety. Two IVAs were configured in this case - Tripwire and Motion Detection. The Tripwire IVA could be used to monitor specific areas that had to be obstructed, while Motion Detection IVA helped in identifying accidents or unusual activities in the obstructed areas. Both IVAs worked in tandem, providing real-time alerts and video pop-up notifications. The video surveillance system was configured in such a way that ensured uninterrupted recording. Even if the recording server failed, the recording would be pushed to the management server by the network cameras. When the recording server was functional again, the footage was again pushed to the management server. Products Offered: SATATYA SAMAS PLT (1No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM5 (24 Nos.): Licence for Adding 5 Additional Cameras SATATYA SAMAS USER3 (01No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR3 (01No.): 3 Camera Licences for Automatic Number Plate Recognition SATATYA SAMAS CREAM5 (01No.): 5 Camera Licences for Automated Monitoring SATATYA CIBR50MVL12CWP P2 (04 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIBR50FL40CWS P2 (63 Nos.): 5MP IR Bullet Camera Fixed 4mm Lens SATATYA CIDR50FL40CWS P2 (53 Nos.): 5MP IR Dome Camera Fixed 4mm Lens Benefits The manufacturing facility is extremely satisfied with Matrix Video Surveillance System and is now planning to rely on Matrix for its needs at additional plant locations across India. Matrix's Automatic Number Plate Recognition (ANPR) and Weighbridge Monitoring Solutions streamlined operations by accurately tracking vehicles entering and leaving the premises, reducing manual errors and cutting down on weighment fraud. Employees experienced a greater sense of security with the help of CREAM in Matrix VMS, as it lowered the risk of accidents in the facility. With regular monitoring, the video surveillance system minimised product mishandling and prevented process errors, while also protecting assets and machinery. Matrix Network Cameras kept a constant watch over inventories, warehouses, and storage yards, making it easy to track stolen goods using surveillance footage. Matrix VMS and the server systems ensured 24/7 recording of the facility, maintaining continuous surveillance even in critical situations, providing a reliable and secure environment.
Sports hold profound significance in the lives of athletes, nations, and citizens alike, fostering a sense of unity and national pride. Sporting events captivate hearts and minds, showcasing the devotion towards athletic spirit. The journey of an athlete from local competitions to global stages embodies dedication and resilience, inspiring millions worldwide. Olympics event At the pinnacle of this athletic journey lies the Olympics, a cherished event that transcends borders and cultures, uniting nations in a shared pursuit of excellence and sportsmanship. For years, anticipation has been building as Paris, affectionately known as the City of Lights and renowned as the iconic capital of France, prepares to host the Olympics 2024, promising unforgettable moments of triumph and unity. Facial Recognition Technology FRT symbolises a commitment to safeguarding the spirit of The Olympics, preserving the joy and pride Amidst the excitement, there lies a solemn responsibility: to protect the interests of everyone involved. In response, the use of Facial Recognition Technology (FRT) offers an enhanced approach to improving security measures for identification, access control, and threat detection. It symbolises a commitment to safeguarding the spirit of The Olympics, preserving the joy and pride that this monumental event brings to millions worldwide. The quest for enhanced security at the Olympics Ensuring Olympic security involves addressing a spectrum of challenges, including the complexities of managing fan behaviour, cyber-attacks, and the unpredictability of civil unrest. According to the National Center for Sports Safety and Security, 73.2% of attendees consider safety and security measures when deciding whether to attend an event, and 77% prefer security measures to be visible at an event. Common cybersecurity threats Phishing attacks, credential stuffing, and password spraying are some of the common cybersecurity threats With growing technological advancement and globalisation of the world these days, the Olympic Games face increasing risks of cyber attacks. Phishing attacks, credential stuffing, and password spraying are some of the common cybersecurity threats. Reports from the National Cyber Security Centre, United Kingdom, have established that more than 70% of sports organisations fell victim to cyber incidents in 2020, and this was mostly caused by hackers seeking financial gain. Eradicating Security Concerns with FRT In particular, surveillance becomes an important component of security and incident detection during the Olympics, where millions of spectators gather from all over the world. For this reason, strict perimeter measures, secure screening procedures, and vigilant security are required. Indeed, integrating FRT as an additional feature in Video Management Systems (VMS) can improve the outcomes significantly. Physical Security Enhancement: Video Analytics Systems are one of the most effective means of evaluating threat levels at the event Video Analytics Systems are one of the most effective means of evaluating threat levels at the event, using face recognition to match the faces of the people attending the event with a universal offenders database. It allows security staff to quickly identify malicious actors and detain them. This reduces the likelihood of wrong-doers making attempts at large-scale events, thus, protecting participants and spectators, and ensuring their safety. Monitoring Crowd Behaviour: Effective management of crowd behaviour is crucial for maintaining a safe and harmonious environment. Video Analytics Systems make it easier to look for and monitor disruptive crowd behaviours in real-time, like vandalism, alcoholism, violence, etc. Instigators of such activities are immediately identified and flagged, allowing security officials to address the problem before it escalates. It also helps in tracking and preventing agitation since the system incites recognising people in the crowd from lists of unreliable persons, even if masks hide their faces. This capability enables security to respond quickly to emerging threats, ensuring that protests remain peaceful. Enhanced Cybersecurity Measures: If the FRT system is centralised, any attempted intrusion by an intruder will be immediately visible FRT minimises the capability of cyber intruders attempting to penetrate the competition control information systems, media streams, and security systems and meddle with their work. If the FRT system is centralised, any attempted intrusion by an intruder will be immediately visible to security personnel. This will prevent unauthorised access and reduce not only the number of cybercrimes but also financial and reputational risks. By integrating FRS with AI, biometric and conventional security systems have made security surveillance more effective and efficient in providing real-time data analytics. With the development of generative AI, a new type of attack using spoofing and deep fakes is gaining momentum. Recognition technologies with liveness features can stand out among other defence systems. Peace of mind for athletes and staff FRT has the potential to profoundly impact the Olympic experience, offering athletes and staff a transformative blend of efficiency, security, and operational ease. For athletes, it means seamless access to venues, minimising distractions and administrative hurdles, allowing them to dedicate more time and focus to their training and competition. They can move through the Olympic complex with confidence, knowing their safety is assured. Identifying and addressing potential threats The technology not only enhances a sense of safety and belongingness but also ensures that global athletic excellence Beyond efficiency, this technology empowers security personnel to manage large crowds with precision, swiftly identifying and addressing potential threats. The technology not only enhances a sense of safety and belongingness but also ensures that global athletic excellence is memorable and deeply meaningful for everyone involved. Harmonising security and privacy with integrity Data privacy is paramount, and the balance between safety and the subject’s right to privacy must be kept to the highest standard. Transparency about data collection, storage, and usage fosters trust and upholds individual dignity. By championing both security and privacy, advanced technology security solutions like FRT can play an important role in ensuring that every participant and spectator feels safe, respected, and inspired. The application of security measures trusted worldwide helps maintain the integrity of global events, and the Olympic games act as an anchor for setting a perfect example of unified growth and glory. 360-degree protection "The Olympic Games stand as a monumental event for millions worldwide, posing substantial challenges to security services," said Tamara Morozova, Global CEO, of RecFaces. "Integrating facial recognition software promises 360-degree protection, drastically reducing incident response times to mere seconds, and empowering security personnel with invaluable analytical insights."
Products
Round table discussion
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
White papers
How to lower labour costs when installing video surveillance
DownloadUnderstanding all-in-one solutions
DownloadHow video technology is transforming loss prevention, operations, and customer experience in the retail sector
DownloadTroubleshooting IP video systems
Download2024 trends in video surveillance
DownloadThe real cost of an outdated Video Security System
Download5 easy steps to an upgraded video surveillance system
DownloadVSS - Top 4 questions to get you started
DownloadWhy SAAS Security Platform is more popular in American SMEs
DownloadCamera cyber lockdown
DownloadVideo technology strategies for hospitals are moving beyond security
DownloadHealthcare Surveillance: Finding efficiencies from OR to ER and beyond
DownloadUnlocking wide-angle camera dewarping
DownloadIntelligent video security solutions
DownloadSimple Security Solutions for SMBs
DownloadVideos
Video Management System: Manufacturers & Suppliers
- exacqVision Video Management System
- Honeywell Security Video Management System
- Dahua Technology Video Management System
- Bosch Video Management System
- AMAG Video Management System
- Meyertech Video Management System
- March Networks Video Management System
- Hikvision Video Management System
- OT Systems Video Management System
- Eagle Eye Networks Video Management System
- Axis Communications Video Management System
- Video Storage Solutions Video Management System
- Senstar Video Management System
- IDIS Video Management System
- Vicon Video Management System
- Hanwha Vision Video Management System
- Geutebruck Video Management System
- AV Costar Video Management System
- Vanderbilt Video Management System
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download