Technologies such as occupancy management, automated visitor management and touchless access control applications are increasing in demand – turning up the dial on interoperability as organizations seek to deploy best of breed solutions. To power these technologies, Artificial Intelligence (AI), cloud storage and the Internet of Things (IoT) are driving new functionalities and new uses from existing technologies to deliver customized applications for pandemic related health, safety and security issues. While this year might bring a number of uncertainties, we remain confident that the industry will continue to see growth and demand for these trends.
How will artificial intelligence (AI) transform video surveillance in 2021? Below, we speak to Satish Raj, CTO of Pro-Vigil, who believes AI in digital video surveillance systems will become much smarter next year, to the point where it will be able to actually predict crime before it happens.
An example of how businesses are benefitting from integrated cloud-based systems would be in the retail industry. Retail end users have integrated their security camera network, heat-mapping and video analytics technology with a cloud-based system so they can remotely monitor who is in their store. The heat-mapping and analytics technology also showcases where customers are spending the most time in their store, providing retailers with insight as to where they can place specific item displays or promotional items. This information can also be used to inform on if a specific location in a store needs additional signage to encourage social distancing, or even if it needs increased camera coverage within a store. The practical applications of integrated cloud-based systems and other security technology are nearly endless.
Check out the latest innovative technology and products designed to reduce risk, tighten COVID-19 pandemic response, and enhance the value of safety and security within various sectors.
Check out the latest innovative technology and products designed to reduce risk, tighten COVID-19 pandemic response, and enhance the value of safety and security within various sectors.
Your next home will be connected in creepy ways. It will take a while, but eventually every machine and device in your house will talk to everything else, and Consumer Electronic Show (CES)-born inspiration will be at their roots. From e-toothbrushes to connected e-toilets that can detect a health issue (Really!), the items in your home will be controlled via the internet and will be everywhere. But what does that mean for security?
How can electronic access control solutions and other devices like biometrics technologies be configured to help mitigate unauthorized entry through swing doors and turnstiles? Here, we’ll take a look at swing doors and turnstiles first, then the high security revolving doors and mantrap portals.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, will be upgrading and enhancing its security system.
Technology company Clearview AI’s scraping of billions of images of people from across the Internet represented mass surveillance and was a clear violation of the privacy rights of Canadians, the Office of the Privacy Commissioner of Canada has found after conducting an investigation into the matter.
As we move past an unprecedented year of change, everyone is eager to see what 2021 has in store. For those in the security and surveillance space, of particular interest is how video content analytics might evolve to support emerging use cases. In that vein, Deep Learning and Predictive Analytics are among the key technologies that will continue to benefit video surveillance solutions development and adoption in 2021 - here's why.
The National Security Agency (NSA) has released an information sheet with guidance on adopting encrypted Domain Name System (DNS) over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), referred to as DNS over HTTPS (DoH). When configured appropriately, strong enterprise DNS controls can help prevent many initial access, command and control, and exfiltration techniques used by threat actors.