Tuesday, February 14, 2023

Trends at the intersection of video and AI

Trends at the intersection of video and AI 

Installation and use of CCTV Cameras for security & surveillance is a no-brainer. Cameras are considered a fundamental commodity for setting up any surveillance infrastructure, but at the same time, 24×7 monitoring of hundreds or thousands of video feeds by operators doesn’t serve the purpose of providing proactive surveillance and quick response to breaches.

2022, where most security cameras deliver HD performance, with more and more models offering 4K resolution with 8K on the horizon. Advanced processing techniques, with and without the use of infrared illuminators, also provide the ability to capture usable images in total darkness; and mobile devices such as drones, dash cams, body cams, and even cell phones have further expanded the boundaries for video surveillance. Additionally, new cameras feature on-board processing and memory to deliver heightened levels of intelligence at the edge.

But video has evolved beyond the capabilities of advanced imaging and performance to include another level:  Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise.

This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends:

 

1) Purpose-built performance

Several video analytics technologies have become somewhat commoditised “intelligent” solutions over the past few years, including basic motion and object detection that can be found embedded in even the most inexpensive video cameras. New, more powerful, and intelligent video analytics solutions deliver much higher levels of video understanding.

This is accomplished using purpose-built deep learning, employing advanced algorithms and training input capable of extracting the relevant data and information of specific events of interest defined by the user. This capability powers the automation of two important workflows: the real-time monitoring of hundreds or thousands of live cameras, and the lightning-fast post-event search of recorded video. Vintra video analytics, for example, accomplishes this with proprietary analytics technology that defines multi-class algorithms for specific subject detection, classification, tracking, and re-identification and correlation of subjects and events captured in fixed or mobile video from live or recorded sources.

 

2) Increased security with personal privacy protections

The demand for increased security and personal privacy are almost contradictory given the need to accurately identify threatening and/or known individuals, whether due to criminal activity or the need to locate missing persons. But there is still societal pushback on the use of facial recognition technology to accomplish such tasks, largely surrounding the gathering and storage of Personally Identifiable Information (PII).

The good news is that this can be effectively accomplished with great accuracy without facial recognition, using advanced video analytics that analyse an individual’s whole-body signature based on various visual characteristics rather than a face. This innovative approach provides a fast and highly effective means of locating and identifying individuals without impeding the personal privacy of any individuals captured on live or recorded video.

 

3) Creation and utilisation of computer vision

There are a lot of terminologies used to describe AI-driven video analytics, including machine learning (ML) and deep learning (DL). Machine learning employs algorithms to transform data into mathematical models that a computer can interpret and learn from, and then use to decide or predict. Add the deep learning component, and you effectively expand the machine learning model using artificial neural networks which teach a computer to learn by example.

The combination of layering machine learning and deep learning produces what is now defined as computer vision (CV). A subset but more evolved form of machine learning, computer vision is where the work happens with advanced video analytics. It trains computers to interpret and categorize events much the way humans do to derive meaningful insights such as identifying individuals, objects, and behaviours.

 

4) Increased operational efficiencies

Surveillance systems with a dozen or more cameras are manpower-intensive by nature, requiring continuous live or recorded monitoring to detect and investigate potentially harmful or dangerous situations. Intelligent video analytics, which provides real-time detection, analysis, and notification of events to proactively identify abnormalities and potential threats, transform traditional surveillance systems from reactive to proactive sources of actionable intelligence. In addition to helping better protect people, property, and assets, advanced video analytics can increase productivity and proficiency while reducing overhead.

With AI-powered video analytics, security and surveillance are powered by 24/7 technology that doesn’t require sleep, taking breaks, or calling in sick. This allows security operations to redeploy human capital where it is most needed such as alarm response or crime deterrence. It also allows security professionals to quickly and easily scale operations in new and growing environments.

 

5) A return on security investment

The advent of advanced video analytics is slowly but surely also transforming physical security systems from necessary operational expenses into potential sources of revenue with tangible ROI, or as it is better known in the industry, ROSI – Return on Security Investment. New video analytics provide vast amounts of data for business intelligence across the enterprise. Advanced solutions can do this with extreme cost-efficiency by leveraging an organization’s existing investment in video surveillance systems technology.

This easy migration path and a high degree of cost-efficiency are amplified by the ability to selectively apply purpose-built video analytics at specific camera locations for specific applications. Such enterprise-grade software solutions make existing fixed or mobile video security cameras smarter, vastly improving how organizations and governments can automatically detect, monitor, search for and predict events of interest that may impact physical security, health safety, and business operations. For example, slip-and-fall analysis can be used to identify persons down or prevent future incidents, while building/area occupancy data can be used to limit crowds or comply with occupancy and distancing guidelines. In this way, the data gathered is a valuable asset that can deliver cost and safety efficiencies that manual processes cannot.

 

6) Endless applications

The business intelligence applications for advanced video analytics platforms are virtually endless including production and manufacturing, logistics, workforce management, retail merchandising and employee deployment, and more. This also includes mobile applications utilising dashboard and body-worn cameras, drones, and other forms of robotics for agricultural, oil and gas, transportation, and numerous other outdoor and/or remote applications.
An added benefit is the ability to accommodate live video feeds from smartphones and common web browsers, further extending the application versatility of advanced video analytics.


Indian Army to be equipped with AI-based threat assessment software linked to national databases
The Indian Army will soon get help from artificial intelligence to analyse threats during operations, especially in sensitive areas like Jammu and Kashmir. The ministry of defence is planning to equip the army with an AI-based threat assessment software that can be linked to national databases such as UIDAI and MoRTH.
According to an official communication, this software will be used to “track vehicular movement, monitor online presence of individuals, including on social media platforms, and derive linkages and patterns”.
The software will help the army in tracking and predicting incidents and the reason behind acquiring such a software is that operations require a detailed threat assessment. As of now, details of threat assessment are not available with either security forces or law enforcing agencies but only restricted information is available in the form of registers, both at company operating base (COB) levels and with other headquarters.
“Since the data is either non-existent or is recorded in legacy formats (documents and registers), no methods are available with SF for historic correlation of incidents due to which incidents cannot be tracked or predicted,” the official communication states.
The solution: “an AI-based networked solution that will enable storage and analysis of data to track and predict incidents. Details can be linked with national databases such as UIDAI, MoRTH in order to track vehicular movement, as also monitor online presence of individuals including on social media platforms and derive linkages and patterns”.
The software will have the ability to import data available with other agencies. It will enable central collation of details from various patrols with real-time data visibility at all outstations. According to the MoD, this software will be able to integrate legacy unstructured data available in different formats and provide actionable intelligence by combining different databases through the use of AI and data analytics techniques.
The software application is designed to integrate AI and machine learning (ML) aspects with existing known datasets, thereby giving commanders and staff a comprehensive and common picture with regard to operations intelligence, including the capability to carry out data processing in terms of staff checks, query management, use of business intelligence and visualisation to arrive at a course of actions and also assist in ruling out less viable options.
“As the system is being planned keeping in mind the automation requirements of the Indian Army for intelligence generation, the system will be designed for exploitation by AI and ML aspects,” the MoD said. The software will facilitate display and exchange of information over encrypted and secured internet connection and facilitate day-to-day functioning of operations and intelligence gathering and collating at various headquarters, and also facilitate commanders in decision making by incorporating appropriate inputs.
Adequate security measures will be ensured as per the latest guidelines or policies of army cyber group (ACG) system. It will have NLP (natural language processing) models in English, Hindi, Pashto, Arabic, and Urdu to automatically extract intelligence from generated reports, inputs, open source documents and memos.
It will be capable of conducting video and image analytics for raw camera footage from CCTV cameras, social media videos, images among others. The whole idea is to generate actionable intelligence and ability to do dark and deep web monitoring and analysis.

Wednesday, February 1, 2023

Access Control Commissioning Checklist

Access Control Commissioning Checklist 

All customers are not knowledgeable to understand Access control system. When we are getting order it’s our responsibility to commissioned in proper way. In India maximum system integrator do not follow their own check list and as a result after few month call logging is started. Some call forward to OEM and System Integrator with customer’s blame on products are not good. But no one drilldown about commissioning report. Ultimately system integrator don’t know commissioning also a part of BOQ, yes they put importance only installation. I hope this checklist helps end users, integrators and consultants verify that access control installation and commissioning is complete. Take print edit as per your projects and fill all point. After that attached this with handover documents.

It covers the following sections:

  • Door Hardware Checks
  • Reader Checks
  • Controller Checks
  • Fire Alarm Loop Confirmation
  • Backup Power Compliance
  • RTE and 'Free Egress' Confirmation
  • Door Timing Checks
  • Turnstiles or Gate/Door Operator Checks
  • Credential Enrolment
  • Credential Issuance
  • Database Migration
  • Management Software User Creation
  • Access Levels and Schedules
  • Access Event Notifications
  • Door Held Open / Forced Open Troubleshooting
  • Anti-Passback Troubleshooting
  • Mapping and Custom Reporting Creation
  • Viewing Clients Installation 
  • Integration with VMS and Other Systems
  • Workstation Setup
  • Network Setup
  • Cable Verification

We recommend each person using this customize the list for their own needs / situations. There is no 'one size fits all' checklist but this list is meant to serve as a starting point to make it easier and quicker to build your own.

Door Locks and Hardware

This section covers commissioning of doors and opening locks, strikes, or other electro-mechanical hardware, including mounting and physical considerations.

Physical Operation, For every controlled opening:

  • Check all lock / hardware fasteners or mounts are secure and without play, slack, or gaps exceeding tolerances on installation instructions.
  • Ensure operation of lock is free of binding, grinding, or interference for door or frame features or other components.
  • Close and open door, or operate several cycles, the opening to ensure that no binding or warping is affecting operation. 
  • If Exit Devices are used, confirm appropriate 'Push to Exit' signage is displayed.
  • If Door Closers or Operators are used, confirm electronic access devices do not interfere with operation.
  • Confirm secure installation and function of Door Position Switches/ Contacts/ DPS.
  • Weatherproof and lightly apply grease per specification to mechanical hardware like hinges
  • Ensure any cabling or system wiring is hidden, tucked behind raceway or frames, and is not being pinched or cut by features like hinges.
  • Confirm that accessibility clearances are satisfied and any additional access control devices comply with codes.
  • If standalone, battery powered locks are used, confirm remaining battery life is strong and document commission date of batteries for future reference.

Door Controller Install Checks

  • Confirm that all terminated wiring at controller is secured and terminated without short for each device.
  • If kept in a metal enclosure, ensure panel tamper contacts and panel locks are used.  Gather panel keys for central, secure management.
  • If controllers are located at the door, confirm they are installed on the secure/locked side of the opening and located behind a tamper-resistant or semi-obscured location, such as above tiles at the door.
  • For wireless locks, confirm that all hubs or repeaters are clearly labeled as companions to the separate system readers or controllers.

Free Egress and Fire Alarm Loop Check

  • Confirm that upon fire alarm activation, all door maglocks release and are not powered.
  • Confirm that upon fire alarm activation, all emergency exit doors and openings can be freely opened and are not locked for any reason.
  • Confirm that during normal operating conditions, all 'Request To Exit' devices are located in code compliant arrangements and function properly.
  • Check that any delayed egress openings have specifically been approved by the AHJ, and delays do not exceed 15 seconds, unless specifically excepted by AHJ.
  • Confirm that all Pushbutton style RTE switches are properly labeled and displayed per local code requirements, and directly interrupt power to locks and not controller, unless specifically excepted by AHJ.

Credential Reader Checks

  • Confirm that reader device is securely anchored without gaps to the wall, frame, post, or bollard.  Seal or install trim guards where needed.
  • Confirm 'normal operation' status lights are displayed per intended behavior. (On/Off/Red/Green/Blue, etc.)
  • Confirm audible beep or siren registers when credential is read.
  • Check that reader tamper device is connected and configured.
  • If contactless type reader, present test card to confirm read range meets spec.  
  • If biometric type reader, confirm unit positioning will not be interfered with by environmental features (ie: sun movement, HVAC downdrafts, etc)
  • Confirm that accessibility clearances are satisfied and any additional access control devices comply with codes.

Credential Enrolment

  • Confirm that the only credentials to be immediately carried/used by cardholders are activated, and no batched activation of unissued/ stored credentials is done.
  • Check that each user issued a credential is accurately classified and identified in the access control software.  Include Picture ID images if possible.
  • If credentials are being renewed or exchanged, confirm physical possession, disposal, and deactivation of old credential in system.
  • If biometric credentials are enrolled, confirm multiple digits or templates are enrolled.
  • If multi-factor credentials are issued, confirm that all factors are recorded, active, and valid in the system.

Access Management Software Servers

This section covers commissioning of Management Software servers and appliances, including both hardware/network setup as well as OS and software. Some of these items may not be used depending on OS and access platform. For example, appliances typically do not require OS updates. OEM to OEM process are slight different.

Access Management Software Configuration

  • Configure Unlock, Extended unlock, Door Hold Open, and Relock event periods, as appropriate.
  • Configure user access schedules (e.g., 24/7, 8am-5pm, off-hours, holidays, etc.)
  • Configure user access levels (e.g., Managers, Workers, Visitors, Temporaries, etc.)
  • Confirm Polling Interval, or settings update push duration as prompt and as close to real-time to be accurate as recorded in system.
  • Configure any Maps or floorplans used to display and manage system control points.
  • Confirm successful integration and configuration of features like 'Video Verification', or integration with video surveillance, intrusion, fire alarm, and intercom systems.
  • Configure alarm or event notifications (email, text, etc.)
  • Download and retain copies of all door/controller configurations
  • Confirm any imported databases are clean and without problems if populating access management system.
  • For 'Anti-Passback' rules, ensure that users will not unwittingly or inadvertently cause alarms if they use atypical or uncontrolled openings.

Hardware/Security

  • Document MAC address(es) (often more than one if using multiple network cards), or if hosted/cloud access is used, document hostnames of all remote servers.
  • Assign and document IP address(es) of every networked device, endpoint, or server.
  • Apply latest OS updates (unless not recommended by manufacturer);
  • Create secure admin password
  • Create additional users as specified
  • Test UPS operation and runtime (if supplied);

Network/Security Settings

  • Document Controller and other ethernet-based devices MAC address;
  • Assign and document Controller and other ethernet-based device IP address
  • Update firmware to latest version (or manufacturer recommended/tested if different)
  • Change Controller admin password from default
  • Create multiple users if required (by specification or manufacturer recommendation)
  • Set NTP server and verify time and date;
  • Disable unused services/close unused ports (FTP, telnet, SSH, etc.);

General Server Settings

  • Confirm any requisite services or policies are free to operate and will restore automatically after reboot events.
  • Change access management admin password from default
  • Create operator/user logins
  • If LDAP or Active Directory is used, confirm valid implementation and provisioning of service.
  • Confirm and document any external database connections or dependencies by the access software.

Workstations

This list involves client workstations, including hardware, OS, and access client setup and commissioning. Some of these steps may be omitted if appliances are used. OEM to OEM process are slight different.

  • Document MAC address(es) of each workstation
  • Assign and document IP address(es)
  • Apply latest OS updates (unless not recommended by manufacturer)
  • Create secure admin password
  • Create additional users as specified
  • If dongles or hardware keys are required for client access, document location of key on workstation (e.g., Port Location, Key Serial Number)

Network

This section outlines commissioning of network hardware, including switches, routers, firewalls, etc. Some of these devices may not be used in all systems, or managed by the installing integrator.

  • Document MAC address(es) of each device
  • Assign IP address and document
  • Update switch/firewall/router firmware to latest version
  • Change admin password from default
  • Configure VLAN(s) as required; 
  • Configure QoS as required;
  • Disable unused switch ports as specified
  • Configure SNMP monitoring if required;
  • Configure MAC filtering if required
  • Download and retain configuration for each switch
  • Test UPS operation and runtime for each endpoint, if supplied

Cabling

This section covers commissioning of the access control cabling system, including labeling, supports, aesthetic concerns, and testing. OEM to OEM process are slight different.

  • Label all cables, patch panels, wall outlets, etc., as specified
  • Ensure cables are secured to supports (J-hooks, ceiling truss, etc.)
  • Conceal cables where possible/required
  • Leave properly coiled and dressed service loops at Controller or Switch location and head end as required;
  • Test all terminations and document results as specified
  • Document cable test results as specified (if certification is required)


 If need any expert comment on your projects we can help you free of cost over voice or text.


Sunday, January 15, 2023

Network Video Recorder cum Network Switch

Network Video Recorder "Built-in" Network Switch 

The introduction of a Network Video Recorder (NVR) with a built in network switch confused a good portion of the professional market.  It very much seemed to be something that was geared towards catering to a side of the market that was completely unfamiliar with how an IP camera system is setup and installed.   Not a lot has changed since their original release dates.  Most installers still scratch their heads at the thought of using them, but the fact remains that there is an audience.  For those who aren't looking to educate/teach themselves the way of "proper IP installation," these simple to adapt to NVRs are very appealing.  Having said that, it's equally important to understand what you're getting yourself into with a built in switch.

Cost Comparison

There are two ways to look at cost, but we're going to start with your initial purchase for getting this system up and running.  There's no way to conceal the fact that purchasing an NVR with a built in switch is going to be cheaper.  A standard NVR purchased together with a dedicated PoE switch will probably cost you about 25% more than the alternative.  Because of the somewhat basic nature of network switches, you probably won't notice any difference in performance between the two options.  It really comes down to quality in this case, and you're just going to pay more money for the more proven brands; your built in switches are generally built by an unnamed Chinese manufacturer.

The other way to look at cost is to look towards the future.  Network switches are just as imperfect as everything else.  The most common occurrence is that a network port burns out and is no longer able to be used.  If your warranty has expired, you're now in a position where you're going to need to start spending money to get to a solution.  Depending on how much that damaged switch effects your system, you're left with a couple options.  In the case of a dedicated switch, you can replace the switch entirely or you can purchase another smaller switch as an add-on to make up for malfunctioning port(s).  These can be purchased for as little as $50.  An NVR with a built in switch is not going to have such an easy time.  You can try using a dedicated switch as an add-on, but you're now just setting up your system via the alternate method.  If you still have a demand for the same type of "camera hardwired to NVR" setup and your NVR is out of warranty, you'll now find yourself needing to replace the entire NVR instead of the much cheaper network switch.P

Cable Runs

A built in switch is going to require that you run your cable the same way you would with an analog system.  In this scenario, you're going to be running a cable for each camera all the way back to the NVR to create your hardwired connection. Your cable length is limited, in this case, to the standard 328 feet.

A dedicated switch can potentially have some major advantages here. Thinking that a dedicated switch needs to be placed anywhere near your NVR or router would be a mistake.  It makes the most sense to place your switch as close to the biggest cluster of cameras as possible.  This can make for a lot of short cable runs from IP cameras to switch.  From there, it's just a matter of running a single cable from that switch back to your router.  The end result is that you simultaneously put all of your IP cameras on your network by running that one cable.

This is a rough example of what an installation might look like with a dedicated switch.  Of course your own personal hardware situation might be different, but you should get the concept we're going for.  Installing your IP camera system like this will also double the potential distance you can run your cable.  In addition to your cable length being able to be run as far as 328 feet from cameras to switch, you can also run up to another 328 feet from switch to router.  You can revert back to cost as much as you want, but a dedicated switch is going to give you more capabilities and versatility for your money than a built in PoE switch will.

Reliability

This is mostly a matter of opinion and how much you trust individual manufacturers to begin with.  Dedicated switches are usually going to be found with a name brand printed on them.  You've heard of certain brands like Linksys, Netgear, and D-Link because they have an established reputation.  It's not hard to go online and find out how well these companies are performing.  The internet will contain a plethora of reviews and discussions related to these company's products.  This is all to say that transparency is much easier to find with big brands; the general public doesn't let them keep any secrets.  This makes selecting and purchasing a product a very straight forward and simple task; it just takes a bit of research.

There are those among us who are completely against the idea of owning anything that's "unbranded" under the pretense that they believe it's all junk and lacks in longevity.  The fact remains that a good number of the unbranded devices that people have come to feel uncomfortable with are actually performing, and in some cases outperforming, a lot of the big brand names.  If something like this bothers you, you're going to have a hard time feeling comfortable with an NVR that has a built in switch.  The lower costs of these switches makes them attractive but getting passed the uncertainty of knowing whether or not they're going to perform as needed is not as simple.  Researching an NVR with a built in switch can gain you a general public opinion, but those opinions don't usually cover things like speed tests or information regarding longevity of the product.  This is one of those things you'll likely just have to try for yourself in order to know for sure.

All in all, you have good options for both dedicated switches and built in switches. Doing a little bit of homework/research into the product you’re considering should shed enough light on the subject where you can feel confident with your decision either way.

Compatibility

A dedicated switch, no matter who it may be manufacturer by, is compatible with any IP camera from any manufacturer across the board; no questions about it.  A built in switch relies on information it receives from the NVR to determine compatibility.  This can quickly turn into a problem absent any solution.  If you hard wire your IP camera to your built in switch on your NVR and you find that the camera isn't being detected, you're almost guaranteed to be the owner of an NVR and IP cameras that are probably never going to play nicely with each other, and likely not at all.  There is seldom anything you can do to fix a problem like this. On rare occasions, there's a setting that needs to be toggled somewhere, but don't plan on being this lucky.

You can still have compatibility issues with a dedicated switch, but those problems are usually limited to specific features and not the complete inability to bring up the camera whatsoever.  For example, a HikVision IP camera cannot be accessed by a Dahua NVR if you attach that camera to a built in switch on the NVR.  However, if you connect that same camera to a dedicated switch, you'll very easily be able to add that camera to the NVRs device list, but you'll be missing the motion detection feature without a lot of tampering.  We should mention again that any compatibility issues you encounter with a dedicated switch aren't cause by the switch, but by the manufacturers of the cameras and recorders. We are not promote HikVision / Dahua as both “High" level vulnerabilities. No participation in ONVIF committees for both brands. No access to new ONVIF software. Below media statement.


Sunday, January 1, 2023

Security Trends in 2023

Security Trends in 2023 

Wishing you a very Happy New Year – 2023. Although some of the worst disruption caused by the global Covid-19 pandemic is hopefully behind us, 2023 is shaping up to be another challenging year for business and society. But this year few states going through partial lockdown case to case basis.

Cyber security in physical security:

Adoption of digital technology and internet have also led to increase in cybercrime incidents. It can be controlled or minimized with care, precaution, awareness and with the use of appropriate tools to secure the information. Indian Cyber Crime Coordination Centre (I4C) under Cyber & Information Security (CIS) Division of the Ministry of Home Affairs, has prepared one manual to disseminate Cyber Hygiene Best Practices for the benefit of Industrial Bodies/General Public/Government Officials.

Many large buyers now provide a cybersecurity questionnaire that integrators and solution vendors must complete, leading to creation of new roles in some companies just to respond to such questionnaires that are required in bid processes. Vendors, integrators and the practitioners themselves are simultaneously chasing cybersecurity talent to add to their employee teams, a challenging proposition given the overall difficulty to hire technically skilled workers of any type. Cybersecurity has to be managed on multiple levels, requiring constantly expanding investments in:

·        Device-level cybersecurity (e.g., cameras, readers, panels)

·        Infrastructure cybersecurity (wiring, networks, switches, etc.)

·        Software and Server cybersecurity

·        Configuration cybersecurity (correct implementation of cybersecurity features)

·        Cloud cybersecurity

·        Mobile device cybersecurity (particularly as security and employee bases become more mobile or remote)

·        User cybersecurity (e.g., social engineering attacks, insider threats, etc.)

Security practitioners today seem to have three general choices when it comes to convergence:-

1. Ignore: Disregard the need to converge—a wholly unwise choice, by most accounts.

2. Strongly Interrelated Teams: Continue to manage security in two, separate but equal channels, but strongly define team relationships such that constant open dialogue and cross-investigation exist between the two specialized teams.

2. Fully Converged: Fully merge security leadership and tactical security management to link cybersecurity protections and physical security protections, given converged threat vectors that impact information, data, people and assets.

Artificial Intelligence (AI):

In 2018, a NITI Aayog report stated that India will hold a late-mover advantage in real world application of artificial intelligence (AI). Worldwide, spending by governments and business on AI technology will top $500 billion in 2023, according to IDC research. Moreover AI applications on top of security solutions helps break the boundaries of our industry’s value to practitioners, by embedding non-security applications that take data from the proliferation of sensors of all types to correlate data points or find trends that can save businesses money or enable them to act more swiftly.

In a pre-event discussion with panel lists from an AI panel held at SNG 2022, the expert panel lists (reflecting integrators, vendors and practitioners) indicated they see sweeping AI frameworks coming, but admitted the industry is not yet prepared to define a framework for AI, noting that the technology’s rate of change is likely outpacing our ability to construct implementation frameworks, particularly ethical frameworks.

 

“IN 2023, ARTIFICIAL INTELLIGENCE WILL BECOME REAL IN ORGANIZATIONS. NO-CODE AI, WITH ITS EASY DRAG-AND-DROP INTERFACES, WILL ENABLE ANY BUSINESS TO LEVERAGE ITS POWER TO CREATE MORE INTELLIGENT PRODUCTS AND SERVICES.”

—TRENDS FUTURIST BERNARD MARR, WRITING FOR FORBES IN NOVEMBER 2022

 

Autonomous Devices:

Autonomous devices are a physical form of autonomous technology. Robots, both functional and humanoids, drones and vehicles are a few examples of autonomous devices. Autonomous devices learn from their surroundings and complete tasks without continued human input.

Automation of repetitive security tasks in lower-risk environments (think robots doing automated patrols in unstaffed facilities) and partly about highly responsive situational awareness (flying a drone to a remote or dangerous location for visual input back to the command post), but the real opportunity being seen for 2023 is connecting improved robotics with AI-embedded intelligence to finally put more “autonomous” in “autonomous devices,” some of which required an operator to previously drive the robot. Notably the International Standards Organization narrowly defines robots to not include remote-controlled solutions such as remote-controlled drones and ground vehicles.

Over half a million industrial robots were installed in 2021 according to the International Federation of Robotics (IFR), and that doesn’t even include robots for security applications, which are outside of the scope of the IFR’s annual World Robotics research.

Workforce development:

Workforce development from the societal centric perspective is defined as initiatives that educate and train individuals to meet the needs of current and future business and industry in order to maintain a sustainable competitive economic environment.

In a survey they found attracting skilled labor is a top concern, and there’s only one solution in today’s hyper-competitive labor market: “We must train our own.” Long established as a factor limiting companies’ growth (especially that of the systems integrators), expanding the workforce has become a key focus of organizations like SIA, which partnered with the Electronic Security Association to cofound the Foundation for Advancing Security Talent (FAST) to drive awareness of security industry employment opportunities.

Smart practitioners, particularly larger corporations with extensive security teams, are also hiring talent from their integrators and vendors in some cases, recognizing that they need internal personnel with the skillsets that they once could wholly outsource. Others are instead outsourcing or embedding integrator talent into their organization.

70% of employees work through mobile devices, with 200 million worldwide using mobile business apps. What’s more, 84% of decision makers plan to increase spending on mobile applications that drive employee productivity, reduce costs and enhance customer satisfaction.

The mobile workplace is a place that offers a host of benefits. Its core objective is to make employees as productive as possible, whether they are at their desks, in the field or working remotely. It’s all about equipping staff with the tools they need to do their jobs more efficiently, putting those tools conveniently at their fingertips, and connecting processes so that everything within a business works more cohesively.
 
Smartphone applications will increasingly be employed in 2023 to control physical security systems. Managers will have fingertip control over who has access to certain zones and facilities, and will be able to set those controls from wherever they happen to be working.
 
Security analytics will collate rich data insights from a suite of IoT connected devices, delivering them into the hands of decision makers via their smart devices, helping to inform security and operational strategies.

Data privacy:

Data privacy is the right of a citizen to have control over how their personal information is collected and used. Data protection is a subset of privacy. This is because protecting user data and sensitive information is a first step to keeping user data private. US data privacy laws are regulated at the federal level. Data privacy is typically applied to personal health information (PHI) and personally identifiable information (PII). This includes financial information, medical records, video footage security, social security or ID numbers, names, birthdates, and contact information. You might be surprised to learn that CCTV footage is subject to the GDPR (General Data Protection Regulation).

By 2024, 75% of the Global Population Will Have Its Personal Data Covered Under Privacy Regulations. Ultimately, the practitioner is responsible for ensuring that their data is protected and that systems are used ethically. This had led to pullback from many practitioners on their pace of adoption for some technologies like facial recognition to ensure that they have not only justifiable use cases but the procedures in place to ensure that advanced systems are used responsibly, and that data is only collected when it is needed.

Contactless security:

Contactless technology has become hugely important post-Covid, due to the strong reaction against physical contact. It’s also about the user experience, with people increasingly wanting things to be instant and simple.


Contactless security is therefore, unsurprisingly, becoming more commonplace. Biometric access, using the likes of fingerprints, iris scans and facial recognition to identify authorised personnel for physical access into a building or specific part of it, is already becoming the norm, whilst other contactless entry technologies that are set to be even more widely adopted during 2023 and beyond include Bluetooth Low Energy (BLE), and smartphone NFC (Near Field Communication) keyless entry, as well as QR code entry for temporary access.


For added security, multi-factor authentication (MFA), the use of more than one method of identification, is likely to become more widely adopted, as organisations batten down the hatches, making it harder for would-be unauthorised entrants to gain access.