Items Tagged with 'video analytics'

ARTICLES

How to Gain Business Value from Biometric Analytics

Though biometric analytics have been around for a few years now, Apple and Samsung’s recent introduction of fingerprint readers to their newest mobile devices prove that biometric security systems are going to be more and more commonplace in the public sector. The research organization Goode Intelligence estimates that biometric authentication will be on most mobile devices by the end of 2015 and that by 2019, it will be used by 5.5 billion people worldwide. Familiarity with biometric analytics means ease of use for employees and consumers alike.


Read More

Intelligent Video for Intelligent Enterprise Security

What makes video intelligent? For MARTA, Atlanta’s rapid transit authority, it’s having an intelligence-based analytics solution that teaches itself to recognize and alert on unexpected patterns within massive volumes of data, continues its rapid growth in the mass transit industry as more agencies choose to implement the award-winning behavioral recognition software as part of their public safety initiatives.


Read More

Boosting Detection with Video Analytics

Can a high-tech, high-cost video surveillance system be wasted on its monitors?

According to Royce Jeffries, the VP of Security Risk Management for Cornhusker Bank, the area had been affected by “lane gang crimes” – thieves break into vehicles or homes to take wallets and checkbooks. Then they drive to the bank with a check and the account holder’s ID, go to the furthest drive-through lane, often in disguise, and try to cash checks.


Read More

Monitoring Operations from a Distance for Safer Operations

What are other ways that you can communicate use cases and savings to get buy-in from other departments?

Using cameras can provide a viable alternative, when combined with analytics, to bypass other infrastructure-heavy tools, such as adding fiberoptic cable to perimeter fencing to detect intruders or trenching for driveway sensors or barricades, giving Taminco and the security system an overall smaller footprint.


Read More

Making Surveillance a Business Intelligence Necessity

There are two types of successful CSOs today: those that have cross-purposed their investment in video surveillance, and those that will.

In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and track POS transactions that differ from the norm.


Read More

How Will Big Data Change Security?

In the first part of this series (published in April 2013) we discussed some of the major technologies that will play a role in the application of Big Data to the practice of physical security.

In the first part of this series (published in April 2013) we discussed some of the major technologies that will play a role in the application of Big Data to the practice of physical security.


Read More

EVENTS

Webinar

Best practices for creating a safe campus environment using Integrated Surveillance Technology

8/19/14
Online!
Contact: Adam Thomas

On Demand Sprawling, campus-like properties pose unique security challenges. This webinar will address why a layered approach is best when addressing the needs of campus security, as it relates to a wide range of verticals, including corporate, municipal, healthcare, hospitality and education.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine March 2015 issue cover

2015 March

In this March 2015 issue of Security check out our product preview of ISC West 2015. Also, learn how to make the best use of your security technology by working with your security integrator, get info on penetration testing, and discover how white glove security can enhance bottom line real estate value.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.