By Benjamin O. Powers
Last week more than 7,500 visitors and 300 leading brands—including PatriotOne— converged on the Jacob Javitz Center in New York for the International Security Conference and Exposition East. As the Northeast’s largest security trade show, it featured nascent and emerging technology, a variety of physical security distributors, and a variety of IT security and backend integration options. Here are our three biggest takeaways.
Video companies are rushing to integrate AI analytics
A wide variety of vendors showcased new products that integrated AI into video surveillance, from real-time tracking of individuals to facial recognition, identity management and weapons detection. In some cases the additions were so new that sales representatives couldn’t quite explain how the tech worked.
The thirst for knowledge was pervasive. Of the top five most attended sessions, two involved AI and video surveillance—“AI for Video Surveillance: Technology Overview and Future Directions” and “Video Analytics: The Next Advance in Secure Access Control.”
The latter session addressed some best practices for overlaying AI analytics into video systems. To start, AI need only be installed on key cameras, but those cameras should be properly installed to examine faces at the correct angle. Second, installers should consider how changing in lighting throughout the day might affect video input. Finally, while folks are more likely to share their face for identification versus a fingerprint, the best companies will offer an opt-in advantage—even if it’s simply convenience.
Patriot One Magazine has previously written about how computer vision is being used to spot weapons. But it’s application is likely to grow and evolve as more facilities embrace the tech.
Security chiefs want to know how to put the pieces together
Among the wide array of offerings at ISC East, attendees were particularly interested in the ways they could bring their disparate security systems and products under one umbrella. This is why “Implementing Converged Security, a Process – Bringing it All Together” along with “Achieving Comprehensive Facility Security” were two of the most attended sessions at the conference.
Traditionally, facility security has been aggregated in a piecemeal fashion. The CCTV, badges, sometimes PIN codes, and security guards companies use to ensure only authorized personnel enter their buildings are rarely linked on the back end. That’s a problem, said IDEMIA National Security Solutions Program Director Chris Centamore, because those systems are not communicating in real time, opening security gaps in and around the facility.
Centamore proposed that more comprehensive solutions, such as, video ID, facial recognition, pattern of life data (which lets you know when someone is deviating from their typical routines), and license plate recognition, connected through one holistic system, can help address some of the concerns that arise from disjointed security systems. He also was quick to mention that these sorts of products can come into conflict with regulations like GDPR, and that users should make sure they’re in compliance with their local and national regulations.
Both in terms of GDPR, other local regulations, and making sure security systems are communicating with each other in real time, these are areas that will only garner more attention in the coming years.
Drones, and how to regulate them, are the subject of an ongoing debate
Drone—and anti-drone—technology drew significant interest at the show. Angela Stubblefield, Chief of Staff at the Federal Aviation Administration delivered the second day keynote address, discussing how the organization approaches UAS security. While the large majority of UAS pilots operate in good faith, rogue drone operators have been known to disrupt security at major airport, deliver contraband inside prison walls and more.
Strong regulations are key to regulating the 1.4 million registered drone pilots operating in U.S. airspace, but Stubblefield noted that these nascent guidelines are constantly evolving. The FAA is developing technology like remote IDs, that allow a drone’s user to be identified from a distance to help with some of the security risks that drones pose. Likewise, while there are a number of commercial suppliers of anti-drone technology, only the FAA or military are authorized to engage with suspicious drones.
Overall, these are the areas that stood out at ISC East this year, and point to some of the industry trends we will continue to see in the future.