securitylinkindia

Hikvision_Retail Leadership_Summit_2018

Hikvision participates at Retail Leadership Summit 2018

Hikvision has participated in the 11th edition of Retailers Association of India’s (RAI) recently held Retail Leadership Summit (RLS), Mumbai to showcase its latest products and solutions in the video surveillance and security domains for the retail sector. The Retail Leadership Summit (RLS) was flagged off with an inspiring opening speech by B.S. Nagesh, Chairman, RAI and Founder, TRRAIN. The Summit revolved around the central theme ‘Customer Centricity- Redefining Values and Valuations. “Retail Leadership Summit (RLS) is a great platform for networking among existing and potential retailers, developers, logistics and supply chain organizations. It is a right place to showcase the latest innovations in the surveillance and security solutions for retail and eCommerce sector,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. At the event, K.K. Dakhara, Retail Vertical Head, Prama Hikvision India gave a presentation on Hikvision’s new solution for warehouse, logistic and supply chain and explained their advantages. “Hikvision retail smart solution focuses mainly on analytics, consumer behavioral analysis and artificial intelli gence. It is useful in multiple aspects such as retail business surveillance, manpower management, business operations, selection of appropriate product based on target customer, designing marketing plan and loss prevention,” said Mr. Dakhara, “The wide applications of machine learning and DeepinMind technology will set the trend for the retail industry by getting critical data and deep insights from consumer behavioral analysis.” “The Retail Leadership Summit has been created to ensure that retail leaders across the country can come in and discuss matters that are relevant to retail at industry-level. Modern retail in India is becoming more and more competitive and is growing at more than 15 per cent. This kind of growth requires a different focus for retailers to be able to exist and thrive. RLS is about customer centricity and the resulting valuation. However, the values that a company works with are an important contributor to the way a company gets formed and functions. The three aspects i.e., customer centricity, values and valuation are an apt set of topics for every retailer who is trying to grow and flourish in this consumption-led market,” said Kumar Rajagopalan, CEO, Retailers Association of India. Hikvision also displayed their retail solution at a booth there. The visitors were keen to know more about people count, heat map, POS integration, face analysis, parking management solution, and warehouse, logistic and supply chain solutions. The event turned out to be a good platform for Hikvision’s retail solutions for promotions and getting enquiries.

Read More

Smiths Detection Meets Highest Security Standards in EU

The Smiths Detection HI-SCAN 10080 XCT has achieved ECAC approval as a Standard 3.1 explosives detection system for hold baggage – the highest, defined security standard in the EU. This significant advance was made possible by using a dual-view, dual-energy line scanner with high resolution 3D Computed Tomography (CT) to deliver exceptional data. This achievement gives airports currently upgrading to Standard 3 technology, the option to increase detection levels even further to 3.1; and any standard 3 systems already installed can be easily elevated to 3.1 via a software upgrade. The detection algorithms are interchange able on a bag by bag basis depending on the destination and associated risk level. This offers additional flexibility and productivity. “With the capability to meet detection requirements for both current and emerging threats, the HI-SCAN 10080 XCT is a future proof investment, which offers high levels of security and operational efficiency,” commented Matt Clark, VP Technology and Product Development, Smiths Detection, “We are helping airports across Europe to make the transition to Standard 3 and are delighted to now also offer the more stringent Standard 3.1 approved technology.” The belt speed is an impressive 0.5m/sec, enabling the HI-SCAN 10080 XCT to handle up to 1800 bags per hour and hence making the screening process faster and more efficient. A large rectangular tunnel (107x81cm), extremely high quality, full colour images and a low false alarm rate all also support the challenging performance levels demanded by airports. In addition to Standard 3.1 approval, the HI-SCAN 10080 XCT has been laboratory certified by the US Transportation Security Administration (TSA) as meeting current regulatory requirements for hold baggage.  

Read More
nist

Safeguards for Securing Virtualized Servers By NIST

This bulletin outlines the security recommendations that NIST recently provided in Special Publication (SP) 800-125A – security recommendations for Hypervisor Deployment on Servers. The document provides technical guidelines about the secure execution of baseline functions of the hypervisor, regardless of the hypervisor architecture. In the past, a user wishing to set up a computing server generally needed to use a dedicated host with dedicated resources such as a central processing unit (CPU), memory, network and storage. Modern systems have technology that lets one create virtual machines to emulate what used to be physical, dedicated resources. This practice is known as virtualization and supports more scalable and dynamic environments. A critical component of this technology is the hypervisor, the collection of software modules that enables this virtualization and thus enables multiple computing stacks – each made of an operating system (OS) and application programs – to be run on a single physical host. Such a physical host is called a Virtualized Host and is also referred to as a Hypervisor Host. The individual computing stacks are encapsulated in an artifact called a Virtual Machine (VM). To make a VM an independent executable entity, its definition should include resources such as CPU and memory, allocated to it. The VMs are also called ‘Guests,’ and the OS running inside each of them is called ‘Guest OS.’ The resources associated with a VM are virtual resources, as opposed to physical resources associated with a physical host. The hypervisor forms part of the virtualization layer in a virtualized host and plays many of the same roles that a conventional OS does on a non-virtualized host, or server. Just as a conventional OS provides isolation between the various applications, or processes, running on a server, the hypervisor provides isolation between one or more VMs running on it. Also, like an OS, the hypervisor mediates access to physical resources across multiple VMs. Therefore, all other functions needed to support virtualization – such as emulation of network and storage devices and the management of VMs and the hypervisor itself – can be accomplished using kernel-loadable modules, although some hypervisor architectures accomplish these tasks using dedicated VMs. The hypervisor can be installed either directly on the hardware, or bare metal (Type 1 Hypervisor), or on top of a fullfledged conventional OS, called Host OS (Type 2 Hypervisor). Here, we discuss the baseline functions of a hypervisor, how these functions are distributed in a hypervisor, and how this information is used to develop security recommendations that provide assurance against potential threats to the secure execution of tasks involved in the hypervisor’s baseline functions. Hypervisor baseline functions It might appear that all activities related to the secure management of a hypervisor and its hardware host – collectively called the hypervisor platform – should simply consist of established best practices for any server class software and its hosting environment. However, closer examination reveals that the unique functions provided by the Hypervisor Platform require a dedicated set of security considerations. These functions are called hypervisor baseline functions (HY-BF) and are labeled HY-BF1, HY-BF2, HY-BF3, HYBF4, and HY-BF5. They are described below: HY-BF1: VM process isolation Scheduling of VMs for execution, management of the application processes running in VMs (e.g., CPU and memory management), and context switching between various processor states during the running of applications in VMs; HY-BF2: Devices mediation & access control Mediates access to all devices (e.g., network interface card [NIC], storage device such as IDE drive etc). One mediation approach is to emulate network and storage (block) devices that are expected by different native drivers in VMs by using emulation programs that run in the hypervisor kernel; HY-BF3: Direct execution of commands from guest VMs Certain commands from Guest OSs are executed directly by the hypervisor instead of being triggered through in terrupts and context switching. This function applies to hypervisors that have implemented para-virtualization instead of full virtualization; HY-BF4: VM lifecycle management This baseline function involves all functions from creation and management of VM images, control of VM states (start, pause, stop etc), VM migration, VM monitoring, and policy enforcement; and HY-BF5: Management of Hypervisor This baseline function involves defining some artefacts and setting values for various configuration parameters in hypervisor software modules including those for configuration of a Virtual Network inside the hypervisor. NIST SP 800-125A provides detailed security guidance based on an analysis of threats to the integrity of all the above functions. The only exceptions are the set of guidelines for configuration of virtual network (subset of HYBF5), which are covered in a separate document (NIST SP 800-125B). The above functions are carried out by different hypervisor components, or software modules. There are some minor differences among hypervisor products in the way that they distribute these functions. The mapping of these functions to hypervisor components and the location of these components within a hypervisor architecture are described in the table below: Approach for developing security recommendations Developing security recommendations for the deployment and use of a complex software such as the hypervisor requires knowledge of potential threats which, when exploited, would affect the three basic security properties – confidentiality, integrity, and availability – of hypervisor functions. The approach adopted for developing security recommendations for the deployment of hypervisors in NIST SP 800125A is as follows: Ensure the integrity of all components of the hypervisor platform, starting from the host BIOS to all software modules of the hypervisor. This action is accomplished through a secure boot process, outlined as recommendation HY-SR1; Identify the threat sources in a typical hypervisor platform. The nature of threats from rogue or compromised VMs is briefly discussed in SP 800-125A; and For each of the five baseline functions HY-BF1 through HY-BF5 (except for HY-BF3, the direct execution of certain commands from guest VMs by the hypervisor), identify the different tasks under each function, and for each of the tasks, identify the potential threats to the secure execution of the task. The countermeasures that will provide assurance against exploitation of these threats…

Read More
IHS Markit

Global Access Management Market By IHS Markit

Access management can be defined as the process of granting authorized users the rights to use a service, while preventing access to non-authorized users. Following are the key access management growth factors over the next five years. GDPR deadline fast approaching Traditionally, finance, banking, insurance, government, utilities and other heavily regulated end-user sectors have focused on identity- and accessmanagement solutions. However, over the past year there has been growth in non-traditional markets. Not only have the manufacturing and retail sectors become more security conscious, but the increase in the number of data breaches and the looming legislation around General Data Protection Regulation (GDPR) in May 2018 has also piqued renewed interest in security and identity and access management (IAM) solutions. ● Highlight ● The global access management market is projected to increase from $5.4 billion in 2016 to $9.6 billion in 2021. ● Companies with 5,000 or more employees are projected to contribute the largest revenue growth to the access management market over the next five years. ● Over the past year, there has been growth in non-traditional market sectors such as manufacturing and retail. Smaller organizations using access management solutions Access management solutions have traditionally been deployed by larger organizations. In fact, companies with 5,000 or more employees are projected to contribute the largest revenue growth over the next five years, increasing from $4.38 billion in 2016 to $5.4 billion in 2021. The proportional importance of this segment is forecast to decline from 80 percent of total access management revenue in 2016 to around 56 percent in 2021. Small and medium-sized enterprises (SMEs) will steadily increase the amount of access management solutions they deploy. For example, revenue from companies with between 1 and 499 employees is projected to increase from $109.6 million in 2016 to $705 million in 2021. This segment managed to grow from 2 percent of total revenue in 2016 to 7.3 percent in 2021. The introduction of more cloud solutions within the access management market is likely to help SMEs, in particular, because cloudbased access management solutions can be more cost effective and scalable for small and medium enterprises. On-premises hybrid and cloud solutions As there are still a lot of applications running on premises at companies, a significant portion of larger organizations still want some on-premises solutions. Larger organizations are more likely to move to a hybrid model, with some applications running in the cloud as a stepping stone toward full adoption of cloud solutions. Hybrid solutions are projected to increase from $1.1 billion in 2016 to $1.7 billion in 2021. In contrast, smaller organizations are more likely to deploy software-as-a-service (SaaS) solutions, which for them can be more cost effective than on-premises solutions. Technological developments and the battle with hackers There is a continuous battle being waged as hackers increasingly try to gain control of the networks they want to compromise. It is important for organizations to take into account people’s locations, to help detect fraudulent activity and ensure the right people have the right access, at the right time and at the correct location. Technologies like machine learning (ML) and artificial intelligence (AI) are also important weapons in this battle. Leveraging emerging technologies, such as behavioral biometrics, will help to reduce the burden on end-users and increase the validity of identity proofing. Organizations can learn a lot about how people interact with their networks, to give a full picture of how things are evolving, but these technology developments are a bit of a cat-and-mouse game. Blockchain makes security cheaper and more accessible Many organizations have isolated and centralized identity management systems, but the current landscape demands federation and single sign-on (SSO). These systems make identity management, protection and verification very cumbersome, costly and risky for industry enterprises and government agencies. Blockchain has the potential to introduce improvements that can make security more accessible and budget friendly. With smart contract capabilities, there can even be a secondary market where users benefit from sharing resources back to the network. Smart contracts automatically execute pieces of code carrying valuable data or performing other condition-based executions. A permissioned blockchain technology provides core capabilities that enable a trusted digital identity network to build and operate the following: A shared, append-only ledger, with one version of the facts shared across all permissioned network participants in real time. Smart contracts that ensure verifiable and signed business logic is executed in each transaction. Trust between known participants, to verify transactions and ensure records are valid. Privacy and security measures that grant access only to permissioned parties. Cybersecurity – Access Management Report 2018 This two-volume report provides coverage in several key areas of the identity and access management market, including access management and identity governance and administration. It provides detailed analysis of individual vertical markets from market-specific operating models to key trends and development opportunities.

Read More
quantum

Top 7 Reasons for using A Multi-Tier Storage Solution

Lower storage spend Organizations are keeping as much as 40% of their inactive data on their most expensive infrastructure. With unstructured video growing exponentially, fueled by the rise of new video surveillance programs, one can’t afford to have this kind of inefficiency. The solution is to adopt a multi-tier storage system that automatically migrates the video to the most cost efficient tiers of storage. Whether that’s high-performance disk storage, object-based storage or high-capacity primary storage, file-based tape or the cloud – the organization can cost-effectively store data based on various policy requirements. Easy, immediate access Finding a file in the system should be no more difficult than finding a document on a C: drive.           Quantum’s solution for video surveillance is a single file system, built specifically for video applications. On the backend, retention and access policies can be set to handle data migration and simplify organization and file recall. High performance Storage performance that performs inefficiently prevents companies from capturing usable data. Quantum’s StorNext software retains data cost-effectively, supports complex video management systems and analytic applications, and ingests video from 4 times as many cameras per server to deliver time-to-decision results, allowing proactive protection and crime prevention. Quantum’s storage infrastructure not only handles this sheer volume of data with ease, but also delivers streaming performance regardless of whether it’s on disk, tape, or in the cloud. Scale with storage needs The ability to seamlessly integrate more sources of information into modern analytical tools is becoming more important, as is the capacity to scale and accommodate increased camera and sensor counts, panoramic coverage and higher image resolution. As more cameras are added, image resolutions increase and retention times become longer, Quantum’s solution can scale to handle the need for more capacity. Compliant with current infrastructure Quantum’s storage solutions support all major platforms, operating systems and networks, and      integrate seamlessly with VMS and other systems. This enables security professionals to integrate the solution into their existing infrastructure without being locked into a  single vendor or platform as well as to configure the file interface to receive input from a variety of devices and systems. No trade-off necessary To gain more insight and an increased return on investment from video surveillance data, a storage solution must balance high performance, high capacity and high retention. These three parameters can be flexed to provide the best trade-off between budget and mission whilst minimizing sacrifice of redundancy, accessibility or scalability. Gateway storage architecture Upgrading storage capabilities while also satisfying budgetary restrictions is a challenging part of building a comprehensive storage infrastructure. Instead of replacing the pre-existing storage system, why not build onto it? Artico™ offers an easy, nondisruptive choice for adding Quantum tape, FlexTier™, and Lattus™ scale-out storage to an existing security environment. Quantum’s StorNext platform is a policy-driven tiering software, allowing users to extend primary storage with scalable, more cost-effective tiers of storage. Our multi-tier solution is ideal for security and surveillance organizations with large amounts of video dealing with the challenges that come with scaling storage with your data growth. End users can set up policies to automatically migrate data across tiers, utilizing less costly types of storages like file-based tape and cloud, thus delivering the total capacity needed more cost effectively.  

Read More

ZICOM Expands ‘Make Your City Safe’ Initiative to Telangana

Zicom, one of the pioneers in the electronic security industry, is expanding its citizen-safety initiative ‘Make Your City Safe’ (MYCS) to the state of Telangana towards making the state safe. The company has recently signed an MoU to launch the citizen safety mission for Telangana in the honorable presence of Home Minister Naini Narshimha Reddy and other influential stalwarts by the name of ‘Make Telangana Safe.’ Zicom launched Mission ‘Make Your City Safe’ in 2012. It is a Zicom SaaS initiative to make housing societies, schools and hospitals more secure by equipping them with high quality CCTVs that require ‘zero investment, zero management.’ Apart from providing hardware, the company also undertakes the responsibly of monitoring the health of their security systems and offering free-of-cost services to ensure the smooth functioning of their products. With currently over 4500 buildings coming under the MYCS banner, Zicom looks forward to a safer and better urban lifestyle to become a reality. Taking this initiative to another level by extending the mission to cities across the country, Zicom SaaS has recently partnered with TITA and Digithon to create a robust digital ecosystem that not only monitors but also prevents crime in Telangana. Currently the initiative encompasses the cities of Hyderabad, Varangal, Karimnagar, Adilabad and Nalgonda. Today Zicom’s initiative has its presence across 7 cities (8th being the cities of Telangana) by the names of Make Mumbai Safe, Make Pune Safe, Make Navi Mumbai Safe, Make Thane Safe, Make Hyderabad Safe and Make Ahmedabad Safe As the part of the upcoming phase Zicom plans to cover the whole of Telangana followed by other states as well. The company is also exploring for possible associations. Under the ‘Make Your City Safe’ initiative, Zicom will offer a broad spectrum of security solutions on Security-as-a-Service model. Additionally, the company is also exploring the idea of establishing their local command center to support ‘Make Telangana Safe’ initiative and to help citizens connect all buildings for monitoring and proactive prevention of crimes. The key benefits of Make Your City Safe are mentioned below: The hardware and software costs are to be borne by Zicom – users have to pay for the services only. No worries about the functioning of the system, Zicom assures that the system will function 24×7, 365 days. No financial burden – Easy payment option that doesn’t need the society to block any funds for buying CCTV system. No annual maintenance contract – It is Zicom who maintains the CCTV system and also takes care of repairs and replacements. No confusion on what is best for customers – Free security assessment by experts that helps one choose the right security solution. Always accessible – 24×7 technical/ after sales support enables customers to stay connected.     We, at Zicom SaaS, have been committed towards the cause of citizen safety through our mission ‘Make Your City Safe’ since 2012. MYCS has earned Zicom the responsibility of providing safety and security to over one million satisfied residents across the country. With the spread of cities, and many cities turning into smart cities in the next one decade, Zicom sees a larger role for itself as a major security service provider to them. MYCS is the one step forward towards fulfilling that responsibility. We believe, through this initiative, the authorities have set an example for other states as well on how the power of technology can be used to prevent crimes and ensure the safety of citizens – Pramoud Rao Founder & Managing Director of Zicom SaaS Pvt. Ltd.  

Read More
CCS SurfacePro

Honeywell Command & Control Suite Release 200

Honeywell has introduced its latest smart building technology, Command and Control Suite release 200 (CCS R200), which connects building personnel with data analytics to help drive operational improvements and efficiencies. CCS R200 builds on the original Command and Control Suite by offering more user interfaces to bring building performance data to key personnel, when and where they need it – from building operators and managers to security incident response teams – helping to reduce operational costs, mitigate risk and enhance business continuity. CCS R200 combines intelligent automation, advanced analytics and data visualization with the contemporary user experience of consumer home and mobile electronics, bringing simple, intuitive displays to building operations to enhance facility and security management in an easy-to-understand manner. The latest release brings the holistic integration, mapbased visualization and incident workflows of CCS to the control room works t a t i o n , desktop PCs and windows tablets, extending the software’s mobile, touch-optimized experience to more interfaces. This creates a seamless hub of information pulled from IT networks, building control systems and outside sources, which allows for better incident response and operational decision-making. “The value of a building’s data is dependent on how easily the right people can access and understand it. As today’s operations become increasingly data-driven, it’s imperative for organizations to ensure they’re taking steps to make this data accessible and actionable to those who need it in order to do their jobs such as security personnel, building operators and C-suite executives,” said John Rajchert, President of Building Solutions, Honeywell Home and Building Technologies, “That’s why we chose to develop more interfaces and software mobility functions with CCS. We’re providing additional ways for key personnel to tap into key building insights so they can keep systems up and running and optimize building operations.” Building off the basic components of the original Command and Control Suite, CCS R200 is designed with the same ease of use as the Command Wall, which was designed as a collaboration and team decision-making tool, and features map-based visualization and navigation from a single intuitive touch screen. CCS R200 brings that same ease of use to core operational interfaces, the Command Station and Command Console, extending an organization’s ability to turn complex data into easy-to-implement changes to enhance overall building operations. The Command Station is a single window, single monitor interface, designed for a desktop PC, laptop and Windows tablet, and is often ideal for facility technicians, security guards and management as well as for casual use by occupants. It allows even inexperienced users to quickly understand the overall situation at a glance by pro viding unique insights in a straightforward manner, while allowing expert users the ability to drill down to technical detail and full system control. The Command Console, in contrast, is a premium multi-window, multi-monitor interface designed for engineers, control-room operators, and building mangers, and others who need to view insights from multiple systems and areas of a building simultaneously. It seamlessly integrates with Honeywell’s digital video manager console to access and provide a view of video footage and corresponding data for improved operational decision-making. In addition to new interfaces, CCS R200 includes enhancements to the original system’s incident workflow feature, which guides users through scripted responses to security incidents and other emergencies. The enhancements include map visualization to clearly locate an incident, such as a fire alarm going off, to quickly identify the exact location. Integrated with the underlying control system, workflows can be initiated by system alarms and procedure steps can include operatorinitiated control actions such as announcement, equipment start up, door release and other actions depending on the needs of the incident. Additionally, with CCS R200, organizations can issue multiple Incident Workflows, which can be managed by different people in order to promote efficiency and overall security. CCS R200 integrates with Honeywell’s flagship building management platform, Enterprise Buildings Integrator (EBI), which helps facilitate the integration of security, comfort, life safety and energy systems among other functions. CCS R200 is available now.

Read More
cp_plus

CP PLUS Launches First Manufacturing Facility in India

CP PLUS is bolstering its production in India by opening its first dedicated manufacturing plant in Andhra Pradesh, India. They are setting up the manufacturing facility under the Honorable Prime Minister’s ‘Make in India’ initiative which lays a lot of emphasis on R&D and local development of goods. Established in Chitoor, near Tirupati, Andhra Pradesh, the state-of-the-art facility is equipped with world class technology for manufacturing a wide range of security and surveillance products to cater to the needs of government, defense, navel and key infrastructure projects which is ideal for Indian environment and various challenges. The facility has also indigenous R&D and Test Lab to ensure stringent quality standards and innovations of the products. With a productions capacity of 2.4 million cameras and 0.6 million recorder per year which is scalable to 6 million cameras and 2 million recorders, the new plant enables CP PLUS to upsurge its production capacity in India and to serve its consumers better and more effectively. Commenting on the launch, Aditya Khemka, Managing Director, CP PLUS India and Aditya Group said, “Security is a huge concern in India presently and CP PLUS intelligent solutions will go a long way in taking preventive steps towards a safe and secure world. This investment demonstrates our ambition to grow in the important Indian surveillance and security market. We are also designing some unique products and solutions indigenized to meet the dynamic needs of our customers.” The state-of-the-art manufacturing facility boasts of a robust R&D lab that is equipped with the latest technology to create and test breakthrough technologies and product. CP PLUS also aims to create hundreds of jobs through this initiative. Over a time, as the production expands, the demand for skilled workforce will also increase.  

Read More
matrix cosec face recognisation

Matrix COSEC Facial Recognition

Matrix has recently unveiled its indigenously designed COSEC Facial Recognition. Matrix COSEC Face Recognition is based on innovative, deep learning technology, which evolves as per regular user interaction in different conditions. It identifies a user quickly and accurately with 1:1 or 1:N identification method. The technology checks liveness of a face with 99.53% accuracy. It accepts the user’s mobile as a credential, which eliminates hardware cost and makes the verification process simple and secure. With contactless authentication, Matrix COSEC Facial Recognition technology reads the user’s face through COSEC APTA application. It ensures contactless authentication and identifies user’s face in < 1 second.  It eradicates the issues of identifying varying height of user(s) as the user needs to capture the image of their face in a smart phone for authentication process. Moreover,it works well even in low bandwidth conditions and is agnostic to changes in facial hair, angles and lighting. “Matrix Facial Recognition is a powerful tool conceived with liveness detection method. It has the ability to read beyond the surface of the skin and identifies real skin within fraction of a second. With the addition of these unique biometric technology in our range of security solutions, we want to weave our image as a company manufacturing solutions catering to different verticals for various access control and time-attendance applications,” commented Jatin Desai, Product Manager, Access Control and Time-Attendance, Matrix. Smartphone as an identity: By installing COSEC APTA application in their smartphone, users’ mobile becomes a biometric device for timeattendance and access control applications. Identification or verification is done through capturing an image of their face through the phone’s camera which in turn marks their attendance. Ease of face enrolment: The user face enrolment is done by capturing the image of a user’s face from different angles, which gets stored in COSEC CENTRA/ VYOM database. Unique enrolment: Due to unique technology of TRAIN feature in COSEC APTA, user’s face can get easily recognized in dynamic and uncontrolled environments. With TRAIN feature, user can add many images of their face for error free facial recognition. . ● Face recognition: It works on 1:N authentication method wherein, a user’s face is compared with the facial images in a database of stored records. Face detection: It works on 1:1 authentication method wherein, a user’s face is verified against the logged in ID of the user. Dual security: For strong authentication, user’s face is verified after establishing bluetooth connectivity with the assigned door for accessing the door assigned to respective user. Location tracking through GPS: To keep track of the user’s movement outside/ inside the premises, COSEC APTA sends location details to the server using GPS by taking user’s face image from the present location.

Read More
flkr

FLIR DJI Zenmuse XT2 Drone Camera

DJI, the world’s leading provider of civilian drones and aerial imaging, will integrate a FLIR thermal imaging sensor technology into its new DJI Zenmuse XT2 drone camera. The DJI Zenmuse XT2, DJI’s first dual-sensor and its most advanced gimbal-stabilized camera for commercial drone applications, furthers the collaboration between FLIR® and DJI. The Zenmuse XT2 also joins the ‘Thermal by FLIR’ partner program, which FLIR created to fuel thermal innovation and allow partners to leverage the leadership, quality, and innovation that FLIR’s brand represents in the thermal imaging space. Built with industrial and public safety applications in mind, the DJI Zenmuse XT2 expands upon the benefits in the first thermal-equipped camera jointly developed by FLIR and DJI, the DJI Zenmuse XT. The new drone camera includes both a high-definition 4K color video camera and a high-resolution radiometric thermal camera, allowing operators to switch between thermal and visible cameras in flight. The Zenmuse XT2 also uses FLIR’s patented MSX® technology, or multispectral dynamic imaging, that embosses high-fidelity, visible-light details onto the thermal imagery to enhance image quality and perspective. The Zenmuse XT2 is compatible with the DJI Matrice 600 and Matrice 200 series platforms and integrates with DJI’s data transmission technology for live video display. Full integration gives drone operators plug-and-play installation, real-time control, and recording during flight in thermal, visible, or thermal/ visible picture-in-picture. This flexibility allows operators to acquire double the data in a single camera and stay focused on mission-critical tasks. “The arrival of the DJI Zenmuse XT2 with a FLIR sensor signifies an important technological advancement for drone operators who need both a visible camera and the superpower benefits of thermal imaging in one product,” said James Cannon, President and CEO of FLIR, “Now drone operators can capture data without landing, an important advantage for search and rescues operations, monitor the health of mechanical and electrical equipment remotely, and identify potential problems in buildings. Our collaboration with DJI perfectly aligns with our mission to use our thermal technology to help save lives and livelihoods.” “Since the introduction of our first FLIR camera in 2015 we have seen strong demand for thermal imaging-based products because they have helped transform DJI drones into essential and often lifesaving tools across a wide variety of industries,” said Roger Luo, President at DJI, “We are excited to introduce our next generation product together, the Zenmuse XT2, which is easier and more efficient to operate, and further demonstrates our commitment to innovation in the commercial drone industry.” DJI is one of multiple partners involved with the new Thermal by FLIR program, created to support original equipment manufacturers (OEMs) and product innovators interested in using the FLIR thermal imaging sensors to deliver the benefits of the World’s Sixth Sense. The program ensures that original equipment manufacturers and entrepreneurs can carry the Thermal by FLIR brand and receive additional product development and marketing support from FLIR to build and market their respective products. Additional Thermal by FLIR partners include Cat Phones, Casio, Panasonic, ARSENZ, and TinkerForge.

Read More