securitylinkindia

Study Evaluates Effects of Race, Age, Sex on Face Recognition Software

How accurately do face recognition software tools identify people of varied sex, age and racial background? According to a new study by the National Institute of Standards and Technology (NIST), the answer depends on the algorithm at the heart of the system, the application that uses it and the data it’s fed – but the majority of face recognition algorithms exhibit demographic differentials. A differential means that an algorithm’s ability to match two images of the same person varies from one demographic group to another. Results captured in the report, Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects (NISTIR 8280), are intended to inform policymakers and to help software developers better understand the performance of their algorithms. Face recognition technology has inspired public debate in part because of the need to understand the effect of demographics on face recognition algorithms. “While it is usually incorrect to make statements across algorithms, we found empirical evidence for the existence of demographic differentials in the majority of the face recognition algorithms we studied,” said Patrick Grother, a NIST Computer Scientist and the Report’s Primary Author, “While we do not explore what might cause these differentials, this data will be valuable to policymakers, developers and end users in thinking about the limitations and appropriate use of these algorithms.” The study was conducted through NIST’s Face Recognition Vendor Test (FRVT) program, which evaluates face recognition algorithms submitted by industry and academic developers on their ability to perform different tasks. While NIST does not test the finalized commercial products that make use of these algorithms, the program has revealed rapid developments in the burgeoning field. The NIST study evaluated 189 software algorithms from 99 developers – a majority of the industry. It focuses on how well each individual algorithm performs one of two different tasks that are among face recognition’s most common applications. The first task, confirming a photo matches a different photo of the same person in a database, is known as ‘one-to-one’ matching and is commonly used for verification work, such as unlocking a smartphone or checking a passport. The second, determining whether the person in the photo has any match in a database, is known as ‘one-to-many’ matching and can be used for identification of a person of interest. To evaluate each algorithm’s performance on its task, the team measured the two classes of error the software can make – false positives and false negatives. A false positive means that the software wrongly considered photos of two different individuals to show the same person, while a false negative means the software failed to match two photos that, in fact, do show the same person. Making these distinctions is important because the class of error and the search type can carry vastly different consequences depending on the real-world application. “In a one-to-one search, a false negative might be merely an inconvenience – you can’t get into your phone, but the issue can usually be remediated by a second attempt,” Grother said, “But a false positive in a one-tomany search puts an incorrect match on a list of candidates that warrant further scrutiny.” What sets the publication apart from most other face recognition research is its concern with each algorithm’s performance when considering demographic factors. For one-to-one matching, only a few previous studies explore demographic effects; for one-to-many matching, none have. To evaluate the algorithms, the NIST team used four collections of photographs containing 18.27 million images of 8.49 million people. All came from operational databases provided by the State Department, the Department of Homeland Security and the FBI. The team did not use any images ‘scraped’ directly from internet sources such as social media or from video surveillance. The photos in the databases included metadata information indicating the subject’s age, sex, and either race or country of birth. Not only did the team measure each algorithm’s false positives and false negatives for both search types, but it also determined how much these error rates varied among the tags. In other words, how comparatively well did the algorithm perform on images of people from different groups? Tests showed a wide range in accuracy across developers, with the most accurate algorithms producing many fewer errors. While the study’s focus was on individual algorithms, Grother pointed out five broader findings: For one-to-one matching, the team saw higher rates of false positives for Asian and African American faces relative to images of Caucasians. The differentials often ranged from a factor of 10 to 100 times, depending on the individual algorithm. False positives might present a security concern to the system owner, as they may allow access to impostors. Among U.S.-developed algorithms, there were similar high rates of false positives in one-to-one matching for Asians, African Americans and native groups (which include Native American, American Indian, Alaskan Indian and Pacific Islanders). The American Indian demographic had the highest rates of false positives. However, a notable exception was for some algorithms developed in Asian countries. There was no such dramatic difference in false positives in oneto-one matching between Asian and Caucasian faces for algorithms developed in Asia. While Grother reiterated that the NIST study does not explore the relationship between cause and effect, one possible connection, and area for research, is the relationship between an algorithm’s performance and the data used to train it. “These results are an encouraging sign that more diverse training data may produce more equitable outcomes, should it be possible for developers to use such data,” he said. For one-to-many matching, the team saw higher rates of false positives for African American females. Differentials in false positives in one-to-many matching are particularly important because the consequences could include false accusations. (In this case, the test did not use the entire set of photos, but only one FBI database containing 1.6 million domestic mugshots.) However, not all algorithms give this high rate of false positives across demographics in one-to-many matching, and those that are the most equitable also rank among the most accurate. This last…

Read More

BOSCH Camera-Based Life-Saver

Microsleep, distraction, a seatbelt left undone – many things that happen inside a vehicle can have far-reaching consequences. To avert critical driving situations and possibly also accidents, it is planned that cars will in the future use their sensors not simply to monitor the road but also the driver and other passengers. For this purpose, Bosch has developed a new interior monitoring system featuring cameras and artificial intelligence (AI). “If the car knows what its driver and occupants are doing, driving will become safer and more convenient,” said Harald Kroeger, a member of the Robert Bosch GmbH board of management. The Bosch system may go into production in 2022. In that year, the EU will make safety technology that for example warns drivers of drowsiness and distraction a standard feature in new vehicles. The EU Commission expects that, by 2038, their new safety requirements for vehicles will save more than 25,000 lives and help prevent at least 140,000 severe injuries. By keeping an eye on what is happening inside the car, it is hoped that a fundamental problem of self-driving cars will be solved. If responsibility for driving is to be transferred to the driver again following an automated drive on the freeway, say, the car needs to be sure that the driver is neither sleeping, nor reading the newspaper, nor writing e-mails on their smartphone. A smart camera constantly monitors the driver At 50 kph, a vehicle will cover 42 meters completely unsupervised if the driver dozes off or looks at their smartphone for just three seconds. Many people underestimate the associated risk. International studies state that nearly one in ten accidents are caused by distraction or drowsiness. This has prompted Bosch to develop an interior monitoring system that detects and alerts to this danger and provides driving assistance. A camera integrated in the steering wheel detects when drivers’ eyelids are getting heavy, when they are distracted, and when they turn their head toward their passenger or the rear seats. Thanks to AI, the system draws the right conclusions from this information – it warns inattentive drivers, recommends a break if they are getting tired, or even reduces the speed of the vehicles – depending on the automaker’s wishes, and also on legal requirements. “Cameras and AI will turn the vehicle into a life-saver,” Kroeger continued, To achieve this, Bosch engineers have used intelligent image-processing algorithms and machine learning to teach the system to understand what the person in the driving seat is actually doing. To take the example of driver drowsiness, the system is trained using recordings of real driving situations, and on the basis of recordings of eyelid position and eyeblink rate, learns how tired the driver really is. This allows it to give an alert that is appropriate to the situation, and to use the driver assistance systems to intervene. Warning systems that sound the alert in the case of distraction and drowsiness will be so important in the future that NCAP, the European New Car Assessment Program, will include them in the roadmap for the Euro NCAP assessment for vehicle safety by 2025. On the subject of monitoring, only the software in the vehicle itself evaluates the information provided by the interior monitoring system – the information is neither saved nor passed on to third parties. Like a relay race: Responsibility for steering passes from car to driver and back At the latest when cars start driving automatically, it is obvious how important it is that they understand their drivers. Once driving is automated, cars will drive along free ways without driver intervention. However, they will also have to be able to hand back control to their drivers – in tricky situations such as construction zones, or when the exit ramp is drawing near. Drivers have to be able to safely take the wheel again at any time during the automated driving phase, and the camera makes sure they don’t fall asleep. If their eyes remain closed for a prolonged period, an alarm is sounded. The system also interprets camera recordings to establish what drivers are currently doing, and how ready they are to respond. The transfer of driving responsibility is then timed accordingly. “Bosch driver observation will be essential for safe automated driving,” Kroeger commented. When the car keeps its camera eyes open But the new Bosch system keeps its eye not only on the driver, but also on all the other passengers, whether next to or behind the driver. For this purpose, a camera mounted above or below the rear-view mirror monitors the entire passenger compartment. It notices whether children on the rear seats have carelessly unfastened their seat belts, and warns the driver. If someone sitting in the back is leaning too far forward, at an angle, or with their feet up on the seat next to them, the airbags and belt tensioner will not be able to protect them properly in an accident. The interior monitoring camera can tell what position they are sitting in and set the airbags and belt tensioner to ensure the best possible protection. The interior monitoring system also prevents the passenger seat airbag from being deployed if a baby’s carrycot is on the seat. On the subject of children, it is a sad fact that parked vehicles can be a death trap for them. In the United States in 2018, they claimed the lives of more than 50 children (source: KidsAndCars. org), either because they had been left in the car for a short while or had clambered in unnoticed. The new Bosch system can recognize this danger and warn parents in a flash by sending a message to their smartphones. In an emergency, it also can alert the emergency services. As the Hot Cars Act currently being debated in the United States shows, legislators are interested in technology solutions to address this challenge. A camera for more convenience The new Bosch system also means more driving convenience. The interior monitoring camera can tell who…

Read More

IDIS Video Tech Deployed at Top Birmingham Secondary School

One of Birmingham’s top secondary schools has switched to IDIS video technology in a drive to improve security, safety, and standards of personal behaviour. With its ‘Outstanding’ Ofsted rating, Swanshurst School is one of the city’s most popular destinations for girl’s secondary education, with more than 1800 pupils aged 11 to 19 years. “Video monitoring is key to efficient use of resources at the school,” said Swanshurst’s Strategic Business Manager, Annette Tyler, “Because we have such a busy site, the ability of our senior team to see who is entering or leaving, and to remotely monitor corridors and lobby areas, is crucial to fostering a safe and welcoming learning environment.” The school’s old CCTV system was proving difficult to use, with poor quality recordings that were hard to search through. IDIS technology was chosen to replace it, and the priority for the upgrade was not just price – although budgets remain tight for many schools – but service and performance. “To avoid a potentially costly mistake, we researched what other schools had done and looked for personal recommendations. Then we selected Unison Integrated Technology only after comparing our three shortlisted quotes and satisfying ourselves that the IDIS system would do what we wanted,” added Annette Tyler. The new solution comprises close to 110 cameras. IDIS’s DC-D4213WRX vandal resistant full-HD IR domes provide coverage for most of the school’s internal areas and more than 70 were installed. They capture pin-sharp images in all lighting conditions, handling rapid variations in brightness and shade thanks to their true wide dynamic range (WDR), and infra-red performance giving an impressive 30 metres range at night. The 27 IDIS DC-E3212WRX vandal resistant bullet cameras, which were installed to cover entrances and external areas, also deliver powerful IR night vision, with low light enhancer technology. Allowing the installation team to work more quickly, these cameras use Power-over-Ethernet (PoE) to eliminate the need for additional cabling, while the hierarchical connection between the cameras at the NVRs further guarantees the most efficient method of cabling. Optimum recording capability is provided by four IDIS NVRs (32-channel DR-6332PS-S recorders), which achieve 370Mbps throughput to ensure no latency on live footage and image capture in full HD. IDIS dual codec performance means that all footage can be recorded in high-definition H.265 but still viewed on older H.264 smartphones, tablets and monitors, so there’s no need to upgrade until the user is ready. Built-in PoE switches save further on hardware and installation costs. In the event of network instability or failure at the school, IDIS Smart Failover technology means the cameras’ SD card instantly begins recording and automatically transfers the data to the NVR after recovery, eliminating the risk of gaps in footage. Now, with minimal training, authorised senior staff and the Swanshurst reception team use the intuitive IDIS Center video monitoring software (VMS) to live-monitor internal and external areas, and quickly search recorded footage to find events of interest. This new capability is already proving to be a useful deterrent, confirmed Annette Tyler. “The solution installed by Matt Rodden and his team at Unison Integrated Technology far exceeded our expectations,” she said, “The project was delivered efficiently, and the system is so easy to use. Our pupils, parents and staff all appreciate the added protection that the new cameras give.” Looking ahead, Swanshurst School also now has the assurance that the system will remain affordable to run, with no additional fees for the IDIS Center VMS, plus options to adapt the system very easily thanks to the guaranteed forward and backward combability of IDIS tech. “Together with our integration partners, IDIS works very hard to ensure a low total cost of ownership (TCO),” said James Min, Managing Director, IDIS Europe, “This is why we are confident in offering the industry’s longest warranty against faults, the IDIS Ultimate Warranty, and in giving customers like Swanshurst School the best protection for years to come.”

Read More

OT Systems Ethernet-Over-Coax Solution takes the HKIA CCTV System from Analog to IP

The Hong Kong International Airport recently modernized its CCTV system taking its surveillance capabilities from analogue to IP by integrating OT Systems’ Ethernet-over-Coax (EoC) transmission solution to existing infrastructure. A total of 100 single-channel ET1100CPp-T transmitters were installed to connect 100 IP cameras and connected to either single-channel ET1100CPp-R receivers or 8 to 16-channel ET4200CPp-RS8/16 rackmount receivers. The ET4200CPp-RS8/ 16 receiver offers full switching capability and 10/ 100/ 1000Mbps auto-MDI/ MDIX full-duplex communication and it is available with rack-mounting installation in a 19-inch rack cabinet. The EoC solution provides flexible communications and 30-watt high power, with power over coax (PoC) technology to remote PoE IP cameras or PTZ cameras. The power supply can be connected with one-channel or multi-channel receivers like the ET1100CPp-R and ET42000CPp-RS8/16, which supply power using legacy cable. A full line of EtherXtra™ Ethernet-over-Coax products provides an alternative for system integrators and service providers looking for a solution to utilizing existing coax infrastructure and migrating to IP-based systems. Taking advantage of the existing coaxial cables, installers can provide quick installation and high performance for CCTV upgrading without rewiring their environment. Also, the EoC solution provides flexible communications and a 30-watt high power source with power-over-coax (PoC) technology to remote PoE IP cameras or PTZ cameras. This EoC retrofit easily repurposes existing coaxial cable infrastructure, enhancing the system with centralized power and creates feature-rich IP surveillance systems.  

Read More

Securiton Safeguarding Tunnel Infrastructure in Colombia

An important infrastructure project that, for years, had been postponed for political or environmental reasons finally received its inauguration last August. The project’s tunnels and viaducts in and around the Colombian city of Medellín are intended to provide fast access to the neighbouring valley, location of the international airport. Securiton is safeguarding the tunnels and key infrastructure installations against fire. Situated in the Aburrá valley in the mid-Andes mountain range in north-western Colombia, Medellín lies 1538m above sea level. The ‘Capital of the Mountains’ is the country’s second largest city (population: 2.5 million-plus) and the second largest metropolitan region (population: 3.9 million) after the capital Bogotá. Road transport milestone Although Medellín has a city airport, it is restricted in size and serves only national destinations. More distant destinations are served by Rionegro Airport in the neighbouring San Nicholás valley. August 15, 2019 saw the official opening of the 8.2km Túnel de Oriente (East Tunnel) and a 24km expressway between Rionegro and Medellín’s eastern suburbs. Present at the ceremony was Colombian President Ivan Duque, who insisted on being the first user to drive through the tunnel. The new link cuts journey times from 50 minutes on the former 32km extremely winding route to less than 20 minutes. The main beneficiaries are the eight million-plus users of Rionegro Airport – and the wider region in terms of tourism, industry, the environment and mobility. Fire protection from Securiton The new route features three tunnels – one of which, at 8.2 kilometres, is the longest in Latin America – and nine viaducts, which allow users to negotiate the mountainous terrain at speed. Toll booths at each end of the route collect user fees from drivers. Securiton was tasked with providing fire protection for the tunnels and other facilities, consisting of ceiling-mounted SecuriSens LIST line-type heat detectors. These highly sensitive sensor cables, designed for use in environments of that nature, are capable of detecting fires despite the presence of dust, heat, smoke or exhaust fumes. SecuriFire fire alarm systems and large numbers of Securiton fire detectors ensure the safety of the toll booths, control and electrical rooms and tunnels.  

Read More

Ocean Blue Car Wash Standardizes on 3xLOGIC Video Surveillance

3xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, has recently announced that Ocean Blue Car Wash, Prescott Valley, AZ, has deployed/ upgraded to 3xLOGIC 32 4MP camera video surveillance systems at four of its locations to date. DC Pro Systems is the integrator of record as it continues to install and maintain a growing number of Ocean Blue locations. As one of the state’s first Express Car Wash concepts, the owners of Ocean Blue Car Wash have put to use their 15 years of experience to create a new standard in car washing. The Ocean Blue experience is known for consistency and a reliable standard of service. Customers receive the same safe, quality car wash every visit. “We are standardizing on the same robust 3xLOGIC video surveillance system at each of our locations,” said Alexander J. Lazar, Owner and General Manager, Ocean Blue Car Wash. Thus far, four Ocean Blue locations have each deployed, or will soon finish deploying, 3xLOGIC V7000 NVRs and 32 V-Series 4MP dome cameras. “We really like Shane Hepola and DC Pro Systems. He brought us the 3xLOGIC technology, and I trust him and the quality job they do,” added Lazar, “These high-resolution camera views keep my employees on point and they keep my customers on point, too. The 3xLOGIC cameras pay for themselves. I’ve got cameras everywhere, recording everything. If we’ve caused damage to a vehicle, if we’re liable, we’ll certainly pay for it. However, the proof is in the video and if there is any question about a claim, the video doesn’t lie.” “Any story you can imagine from the customer, we’ve experienced it, including slip and fall claims,” Lazar continued, “We need that 4 MP resolution; it keeps our employees honest and it also deters potential robberies. Our multiple cameras provide so many interior and exterior views that we capture a lot of the surrounding properties and highway, so we can be an asset to law enforcement when needed.” I’m not at all the different sites every day, but at any given time I can log in and watch what’s going on. I’ve got a bird’s eye view, so I can catch equipment malfunctions before my staff does. Sometimes, when I wake up at 2 am, I can quickly log on to view my locations. I’ll do a night audit to check lighting, building signs, and other things. We’re not there but the cameras are – 24/7/365.” Ocean Blue does both on-site and remote monitoring of video, as well as after-incident investigations. At this time, the company is expanding to a fifth location. There are plans to build another, and by end of 2020 there will be six Ocean Blue locations. All six will have the same robust, high-functioning 3xLOGIC video surveillance, installed by DC Pro Systems. An interesting add-on feature for Ocean Blue is a 3rd party software app that takes footage from the 3xLOGIC cameras to determine spacing between the cars during the wash process. If two cars come within a certain number of feet from each other, the line shuts down automatically. Another improvement Lazar and Hepola are discussing is to implement 3xLOGIC VIGIL Central Management (VCM). VCM is a health monitoring software component of the VIGIL video management system that alerts either DC Pro or Ocean Blue to any malfunctions on the network before such developments create a problem. “The system is very user friendly. Basically, we’re trying to kill all the blind spots on the property, and I use the video for training purposes, too. We’ve got monitors in our offices and in the customer areas. That’s telling my customers we’re watching everything, and their cars are safe; and it’s keeping my employees doing great work,” Lazar concluded.  

Read More

SophosLabs Intelix A Cloud-Based Threat Intelligence Platform

Sophos has announced the availability of SophosLabs Intelix, a cloud-based threat intelligence and analysis platform that enables developers to build more secure applications. With SophosLabs Intelix, developers can make API calls into the platform for turnkey cyberthreat expertise that assesses the risk of artifacts such as files, URLs and IP addresses. The platform continuously updates and collates petabytes of real-time and historical intelligence, including: telemetry from Sophos’ endpoint, network and mobile security solutions; data from honeypots and spam traps; 30 years of threat research; predictive insights from machine and deep learning models; and much more. Through the use of secure RESTful APIs, developers can directly tap the platform with file submissions for static and dynamic analysis, queries on file hashes, URLs, IP addresses, and Android applications (APKs) to proactively answer questions like, “Is this file safe? What happens if I open or execute it?” or “Is this link safe? What happens if I call this URL?” SophosLabs Intelix is available through the AWS Marketplace and includes several free tier options, allowing developers to immediately access and start using the intelligence platform. “Sophos is building a global community around its APIs to spark innovation among developers. By exposing a variety of intelligence from SophosLabs directly through RESTful APIs, we’re making it simpler than ever before to quickly and easily integrate threat intelligence into new and existing applications and operations,” said Joe Levy, CTO, Sophos, “With SophosLabs Intelix, we’re lowering the barrier to realize analysis for anyone developing an application or platform. The information breadth and depth are also valuable for IT admins, researchers, security analysts, or students in need of top-tier threat intelligence.” SophosLabs Intelix offers three key service features: Real-time lookups: Enables quick classification of artifacts with direct access to the latest SophosLabs intelligence by querying file hashes, URLs, IPs, or Android application thumb-prints. Reputation scores identify known bad and known good files, as well as those in the grey area. Static file analysis: Leverages multiple machine learning models, global reputation, deep file scanning, and more without needing to execute the file in real time. Dynamic file analysis: Provides dynamic file analysis and classification capabilities through execution and instrumentation of submitted files in sandboxes, utilizing the latest runtime detection techniques to reveal true behaviors of potential threats. Pay-as-you-go options for more advanced research are also available through the AWS Marketplace and part of the Sophos cloud security provider (CSP) program for channel partners.  

Read More

New Generation of IP Villa Door Stations

Hikvision has released its new generation of IP Villa Door Stations (DS-KV8X13/DS-KV61X3 series), providing a simpler video intercom solution for houses and small buildings, and delivering more convenience, security and style on the doorstep. The door stations have been designed to be user-friendly, making installation easy and cost-effective. Standard Power-over-Ethernet (PoE), plug and play, and Wi-Fi technologies simplify installation, and can provide fast and convenient data transmission. Either intuitive step-by-step configuration wizard on machine or online web configuration way makes the set-up process more convenient and easier. For DS-KV8X13 series, both flush and surface mounting options are available for a flexible installation. With protection to IP65 and IK08 standards, Hikvision’s DS-KV8X13 series IP Villa Door Stations are robust and resistant to force and water. A 2MP fisheye IP camera, which supports WDR, can provide sharp HD images, enabling users to see clearly who is outside, and to keep better security and peace of mind. The other features include noise suppression and echo cancellation, low illumination, access control functions, tamper-proof and 2.4 GHz Wi-Fi. Hikvision’s new IP Villa Door Stations are a great addition to solutions in homes, shops, offices and other small buildings. With help of a mobile app, securing homes or small businesses is a breeze, even when users are on the move.  

Read More

Dahua Open Platform (DHOP) Release AI Series and Thermal Series

Dahua Technology, a world-leading video-centric smart IoT solution and service provider, released Dahua Open Platform (DHOP) for AI series cameras, enabling partners to develop their own applications on Dahua hardware, including Ultra AI IPC (7 Series) and thermal cameras, with stronger computing power. In addition, the develop environment is more friendly than before. First released in 2017, DHOP is a platform that allows third party applications to be downloaded and installed on Dahua network cameras. Compared with the original version, the AI DHOP features wider and open product line, stronger computing power and more convenient development process. What’s more, the software and hardware are decoupled, thus algorithms can be loaded on the device as needed, enabling multiple functionalities in one equipment. AI DHOP is also easier to debug, diagnose and upgrade. With app data synchronizing to the flash before the device restarts and dedicated storage partition, the data is better protected. Advantages Besides having the usual advantages, AI DHOP now offers more. With flash up to 1G, DDR up to 512M and AI computing power up to 2T, AI DHOP allows more partners to develop their own application on Dahua hardware. It means more AI functions will be realized, and more joint solutions will be created to serve the customer better. It also has multiple upgrading methods, and data filled with security protection. Benefits Cooperation with Dahua Technology through AI DHOP will bring wider benefits in the long-term. Strong support is guaranteed not only during development but also during the later stages. Verified and tested applications will be released on Dahua Technology’s website, boasting access to a global user base. AI DHOP partners have the potential to participate in various marketing activities and be promoted via the Dahua global partner networks. End users can purchase licenses directly from DHOP partners, for whom Dahua Technology will help release the license in cameras. “Our joint solution, without exaggeration, brings smart video surveillance systems to a new level of accessibility and cost-effectiveness. Initial investments are reduced due to significantly lower equipment costs. At the same time, the system stays current for a long time due to the continual development of Axxon Next video analytics and free updates,” notes Alan Ataev, AxxonSoft Global Sales Director. “In the next stage, we will continue to improve the development environment and enhance computing power, and further promote the open platform to backend, storage, intelligent transportation etc.,” Said Peter Pan, Overseas Solution Director at Dahua Technology. Openness is a key strategy of Dahua Technology, especially in this rapidly changing smart IoT era. Currently, DHOP is available for some Dahua IP cameras, including IPC, PTZ cameras, and thermal cameras, and they will open this features to other products soon. Since its debut, DHOP has gathered many technology partners, creating many amazing joint solutions in different fields.  

Read More

Advances in Key and Equipment Management unlocked by Maxxess eFusion Integration with Traka

Powerful tools for managing keys and high value assets can now be used seamlessly within centralized management platforms, following the integration of Maxxess eFusion with Traka from ASSA ABLOY Global Solutions. “There are huge benefits to be gained from integrating Traka’s capability with wider functions and operations in- cluding building management systems, security, fire and the many application-specific systems used by our customers in different sectors.” Allowing organizations to operate with unprecedented efficiency, eFusion with Traka now makes it simple for au- thorized staff to gain access to a wide range of controlled assets, from keys and premises to high value equipment, vehicles and machinery. The new integration enables full traceability and audit reports that can include video and audio recordings as well as transactional data from systems such as access control, intruder and fire. “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments – and increasingly integrated with access control systems – the new integration with eFusion opens the way for more powerful integrated opportunities to be developed.” -Lee Copland  Managing Director, Maxxess EMEA As with all Traka solutions, audit capability across key cabinets and lockers enables instant traceability and report- ing. Some of the more widely used important features include fault logging, curfews and multiple authorizations that provide tangible returns on investment by improving operational efficiency, increasing productivity and minimizing costly downtime. With this latest integration between eFusion and Traka, users can manage all their keys and high-value equipment from their centralized security management platform, reducing the risk of security breaches and streamlining their day- to-day operations. “The power of this integration brings together Traka’s intelligent key and equipment management systems and eFusion’s flexible cloud architecture,developing a solution that will deliver exciting advances in security and opera- tional efficiency. Our new integrated capability will not only benefit major new build projects, but also open significant potential for existing users of eFusion and Traka technol- ogy. We look forward to building on this exciting partner- ship with Maxxess which we jointly believe continues to deliver tangible benefits to our valued customers.” -Martin Woodhouse  Head of Traka APACMEA The integration with Traka is just the latest example of how the eFusion platform gives users the freedom to inte- grate, customize and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customize solutions combining surveillance, access control, fire and intruder systems with back-office processes.  

Read More