Friday, January 24, 2020

New security industry technologies

The security industry is in a state of constant change. Recently, this process has been particularly intensive due to the constant enrichment of the security sector with new technologies. Among those who closely monitor these trends are specialists from Axis Communications, one of the leaders in the video surveillance market. Analyzing the prospects for 2019, they identified six key trends in video surveillance and cybersecurity. Those who work in the security sector cannot afford to ignore these trends.

1. Artificial intelligence:

gradual introduction, not radical growth The topic of artificial intelligence is very popular, and there are many expectations associated with the opportunities it offers for industry and business. But in reality, the introduction of AI-technologies in many areas, including in video surveillance, is taking place gradually. In the modern video surveillance industry, machine and deep learning is usually used to implement the functions of video analysis, but over time it will become a standard tool for software developers and an important component of many products. So, one of the important problems that deep learning can help solve is the reduction in the number of false alarms that surveillance systems are struggling with today. Nevertheless, Axis experts emphasize that in the field of video surveillance and ensuring security, expectations from the latest technologies are overstated, and the speed of their adaptation in reality will be gradual. It is important that they are reliable, practically error-free, and do not miss important incidents – it takes time to achieve such a result in the training of artificial intelligence. “In the case of artificial intelligence and deep learning, as with any new technology, the primary task is to ensure the reliability of the implementation and help customers solve the problem

2. Using cloud and peripheral computing

Using cloud and peripheral computingfor maximum efficiency Cloud computing relies on data centers. In the context of a significant growth in connected devices and the expansion of the capabilities of the Internet of things, the volume of data produced by them is growing. Even creating additional data centers and increasing their capacity does not exclude the risk of system crashes and overloads, which is especially important to consider in areas such as video surveillance, where a large amount of memory is required to store information. Therefore, Axis experts recommend, in addition to cloud computing, the use of peripheral computing, which makes it possible to transfer data processing processes to the “periphery” of the network, close to the data collection point by the sensor and before transmitting them to the data center – in the field of video surveillance, this means that the data is processed in the camcorder itself. “Firstly, processing the data in the camera can significantly reduce the load on the network channel during data transfer and storage. Secondly, they can be depersonalized and encoded before data transfer, if necessary for security and confidentiality purposes, ”says Johan Paulsson.

3. Personalization and confidentiality

– a new valuable resource of business. In 2018, the topic of protecting confidential information and personal data was especially acute. Using services such as Facebook and Google simplifies life and allows you to personalize the content you receive in exchange for user information – date of birth, hobbies or geo-location. In the field of video surveillance, cameras allow you to access a huge amount of confidential information, and it is extremely important for companies to comply with all regulations for its use. The value of trust between the company and its customers is constantly growing and has already become a new business asset: a study by Accenture consulting company, published in October 2018, showed that there is a correlation between customer trust and company profit. “The company’s attitude to privacy and the use of personal data will be one of the most important issues for companies that want to move forward,” Johan commented on the trend.

4. Cybersecurity:

attention to the supply chain The problem of network security will never lose its relevance, as cybercriminals do not abandon their attempts to find vulnerabilities. Cyber attacks are becoming more sophisticated, and the number of potential vulnerabilities and unreliable endpoints of web services is increasing exponentially. In the field of video surveillance, this issue is a priority: people’s lives and the safety of tangible assets depend on the reliability of security systems. In recent months, the supply chain has become the most vulnerable link in business processes, Axis experts say. An insufficiently reliable network security system and external attacks can lead to disruption of both software and hardware. Therefore, the issue of product origin is critical, and manufacturers must be sure that every link in their supply chain is reliably protected.

5. Ecology and modern technologies:

“smart” sensors to protect the environment. Business already uses video analysis functions for planning and rational use of energy in offices, which has a positive effect on the environment. However, new types of “smart” sensors not only significantly increase the accuracy of measurements, but also have a number of new features: for example, they can analyze air quality or identify areas with irrational use of energy using thermal images. It is precisely such technologies that will play a central role in solving the problem of environmental pollution around the world: for example, sensors installed on the streets will allow you to control air quality and, thus, reduce the negative impact of smog and exhaust on the health of city residents. The use of smart technologies will help businesses and government organizations increase their energy efficiency, reduce costs, and achieve their environmental goals and sustainable development.



source https://drlinex.com/2020/01/25/14/

from Dr. Linex https://ift.tt/2RoYg5b
via IFTTT

No comments:

Post a Comment