Security Technology Executive

MAY-JUN 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/530736

Contents of this Issue

Navigation

Page 32 of 67

May/June 2015 • SECURITY TECHNOLOGY EXECUTIVE 33 www.SecurityInfoWatch.com need to be plugged. In this case, video analytics acts as an intrusion detector, but ironically does so after the fact. What's the point of having an intrusion detection system that alerts you to an open door half an hour after someone walked through it? Post-incident video analytics allows you to pinpoint the weak spots in your infrastructure to help avoid future security incidents. In the previous example, video analytics revealed that an insider cooperated with the assailant, and two other people carr ying guns entered at the same time. The vic- tim in the hallway didn't have a gunshot wound, and no one in the building reported gunfire, so the analytics provided a valuable piece of knowledge that could aid the authorities in apprehending the suspect. We need to now search for the other two armed accomplices and find out where they are right now. Video analytics that follow suspects as they move from camera to camera - forwards and backwards in time - provide a much greater situational awareness and expedite investigations so authorities can apprehend the suspects before a situation escalates. Statistically, most crimes are committed by people you know, not by random strangers. Law enforce- ment experts in Europe and the U.S. have commented that over 50 percent of breaches were caused by employees misusing access privi- leges, whether maliciously or unwit- tingly. Ideally, an intrusion detec- tion system puts the pieces of the puzzle together, including how it began, not just what's happening now. Certainly, you first want to know the current location of the bad guy, but there's no point in find- ing out a week later while doing post-event video forensics that he came in with two other people and received help from the inside. Using analytics in this manner enables organizations to be proac- tive rather than reactive and lever- age their existing investment in what is often a sizeable video sys- tem. Unleashing this new power justifies an expansion of the exist- ing camera count because now the argument shifts away from the need for a visual record of as many things as possible in order to reduce liabil- ity to the possibility of stopping incidents before they happen. Secu- rity personnel are used to intru- sion detection systems that focus on random strangers trying to get through a secured area, but today's video analytics look at an intru- sion in a completely different way. It doesn't matter that the suspects came in without triggering an intru- sion alarm because the analytics can still find where they are, how they got in, and what they did. T here are many ways to get around an intrusion system or access control system, and that's why real-time forensics video ana- lytics system can be so valuable. The system doesn't care how the intrud- er got in. It's just going to find the suspect. The fact that someone was able to trick the intrusion detection system doesn't matter. Real-time forensics video analytics provide the tools needed to keep on top of unfolding events, in real time. ■ 800-729-3839 830-629-2900 www.detex.com Door Prop Alarm System When a door is held open, you'll hear about it. Designed to alert staff with a 100-db alarm, Detex EAX-300 Series door- prop alarms are a low-cost, practical loss. An intelligent circuit senses the exter , sounding an alarm when the door has rearming when the door has been closed again. Timing can be field-set from one second to four minutes, with a fifteen- second default. Powered , the alarm requires no electrical connection to install. Hard-wired e also available. • Magnetic door contact • Remote alarm • Wall-mounting kits www.SecurityInfoWatch.com/10213445 About the Author Dr. Bob Banerjee is Senior Director of Training and Development for NICE Systems' Security Division. A recognized PSIM expert, Banerjee has more than a decade of experience, having held senior marketing and global product management positions with several IT and software firms. He is a frequent speaker at security industry conferences and has published numerous articles on PSIM and other security topics. He holds a Ph.D. in Artificial Intelligence from the Advanced Research Center at the University of Bristol, England.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2015