The Art of Smart

Intelligent video solutions stop data theft in its tracks


It's a terrifying thought -- a hacker breaks past a company's firewall and has unlimited access to a jackpot of data, from employee information to trade secrets and financial details.

Most businesses realize the importance of protection against data theft. But if they are not also physically securing access to their computer servers, companies are facing even greater risks. This threat is what led Arteco, a provider of intelligent video solutions, to offer its customers additional protection to their normal software security by stopping the threat of physical access to computer servers.

A Proactive Approach
Arteco was founded in 1987 as a developer of motion control technology for industrial machinery, according to Ray Rudy, national sales manager for Arteco. The company pioneered the field of virtual numeric control, which led to the development of artificial intelligence algorithms to detect the size, speed and direction of objects within a video field. In 2000, Arteco launched its first intelligent video solution (IVS) in the European market, and its popularity soon spread.

"Access control, fire and security products all detect and alert in real time, but historically, video security has been very reactive in nature," Rudy said. "Intelligent video is proactive in nature, just like every other major product group in the industry."

In an IVS, user-defined rules, which are unique to each security situation, are applied to a series of filters on each video channel. When the software detects an event in a camera's field of view, the system triggers a visible and audible signal and notifies personnel through e-mail or SMS message from a computer or mobile device. Then, security officers physically validate the threat by acknowledging the alert and taking necessary countermeasures.

Intelligent video is designed specifically for violated area and virtual perimeter detection. This can be confused with motion detection, which simply detects a change in pixilation that could be caused by a variety of innocent events, such as a tree branch blowing in the wind. IVS technology uses size parameters to isolate and detect specific objects, instead of all motion.

"Intelligent video was born out of machine vision-based motion controls, which gave Arteco-IVS flexibility and accuracy, because you have an extremely small margin of error in manufacturing motion controls," Rudy said. "An error in motion control could cost a manufacturer thousands of dollars -- and in security, these errors usually become false alarms. Our product experience has really given us an edge in reducing false alarm rates."

The Eye in the Sky
In offering its customers IVS to protect their servers, Arteco is looking to make clients more aware of their physical assets, rather than just their electronic ones.

"Businesses spend millions of dollars installing computer software to prevent hackers and data theft, but they must realize that if someone tampers with their hardware, they have given thieves the keys to the kingdom," said Steve Birkmeier, vice president of marketing at Arteco. "Even in remote or third-party collocation centers, companies are using intelligent video to protect data-sensitive hardware because of its proactive security measures."

In June, Pfizer Inc., one of the world's largest pharmaceutical research companies, commissioned Arteco to install such a system to protect its hardware at a collocation center in San Diego. Since the facility is housed in a building with several other companies, Pfizer needed to ensure that no unauthorized personnel could tamper with its data-sensitive servers. The company chose the Arteco-IVS to complement card access to the center's gate, giving offsite security officials real-time video validation of unauthorized entry through tailgating, force or other means.

Sean Mullen, senior advisor of systems at Pfizer, says IVS has made the facility much more secure than it was with only a card reader controlling access.

"It provides an added layer of security in that it alerts our Security Control Center through a visual and audible alarm that someone has entered a secure area," he said. "Security can then view all angles of the space from a central location and dispatch personnel as needed."

Not only is Mullen reassured that Pfizer's hardware is safe at the center, he also enjoys the fact that IVS is saving the company money. With Arteco's cameras detecting suspicious movement and unauthorized entry, Pfizer doesn't need security officials staring at surveillance monitors for eight hours a day.

"The bottom line is cost savings," Mullen said. "We are always asked to come up with new technology that enables us to reduce staff without sacrificing security. With intelligent video we are able to do more with less. Prior to the install, we required an officer to monitor the cameras 24/7; today that same officer can simultaneously perform other job duties and only needs to respond once an alarm is triggered. This enables 24/7 coverage of the space without constant monitoring."

The Next Step
After such a successful installation, Pfizer now plans to incorporate IVS into all restricted areas at its San Diego location. And it appears the company was wise in its decision to invest in intelligent video -- it is now the fastest-growing product segment in the security industry, as both dealers and end users begin to realize its benefits to video security applications.

"The rapid increase in the deployment of cameras is creating a huge video data problem that requires not only more manpower to monitor and determine threat legitimacy, but also hard-drive capacity to store the thousands of Gigabytes that are being produced constantly," Rudy said. "Video analytics filters this data and drives only pertinent information to personnel to make a decision. There is no question that analytics is the next logical step in video security." 

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3