Active Intelligence Drives Transformation to Proactive Security at GSX 2023

Active Intelligence, provider of anomaly detection software for physical security and business intelligence applications, is driving the transformation to proactive security solutions here at GSX 2023 in booth 2224. The company’s groundbreaking ASTRA™ Video Anomaly Detection software delivers real-time video anomaly detection for a virtually unlimited number of security, safety, compliance, and commercial/industrial applications across the enterprise. ASTRA’s wide-ranging capabilities and successful integration with leading video management solutions (VMS) continue to gain traction with users across virtually every vertical market globally.

“Now integrated with many of the industry’s leading VMS solutions, ASTRA delivers the field-proven ability to transform conventional video systems from being reactive to proactive, forward-looking solutions with extreme accuracy and cost-efficiency,” said Ken LaMarca, CEO, Active Intelligence. “As ASTRA continues to gain awareness with industry professionals around the globe, it has opened new opportunities for expansion with a host of new strategic technology and systems integration partners here in the U.S., as well as in the Middle East and South America.”

ASTRA Video Anomaly Detection provides the unparalleled ability to identify when anything out of the ordinary occurs in a scene, including an act of violence, an individual in distress, or a product falling off an assembly line. The real-time video security solution detects any anomaly in a scene using statistical data analysis without any predetermined rules or parameters, bias or human judgement. ASTRA's efficient design also allows for hundreds of video streams to run on a single server, significantly reducing the time and cost of deployment versus conventional video analytics software.

To date, ASTRA is integrated with the Milestone XProtect, Genetec Security Center, and Qognify Ocularis VMS platforms, with others in development. “Integrations with these key technology partners greatly increases our visibility with a tremendous base of users around the world,” continued LaMarca. “We anticipate continued steady growth as more security professionals see firsthand just how transformative and powerful ASTRA is for proactive security and business intelligence applications.”

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3