March Networks’ Data Mining Software Gets SaaS Treatment

March Networks Inc. has configured its VideoSphere Loss Prevention (LP) data mining software suite into a hosted application aimed at smaller retailers.

The new service, VideoSphere Hosted Business Intelligence (BI) Services, launched last week at the ASIS International 2008 Seminar and Exhibits in Atlanta, and marks another step in the growth of “software as a service,” or SaaS, in the security sector. Brivo’s hosted Online Access Control System (ACS) is another notable example. SaaS, in which an end-user subscribes to a software application via the Internet instead of purchasing a license to run it on an enterprise network, is a growing trend in other information technology applications.

March Networks is aiming Hosted BI at small to mid-sized retail chains looking to identify and control revenue leakage that results from dishonest employees. Retail security is among March Networks’ vertical strengths. The Ottawa, Ontario-based company numbers Wal-Mart and Boots, a major U.K. and European pharmacy chain, among its customers. “Now smaller, tier two retailers can use the solution,” said Peter Wilenius, vice president of investor relations and corporate development at March Networks.

Like VideoSphere LP, Hosted BI tracks point-of-sale transactions looking for and flagging anomalies. BI comes standard with 40 pre-set policies, and other policy parameters can be set by the user, Wilenius said. The service will flag questionable transactions, such as an excessive number of voided sales, returns or gift card sales from one cashier, and then record the documentation, alert security personnel and link to the video surveillance footage of the transactions in question. While fraud and leakage hurts retailer margins, because they tend to be non-violent crimes with low community visibility, local police generally give such cases low investigative priority. In response, some large retailers, most notably Target, have expanded their own security operations into forensic laboratories that can build prosecutable cases that can be handed over to a district attorney. The hosted app puts this forensic capability in the hands of retailers with 100 outlets or less, Wilenius said.

“The system is very good at gathering intelligence so you can initiate a case,” Wilneius said. “Data mining provides the documentation. Video is the evidence.”

Alongside Hosted BI, March Networks also announced it has expanded its VideoSphere Intelligent Video Management portfolio to include camera and encoder platforms incorporating H.264 compression technology and video analytic features.

The MegaPX camera streams high resolution video (1280 x 720 pixels) at up to 30 fps over standard IP networks. In addition to H.264 compression the camera uses progressive scan technology to ensure clear images in either bright or low-light conditions.

March Networks’ VideoSphere intelligent video analytics suite now features enhancements that expand behavioral analysis capabilities and streamline setup and configuration. VideoSphere analytic applications detect and track a wide range of events, alerting organizations to potential threats and providing valuable insight into customer and employee behaviors, staffing levels and other operational activities.

About the Author

Steven Titch is editor of Network-Centric Security magazine.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3