tial surveillance role, but people must
monitor the videos. Security guards, no
matter how professional they may be,
cannot monitor many video cameras at
one time and stay vigilant.
Video analytics software can detect
and analyze people while ignoring unrelated objects. It then tracks these objects reliably, taking into account perspective, size, speed, direction of travel,
and distance and generates an alarm
when specific conditions are met, alerting a control
center. A control center operator can use a sound
system to warn trespassers to leave immediately. If
needed, a guard on premises can be sent to the area
or police can be notified.
Almost everything is automated. No longer does a
security guard need to watch every minute of video.
Instead, the video analytics software does the watching, detecting, defining, and notifying.
Biometrics Authentication by biometric verification is
becoming increasingly common in corporate and public
security systems. People use keys to get into their houses and passwords to log on to computers. If a person
loses a key or jots a password on a piece of paper, other
people can find those keys and that information and use
them. Biometrics uses physical characteristics, such as a
face, fingerprints, irises, or veins, or behavioral characteristics, such as voice or handwriting. Unlike keys and
passwords, personal traits are extremely difficult to lose
or forget. They can also be very difficult to copy. Biometrics is used as a form of identification and access control.
Facial and Behavioral Recognition
Now imagine that people won’t need
keys, cards, iris scans, fingerprint
scans or codes to enter a building.
Today’s innovative technology uses
biometric identification technologies,
including facial recognition, and behavior analytics. Biometric identification is a secure access solution that is
noninvasive, fast, and accurate. Authorized users do not have to slow
down, sign in, or stop. They are identified in motion
and granted seamless access to buildings and facilities while unauthorized users are barred access.
Expected and registered visitors can be sent unique,
encrypted codes, which they can show to a camera as
they approach the access point to allow a seamless user
experience. A database from local or national criminal
registries can alert security personnel of any entry attempt.
With today’s integrated and interactive security, real estate investors now have a perfect combination of guards
with technology that can provide a proactive solution to
security. By taking advantage of ground-breaking technologies, companies can rest assured that they have
the industry’s newest and most advanced innovations
necessary to address any security challenges today and
tomorrow, effectively reducing crime and protecting
people as they move through buildings and utilize their
Avi Lupo is President and CEO of Kent Technologies.
Video analytics software can detect and analyze
people while ignoring unrelated objects.