Subscribe to RSS - Machine Learning

Machine Learning

Looking back to look forward at ISC West 2020

 - 
Wednesday, February 26, 2020

Having had the privilege of attending three shows during February, I’ve heard this phrase most: “It’s hard to believe that ISC West is already here!” And, quite frankly, I couldn’t agree more! 

As I think back to last year’s ISC West, there were three key trends that resonated with me: 1. deep learning, artificial intelligence (AI) and machine learning (ML); 2. video doorbells; and 3. RMR for integrators. 

Last year, right after ISC West, I reached out to some experts to gather their thoughts regarding these trends. Here’s some of the responses I received to help whet our appetites for ISC West 2020: 

(I wonder how these trends have evolved over the course of about a year; I’m excited to find out in less than a month!) 

How is deep learning/AI/ML currently enhancing the security industry? 

“It’s hard to say … it’s an overused buzzword that is difficult to actually nail down what it means or what it’s doing. Future … likely … now … unlikely.” 

— Mark Hillenburg, executive director of marketing, Digital Monitoring Products

“Deep Learning, a subset of AI research, is primarily helping the security industry in the world of video surveillance/video management. Video is typically the largest source of unstructured data, data with no predefined format on the information contained inside, so in order to process out people, objects, events, etc., typically requires a large amount of processing power and can be very costly. Most of the world’s video typically is recorded and not watched because the manpower to review the amount of video recorded is impossible to achieve. 

Computers are very adept at repeated tasks, such as processing video; however, traditional algorithms for computer vision, the realm of research into video and image processing, were not really able to scale to that high volume without massive computation resources investment. The computer vision research world has really seen a large improvement in the advances deep learning is bringing in terms of increased speed to results, increased accuracy and reduced computation requirement. This will likely continue as time progresses, but the deep learning revolution for video can bring actionable information in previously unmonitored video to operations at a very powerful pace.”  

—Dr. Sean Lawlor, data scientist, Genetec Inc. 

“AI is used today in the security industry to perform tasks like facial recognition and video analytics. While these are impressive accomplishments, they are still atomic in nature in the sense that they represent isolated inputs to the system as a whole.” 

—Paul Saldin, vice president of engineering, Alula

“There has been tremendous progress in video analytics through deep learning and artificial intelligence that surpasses anything created so far. Facial recognition, license plate readers and even things like hard hat and safety glass detection now are a reality. These processes not only enhance security by providing detailed information on who many be coming or going at a business and at what exact time, but they can also improve operations and safety.” 

—Robert Messer, president, ABP Technology 

“Technology advances from deep learning and AI can help improve the accuracy in intrusion detection, and help to reduce false alarms. The security system needs to know when a homeowner is home or away, and needs to track occupants’ movements to initiate activities across the home. Features like smart sensors, geofencing, voice controls and facial recognition have been making systems more intelligent. And, as security continues to integrate with home automation, we’ll see the home become more capable of anticipating the needs of its occupants.” 

—Alice DeBiasio, vice president and general manager, global residential security, Resideo

“Deep learning and AI are making smart security smarter based on data analytics, sample teaching, and intelligent decision making. In other words, it isn’t enough for security devices to simple collect large volumes of data, which they are certainly capable of doing. Deep learning and AI methods can help analyze that data and separate what is important from what is not — or analyze the data to uncover deeper trends and more complex information that the collected data alone cannot. Take video analytics, for example. AI powered video analytics are event-based solutions that apply deep learning and artificial intelligence, efficiently analyzing vast amount of data generated by videos, and generates quick response in real time. This system reduces manual monitoring and associated costs and increases productivity of video surveillance systems. Through the application of AI, video analytics can go far beyond just informing users that a person or other object has entered an unauthorized space. With the information collected from a large number of cameras, companies can apply facial recognition software to identify a specific person approaching a building. In addition, by running analytics, a company can not only alert the user to an unauthorized vehicle approaching a building but can also scan the license plate, giving the security officers information that can be checked with existing databases to determine potential-threat status.”

—Joe Liu, CEO, Miotta

Why are video doorbells so popular among consumers? 

“Marketing and promotion and the proliferation of video as ‘security.’ In reality, security prevents someone from stealing your stuff … where video just lets you know who did it. Video doorbells are very popular, but after living with one for almost two years, I’ll be interested to see if there is a market demand for a second generation of owners. Once you have one, will you spend the money the second time? We will wait and see.”

— Mark Hillenburg, executive director of marketing, Digital Monitoring Products

“Video doorbells are set to experience massive adoption in the security industry in 2019, and it’s no mystery why. Customers love being able to monitor their front door remotely and protect deliveries from would-be porch pirates. This also naturally extends the perimeter of protection for homeowners, and when paired home automation for locks, video doorbells can assist to enable greater access controls for engagement and remote entry management. That said, not all video doorbells are created equal. If you don’t have a fast network on the backend, you’ll experience late alerts and lag during two-way voice chat, which compromises the functionality. You really need a fully integrated system to get the most out of this popular technology.” 

—Brad LaRock, vice president of marketing, Alula

“Situational awareness has always been one of the key attractants in surveillance solutions and video doorbells give us another means to improve our situational awareness. Just like with our businesses, we all want to protect our homes and now what is going on. And, we are also ‘linked in,’ so to speak. Our smartphones, tablets and computers are essentially a part of us and if we can use those devices to see who is at the door and respond in real time, then it makes life for us that much easier.” 

—Robert Messer, president, ABP Technology

“Video doorbells have been a popular trend in the industry and continue to gain momentum. They solve an immediate need, and more consumers are asking for them. Homeowners see the value in being able to see and speak to visitors, and have access through their mobile devices. Dealers should be including video doorbells on every installation.” 

—Alice DeBiasio, vice president and general manager, global residential security, Resideo

What does your company offer in terms of RMR for your integrator partners?

“Recurring monthly revenue (RMR) is the lifeline savvy systems integrators seek to stay profitable, and it can be found in many different technologies, including power solutions. For the end-user customer, managed power solutions offer a value-added solution that ensures system uptime, integrity and reliability. The possibilities to perform managed power services can encompass many physical elements: the main power supply; power system outputs; supervised inputs; and standby batteries. Managed monitoring can include event reports; AC loss notification; service due reminders; overcurrent alert; low-battery warning; and insufficient battery standby. Remote servicing capabilities of power solutions can cover output supervision; battery load testing; remote power cycling; and system health log/trouble alerts. There is also the opportunity to create real-time action alerts and reports via email, XML, web-browser notification or Simple Network Management Protocol (SNMP).” 

—Michael Bone, marketing manager, LifeSafety Power, Inc.

“Mobile medical alerts are a natural fit for security companies. Adding medical alerts expands your security offerings and increases perceived value for your customers because you now offer safety and peace of mind for your customers both at home and away. Security companies have an established customer base comprised of safety-minded individuals who may need medical alert themselves, and there are scores of new customers opportunities available through referrals because each existing customer has a relative or friend who could use a medical alert device.” 

—Craig Pyle, VP of product, Freeus

“March Networks currently offers RMR models to our certified partner community through two hosted services offerings: March Networks Insight and March Networks Searchlight as a Service. Both soutions provide customers with flexible service terms and payment options, and help integrators reduce service costs through expert video system health monitoring support delivered via March Networks’ secure Network Operations Center (NOC).”

—Dan Cremins, global leader, product management, March Networks

“Video is a major driver for new RMR and we are leaning into that opportunity. Our modular approach also means that our partners don’t pay for home automation capabilities unless they will be getting additional RMR from their customers for those services. Because we are vertically integrated and own the network, more of the RMR goes into the integrator’s pocket rather than a third-party provider. All our services are provided at a wholesale rate with no stipulation on what the integrator can charge their customers, so they set their own pricing and can reap the RMR that their market will bear.” 

—Dave Mayen, vice president of product management, Alula

“ABP Technology offers an advanced platform for integrators that allows them to offer customers basic cloud services as well as their own service and value. That means that integrators now can sell their skills integrating, tuning and maintaining their systems”

—Robert Messer, president, ABP Technology

“As the residential security landscape continues to evolve, there is an increasing opportunity for RMR around smart home technologies. Our products are connecting the major systems of the home – on the exterior, behind the wall, on the wall and in the cloud. We believe the security dealer is best positioned to win in the smart home market, and we’re fully committed to helping them deliver the connected experience their customers demand.”

—Alice DeBiasio, vice president and general manager, global residential security, Resideo

“Miotta offers an ‘in-a-box self-configuring connected system’ and collaborative Video-IoT RMR security service for security integrators/operators to offer to their residential and enterprise customers. Miotta’s mobile-cloud ‘virtual’ security service platform allows integrators, security dealers, ISP’s, mobile carriers and more to offer mobile-cloud security services to both residential and enterprise customers.”

—Joe Liu, CEO, Miotta

Artificial Intelligence (AI) necessary to respond to cyberattacks

 - 
Wednesday, July 24, 2019

Being born in the late 70s, it’s been amazing to watch the evolution of computers, the Internet, cyber and the like. I remember sitting in my junior high computer class—7th grade, I believe. Working with Basic on an Apple 2e, I created white coding on a black screen that made a man (stick figure) jump, dance and run when the user got the correct answer to the math problem presented on the screen. That, my friends, was high tech! 

Now, the graphics are realistic and some even interact with voice; data is being produced and shared at the rate of zettabytes; and computers are turning into machine learners, all of which is absolutely amazing but at the same time scary as bad people have turned it into a free-for-all of mass hacking that is detrimental to people and society. 

Human security experts work tirelessly each and every day to keep people like you and me, and the world safe; however, being human, they have their limits. For example, cybersecurity involves repetitiveness and tediousness, scouring through big data to identify anomalous data points; long, exhausting hours of data analysis; and relentlessly monitoring data going in and out of enterprise networks. Enter the age of artificial intelligence (AI) penetrating into the cyber realm in terms of security, obviously known collectively as cybersecurity. Working along-side humans, AI can complement cybersecurity by performing the repetitive, tedious tasks; it can be trained to take predefined steps against attacks and learn the most ideal responses going forward; and AI is fast and accurate with data analysis. This enables and empowers human security experts to use their talents and skills on other projects to further enhance cybersecurity. 

Capgemini, a global leader in consulting, technology services and digital transformation, recently published “Reinventing Cybersecurity with Artificial Intelligence Report,” finding 61 percent of enterprises said they cannot detect breach attempts today without the use of AI technologies. That’s over half of the 850 senior executives surveyed from IT information security, cybersecurity and IT operations in seven sectors across 10 countries. And if that’s not eye-opening enough, check out these findings: 

  • 69 percent believe AI will be necessary to respond to cyberattacks; 
  • 73 percent are testing AI use cases for cybersecurity; 
  • 64 percent said AI lowers the cost and reduces overall time taken to detect and respond to breaches by 12 percent; and
  • 56 percent said their cybersecurity analysts are overwhelmed and approximately 23 percent are not able to successfully investigate all identified incidents. 

With numbers like these, it’s easy to see AI and machine learning are essential to cybersecurity now and into the future. So, here at SSN, we’ve taken a huge step to bring you the latest and greats cybersecurity news with the addition of a “cybersecurity” tab on our website. Yep, that’s right … a whole section dedicated to all things cybersecurity!

To get a taste of our cybersecurity content check out the articles “Federal government aims to modernize physical security practices” and “Data forensics: time is of the essence,” and as always, we value your feedback. 

 

 

Honeywell enters into brave new world of AI

SSN speaks with company about working with Intel and overall vision for AI
 - 
05/22/2019

ATLANTA—Following the recent announcement of its technology integration with Intel, which will enable new artificial intelligence (AI) capabilities in its MAXPRO connected security platform, it is clear that Honeywell is jumping with both feet into the brave new world of AI.

Open Security & Safety Alliance membership doubles; open platform initiatives surge forward

 - 
05/07/2019

SAN RAMON, Calif.—In the Fall of 2018, five companies — Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco by Schneider Electric and VIVOTEK, Inc. — came together for the good of the open platform community, becoming founding companies of the Open Security & Safety Alliance (OSSA), or simply, “the Alliance.”

AI coming to the aid of security-related applications

 - 
Wednesday, March 20, 2019

Our May 2019 News Poll got me really thinking about Artificial Intelligence (AI) and Machine Learning (ML), and the possibilities. My previous AI-related thoughts have been around Watson, the IBM-created, question-answering computer system that answers in natural language, and robots, and how AI can take over the world one day, according to some! Spooky! But, I wanted to know if AI is a legit, practical application for security-related functions, so I scoured the internet and found some exciting and unique, currently deployed uses. 

Physical Security

According the to China Morning Post, AI is revolutionizing physical security in Asia. It can detect people acting out of the ordinary and flag them, and then transmit that information to a command center, where human operators can make an informed decision. Additionally, AI and high-definition cameras can work together to first communicate to a human that a smoke detector, for example, has been activated, with the cameras identifying the exact location of the fire. 

Financial Security

Shoplifting literally costs billions of dollars here in the United States, which trickles down to honest consumers who end up paying more for goods and services. Vaak, a Tokyo-based company, spent more than 100 hours showing their AI system closed-circuit television footage of honest shoppers and shoplifters. The system can now identify suspicious activity based on more than 100 aspects of shoppers’ behavior including gait, hand movements, facial expressions, clothing choices and even “restless” and “sneaking” behaviors. Store employees are alerted of suspiciousness via an app and they can decide what to do. 

Life Security

Paris-based startup, Pharnext, was founded by Daniel Cohen, who “mapped” the human genome and demonstrated it is possible to use Big Data and automation to speed up the processing of DNA samples. Today, Cohen is using AI to analyze and map the chain of reactions of disease in the body. With this information, he and his team are combining existing drugs, known as “repurposing,” to create therapeutic effects that each drug lacks on its own. His overall goal is to use existing medicines to treat all disease, preventing the design of new medicines. 

Cybersecurity

Post-doctoral research fellow at Stanford University, Dr. Srijan Kuman, is developing an AI method — REV2 — to identify online conflict using data and machine learning to predict internet trolling before it happens. (Trolling is an action by a person who posts inflammatory and often deceptive and disinformation online to provoke others to respond on pure emotion.) Kuman uses statistical analysis, graph mining, embedding and deep learning to determine normal and malicious behaviors. His method is currently being used by Flipkart, an online store, to identify fake reviews and reviewers, and he was able to accurately predict when one Reddit community will troll another. 

Be sure to check out our editor’s blog that talks about worldwide spending on AI systems to reach $35.8 billion in 2019, according to International Data Corporation. 

 

New tech holds the key to stopping cybercrime, study finds

 - 
Tuesday, February 12, 2019

You don’t have to look too hard to find a sobering example of cybercrime, as it's as pervasive as ever these days, even on the national level with recent reports that cyber criminals have access to critical infrastructure such as our national power grids and gas lines. The good news, though, is technology may be our best weapon against these invisible criminals.

In fact, the use of big data and blockchain technologies are key to fighting cybercrime, according to a new study from Frost & Sullivan that looks at how effective machine learning is in aiding early detection of cyber anomalies, and how good blockchain is at creating a trustworthy network between endpoints.

Frost and Sullivan noted that the rise of the Internet of Things has opened up numerous points of vulnerabilities, compelling cybersecurity companies, especially startups, to develop innovative solutions to protect enterprises from emerging threats. As cybercrime becomes more sophisticated and even a method of warfare, the research firm found, technologies such as machine learning, big data, and blockchain will become prominent.

"Deploying Big Data solutions is essential for companies to expand the scope of cybersecurity solutions beyond detection and mitigation of threats,” Hiten Shah, research analyst, TechVision, said in the announcement of the findings. "This technology can proactively predict breaches before they happen, as well as uncover patterns from past incidents to support policy decisions."

The study, Envisioning the Next-Generation Cybersecurity Practices, presents an overview of cybersecurity in enterprises and analyzes the drivers and challenges to the adoption of best practices in cybersecurity. It also covers the technologies impacting the future of cybersecurity and the main purchase factors.

"Startups need to make their products integrable with existing products and solutions as well as bundle their solutions with market-leading solutions from well-established companies," noted Shah. "Such collaborations will lead to mergers and acquisitions, ultimately enabling companies to provide more advanced solutions."

Technologies that are likely to find the most application opportunities include:

•    Big Data: It enables automated risk management and predictive analytics. Its  adoption will be mostly driven by the need to identify usage and behavioral patterns to help security operations spot anomalies.
•    Machine Learning: It allows security teams to prioritize corrective actions and automate real-time analysis of multiple variables. Using the vast pools of data collected by companies, machine-learning algorithms can zero in on the root cause of the attack and fix detected anomalies in the network.
•    Blockchain: The data stored on blockchain cannot be manipulated or erased by design. The tractability of activities performed on blockchain is integral to establishing a trustworthy network between endpoints. Furthermore, the decentralized nature of blockchain greatly increases the cost of breaching blockchain-based networks, which discourages hackers.

Envisioning the Next-Generation Cybersecurity Practices is part of Frost & Sullivan’s global Information & Communication Growth Partnership Service program.