Real-time applications for the security of facilities and other assets will spawn highly agile, reactive security systems that surpass what is possible with traditional security protocols.
A real-time application for security enables businesses and individuals to behave proactively rather than reactively to security threats. Using event-driven data, a real-time application can sense, at any given time, the status of the security of your assets, analyze if anything is wrong, and enable you to take action from a remote or on-site location in real time.
Common security pains seen in the past have been hard to overcome: timeliness of reaction to threats; complexity of highly-distributed connected systems, clouds, sensors, and monitors; and difficulty to enable collaboration between humans and automated systems when unusual or hard-to-predict situations occur.
In the following video, see how a real-time application using video analysis and facial recognition can be implemented in any given facility. A real-time application takes advantage of available data streams to provide a number of security and compliance-related capabilities.
Starting with visual identification, cameras are located in strategic positions at a facility such as the entrance, perimeter, data centers, high-security clearance areas, etc. The raw camera feed is coupled with image processing to detect faces, and then recognize employees or non-employees, and estimate their approximate age, emotion, gait, and habits. The data is gathered and the application creates catalogues of guests, employees, intruders, etc.
Then, the data is compared with schedules or itineraries to assure all personnel are not only members of the facility, but are also present in appropriate locations at allowed times. The location of each person is tracked via a 3D map of the building that can be viewed on a mobile device or on site by security personnel or other authorities.
Depending on the setup of the application, personnel can be flagged based on their behavior. For example, a guest being viewed as angry could activate a notification sent to security including where and when the person was detected, along with other relevant data. If the system is triggered by an intruder, the integrated security system can be activated remotely and in real time at a point of breach. It could then automatically lock doors, shut down vital servers, shut off electricity, and/or notify authorities via a mobile app to ensure the unauthorized entrant does not escape with confidential information, valuable assets, or worse.
The application you see in the video above was created using the new breed of high-productivity, rapid development tools for event-driven applications by a single developer in approximately 10 days. It can be deployed in minutes and easily scale to multiple locations and hundreds of cameras.
Real-time security applications ensure that all the data relating to the protection of facilities and assets is used at the present moment when it is most valuable. Actions can then be direct in real time as the relevant data continues to flow in. Therefore, real-time applications for security will become more vital as breaches and issues become more complex and critical.