Anomaly detection in access control

Issue 7 2021 News & Events

Brivo has released Anomaly Detection in its flagship access control solution, Brivo Access. Anomaly Detection is a patent-pending technology that uses advanced analytics with machine learning algorithms to compare massive amounts of user and event data to identify events that are out of the ordinary or look suspicious and issues priority alerts for immediate follow-up.

With Anomaly Detection, businesses can get a nuanced understanding of security vulnerabilities across their facility portfolio and take action on early indicators of suspicious user behaviours that may otherwise go unnoticed.

"With Anomaly Detection, Brivo is incorporating the latest data and machine learning technology in ways never before seen in physical security," said Steve Van Till, founder and CEO of Brivo. "Along with our recently released Brivo Snapshot capability, Anomaly Detection uses AI to simplify access management by notifying customers about abnormal situations and prioritising them for further investigation. After training, each customer's neural network will know more about traffic patterns in their space than the property managers themselves. This means that property managers can stop searching for the needle in the haystack. We identify it and flag it for them automatically."

Anomaly Detection's AI engine learns the unique behavioural patterns of each person in each property they use to develop a signature user and spatial profile, which is continuously refined as behaviours evolve. This dynamic real-time picture of normal activity complements static security protocols, permissions and schedules. In practice, when someone engages in activity that is a departure from their past behaviour, Anomaly Detection creates a priority alert in Brivo Access Event Tracker indicating the severity of the aberration. This programmed protocol helps organisations prioritise what to investigate.

As more companies roll out hybrid work policies for employees, most businesses are poised to see a lot of variation in office schedules and movement. For human operators, learning these new patterns would take a tremendous amount of time, particularly analysing out-of-the-ordinary behaviours that are technically still within the formal bounds of acceptable use. With Anomaly Detection in Brivo Access, security teams can gain better visibility and understanding as the underlying technology continuously learns users' behaviours and patterns as they transition over time.

See more at www.brivo.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Grand theft telematics
News & Events
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
Here’s to a SMART 2026
SMART Security Solutions News & Events
This is the final news brief from SMART Security Solutions for 2025, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season.

Read more...
Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.