AI delivers autonomous efficiencies

February 2019 Editor's Choice, Security Services & Risk Management

Active Track is a guard monitoring service provider that has captured a large share of the market for tracking and managing people. The company has now partnered with software development specialist Sugarplum Digital to improve the back-end of its operations with software enhanced by artificial intelligence (AI).

Active Track’s management device is a robust, handheld device that can be dropped (and should be dropped in emergencies as this action sends a panic alarm to the control centre) and knocked about in the rough guarding environment. It includes RFID, GPS and GSM functionalities, panic and silent call functions, and is supported via an online portal and 24-hour call centre. It also sports a battery life of up to 72 hours.

All activities captured by the device are transmitted to the company’s 24-hour control centre where they are monitored and, when emergencies occur, the operators can dispatch emergency response teams. As is common in all security control centres, operators are often tasked with dealing with false alarms or simple administrative tasks which takes their attention away from handling real emergencies.

Using Sugarplum Digital as its development partner, Active Track has updated its software to turn the system into a full management application instead of a guard monitoring system. Guards are still equipped with the Active Track devices, but the software now handles an expanded range of tasks autonomously, without needing human input.

As a simple example, Active Track’s Danie de Villiers explains that the system used to alert the control room if a guard had not registered their device at a certain location within a set time. An operator would then have to contact the guard or a supervisor to try to resolve the situation according to the client’s operating processes (OPs). Now the system recognises the problem, learns from the environment over time and follows the OPs without requiring human intervention.

The AI enhancements go further and impact almost all areas of the company’s operations, taking the boring tasks such as submitting reports to clients. It provides customers with a higher level of visibility into their security operations, tailoring its reports and communications to the person in question.

Sugarplum Digital’s Gerhard Furter says the AI system is not simply programmed to do routine jobs. It collects data and analyses it in real time, and is continually learning what is normal, what is out of the ordinary and what constitutes a real emergency – it’s like an occurrence book that is continually being monitored, updated and analysed. It then deals autonomously with the non-critical events, leaving trained human operators to focus on responding to important events and alarms. It is able to detect patterns emerging over longer periods of time in each environment Active Track manages in order to provide additional insights to the operators and/or the client.

Also designed and built by Sugarplum, Active Track is also in the process of building its own voice controlled chatbot. People will be able to communicate with the bot by speaking, and once again the AI system will automatically handle routine questions and tasks without needing human input. Sugarplum is rolling out a similar application to a manufacturer that will soon be able to take and fulfil orders autonomously.

For more information contact:

• Active Track, +27 11 551 1687, info@activetrack.co.za, www.activetrack.co.za

• Sugarplum Digital, gerhard@sugarplums.co.za, www.sugarplums.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.