Cloudy with a chance of AI

CCTV Handbook 2019 Editor's Choice, Surveillance, Integrated Solutions

Talking about artificial intelligence (AI) in the surveillance business is nothing new as we have seen many companies promoting what they are doing with AI to enhance their video analytics offerings. One local company has developed an AI solution that can be added to existing surveillance installations, offering 24-hour alerts when certain conditions are met.

Based in Cape Town, Deep Data offers customers AI software designed to recognise objects or events and raise an alarm. At a basic level, on-camera software can recognise traditional analytic objectives, such as motion detection. However, for the full AI functionality, the system reads the H.264 RSTP (Real Time Streaming Protocol) streams from cameras, and sends frames to the Deep Data cloud server where it is analysed in more detail to offer more value to the client. It can work with all types of cameras – optical, thermal or infrared.

Dr Jasper Horrell, CEO of Deep Data, says the AI system can recognise a variety of different objects (25 at the time of writing) and accurately decide whether to raise the alarm or whether the event is a false alarm. For example, family pets or a motorised lawnmower will not raise the alarm, but a strange vehicle or intruder would.

The system runs on a cloud model where the AI analysis is done on Deep Data’s cloud service. One reason for the cloud model is to train the AI and thereby constantly improve it. This means that whatever is learned from one camera is added to the AI database and is then available to all cameras. Customers’ personal information is not shared, but the ‘learnings’ the AI achieves are incorporated into systems to improve recognition and decision-making for all Deep Data’s customers. As AI is supposed to, the system continually learns and improves over time.

Horrell adds that, depending on customer needs, Deep Data can also deploy a hub on site, in a control room for example, to speed recognition and response times, and to save on bandwidth costs. Similarly, information learned in this model is fed back to the main AI engine. It’s worth noting, however, that the average response from the cloud model takes between two to five seconds, so the company’s developers have made sure the cloud architecture does not delay security activities.

Action alerts

When the system detects a threat, it can send an alarm notification to the control room, or a web interface on someone’s computer (such as a home owner who wants their residence monitored), or to a mobile device – or all of these options. Using the open-source messaging application Telegram, the system can be tasked with alerting one person or groups of people depending on what is detected and where. Integration with video management systems is also possible, making it an ideal add-on to existing surveillance installations.

Deep Data applications

There is an unarguable need for more intelligent analytics in the security surveillance industry and some of the areas Deep Data can add value in include:

• Intruder detection for homes, businesses, farms, etc.

• Off-site monitoring.

• Perimeter monitoring.

• Intelligent surveillance monitoring.

• Situational awareness (e.g. people entering pool area, staff arrival).

• Neighbourhood watches and more.

In addition to security, the AI system can also add value to non-security functions. Some of these include:

• Building or property management.

• Production monitoring.

• Health and safety compliance monitoring (making sure helmets or safety glasses are worn in specific areas, etc.).

• And it can even monitor issues such as seatbelt usage or drivers using mobile phones while driving.

Deep Data sells its AI system as a service through resellers, charging a monthly fee per camera stream. Customers can choose the cloud model or a hybrid solution which installs a hub on the customer’s site. There are currently about 1400 cameras on the system at the moment.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.