Facial biometrics for quicker investigations

July 2016 Surveillance, Infrastructure, Products & Solutions

Tyco Security Products introduces facial biometrics within VideoEdge video surveillance systems for immediate detection and verification of individuals.

With Face Detection analytics, operators can be proactively notified that the surveillance system has detected a person of interest, for example, known criminals, ex-employees, VIPs or other persons of importance. This technology can be useful in protecting stock and assets by alerting security to potential risks much sooner than normal, to increasing customer retention by alerting the store manager to greet an important customer entering the store.

Face detection is built into the VideoEdge network video recorder (NVR), eliminating the need for external servers dedicated to powering the analytics. Up to 1 000 individuals can be easily enrolled and stored in VideoEdge’s on-board database, with the ability to store multiple faces for each person in the system for the highest possible accuracy in identification.

Face detection analytics can also be used ‘post-event’ to speed investigation times by searching video only for specific persons, enabling operators to search video for certain criteria – for example, those individuals who had access to the surrounding area of the incident. Known faces can also be enrolled with video associated for faster future investigations. For example, a retail store can add a photo of a shoplifter at one of its locations to the database so he/she can be seen across the enterprise of sites. If that person enters another store location, operators receive an instant alert to take action to aid in preventing costly shoplifting occurrences.

When used in conjunction with the C•CURE 9000 security and event management system and the victor Unified client application, operators and guards can be visually alerted if a mismatch is detected between the live video image and the stored access control credential image of a card which has just been used on the system. Visual verification of the cardholder greatly increases security to the most vulnerable areas of a business.

For more information contact Tyco Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
International access manufacturer sets up shop in SA
Technews Publishing Access Control & Identity Management News & Events Products & Solutions
The South African security market can always use some good news, and this year, STid has obliged by formally entering the South African market, setting up its main office in the Boomgate Experience Centre in Roodepoort, Johannesburg.

Read more...
Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Read more...