Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Security

Can Integrated Security Catch A Thief, Or A Terrorist?


IBM Tuesday introduced digital video surveillance technology straight from its labs that furthers the trend of integrating IT and physical security systems. The Smart Surveillance system, developed by the Exploratory Computer Vision Group in IBM T.J. Watson Research Center is a piece of middleware for use in camera, radar, chemical-sensor, or audio-based surveillance systems that uses computer algorithms and analysis to detect suspicious activity and send up red flags when necessary.

Using Smart Surveillance, a truck parked in the wrong area of an airport, an airline passenger attempting to enter through an exit corridor, or a customer removing an item from a shelf and walking past the cashier line without stopping would all initiate pages, text messages, and other alerts to security personnel, who could then act immediately to head off trouble.

IBM has already been using its Smart Surveillance system as part of its internal security systems and has demonstrated the technology to a handful of government agencies, law enforcement units, and companies. IBM early next year will include the Smart Surveillance middleware's advanced analytical capabilities as part of the company's oxymoronically named Digital Video Surveillance Service Product, which is really more of a service than a product. The Digital Video Surveillance service is currently available, and includes IBM servers and storage hardware, Tivoli Storage Manager and other software, and, of course, services.

Another important aspect of Smart Surveillance and the new service will be the ability for security professionals to use the technology to more quickly and efficiently search archived digital video footage. The tedium of scanning hours, sometimes days, of footage delays security investigations and is much less precise than using an algorithm to search for a specific image, something IBM promises to deliver with its Digital Video Surveillance service.

Digital Video Surveillance is designed to connect surveillance equipment over an IP network with retail point-of-sale and inventory systems and have access to customer and employee data. This is good news for retailers as the holiday season approaches, as IBM says that industry loses nearly $50 billion annually due to fraud, theft, and administrative error.

IBM isn't the only major player in the market for integrated digital and physical security. Cisco has made moves over the past few years to deliver converged network and physical security. In September, Cisco expanded its Intelligent Converged Environment lineup through a new interface that will add IP-based access control and unified identity management capabilities to Assa Abloy AB's badge readers and door lock components featuring that company's Highly Intelligent Operation lock-technology. Cisco created its Intelligent Converged Environment unit in April after acquiring SyPixx Networks, a maker of video surveillance software and hardware.

Imprivata Inc. this month begins shipping the latest version of its OneSign appliance for integrating physical and IT security. Version 3.5 improved the appliance's single sign-on and authentication management capabilities and uses the standards-based Service Provisioning Markup Language, or SPML, interface to allow a company's user-provisioning system to create and maintain user accounts, applications, and authentication credentials within OneSign. "We capture the event of entering the building and feed that event to correlate with your identity in the system," says Imprivata president and CEO Omar Hussain. "In the past these systems generally haven't talked to each other."

OneSign also includes a built-in Remote Authentication Dial-In User Service, or Radius, server to let users access information remotely using passwords or a Digipass token from Vasco Data Security. OneSign can also manage combined password and Upek Inc. finger biometrics authentication, giving companies the ability to protect their systems and data using combined IT and physical security methods.

The challenge for IBM and other providers of smart-surveillance technology moving forward is to make the systems faster, cheaper, and scalable enough to connect all of the cameras in any given facility. "If you can only attach two cameras to a server, nobody's going to use that because it doesn't scale properly," says IBM Research Labs' CTO of security and privacy Charles Palmer.

Assuming the technology can scale to accommodate the sprawling security systems located throughout, say, an airport, converged IT and physical security promised improved defenses against the gamut of criminals, from small-time shoplifters to international terrorists.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.