Security Sales & Integration September 2022 - 67
offer their clients for weapons detection. Here is
a snapshot of the most common ones:
HUMAN MONITORING
Human monitoring includes the traditional
method of having a person watch cameras for
suspicious activity. While this sounds good in
theory, the reality is that less than 1% of all
surveillance video is actually watched live and
according to a study by Security Oz, 45% of activity
is missed after 12 minutes of continuous
video monitoring.
These results only get worse the longer a human
is watching the video because the same
report states that 95% of activity can be overlooked
by monitors after just 22 minutes. And
finally, all of these stats drop precipitously the
more screens a person has to monitor.
METAL DETECTION
Metal detection uses technologies that are capable
of penetrating clothing and other forms
of concealment such as baggage. These systems
often use some form of acoustic or electromagnetic
energy akin to radar, including micrometer
and millimeter waves. The advantage of
these systems is that they are highly preventive
since they can detect hidden weapons and constrain
the movement of people carrying them.
Unfortunately, the technologies used are
most effective over a very short range, so they
are normally installed in corridors and entryways,
such as the detectors we experience in airports,
courthouses and some office buildings.
In addition, every detection requires in-person
human verification through wanding or
pat-downs, and the systems are expensive to
install and require specialized training and constant
staffing. Furthermore, the usage of these
technologies can adversely affect the visitors to
such spaces and can be unattractive options for
many use cases.
GUNSHOT DETECTION
Gunshot detection works by using geographically
dispersed microphones to listen for gunshot
sounds and algorithms to determine the location
of gunfire. Microphones, spread throughout a
defined area, are tuned to recognize the sound
of gunshots and use the delay of those sounds to
approximate the gunshots' origination site.
Regional centers with audible experts verify
potential gunshot sounds and then escalate
valid detections. The benefit of gunshot detecsecuritysales.com
SEPTEMBER
2022 Security Sales & Integration 67
tion is its ability to provide intelligence to law
enforcement and other security organizations,
including the rough location of the incident, as
well as the number of shots fired. This audible
approach can be employed to cover a substantial
area, such as a downtown zone suffering
from high levels of gun violence.
The downside of gunshot detection is its timing
because detection can only occur " after the
fact " - once shots have already been fired. As
such, gunshot detection is not preventive, but
rather a " response improvement " technology.
VISUAL DETECTION
Visual detection uses AI software to recognize
a gun in various positions and environments,
such as a gun held in a hand or resting on a
table, or a gun on a sunny day, as well as one
inside a darkened hallway. This type of software
protects a company's earlier investments in video
surveillance because it can be easily integrated
into existing IP-based security cameras.
As the system grows, so does the software's
ability to detect. And while the accuracy and
efficiency are impressive, the real value of AI
comes in its speed and the advance warning it
provides when gun threats are detected. Within
mere seconds, AI is able to detect a gun and,
when connected to a notification system, can
alert security teams and carry out protocols that
promote the safety of those vulnerable.
While emergency notification systems vary
in sophistication, they can be set up to trigger
alarms, call emergency services, lock doors and
send out mass notifications to a variety of endpoints.
The downside to this solution is that the
gun has to be visible to be detected. However,
many incidents involve a period of " staging "
with guns removed from carriers and prepared,
Within mere
seconds, AI is
able to detect a
gun and, when
connected to
a notification
system, can alert
security teams
and carry out
protocols that
promote the
safety of those
vulnerable.
Visual detection uses AI
software to recognize a gun
in various positions and
environments.
COURTESY OF OMNILERT
http://www.securitysales.com
Security Sales & Integration September 2022
Table of Contents for the Digital Edition of Security Sales & Integration September 2022
Security Sales & Integration September 2022 - Bellyband 1
Security Sales & Integration September 2022 - Bellyband 2
Security Sales & Integration September 2022 - Cover1
Security Sales & Integration September 2022 - Cover2
Security Sales & Integration September 2022 - 1
Security Sales & Integration September 2022 - 2
Security Sales & Integration September 2022 - 3
Security Sales & Integration September 2022 - 4
Security Sales & Integration September 2022 - 5
Security Sales & Integration September 2022 - 6
Security Sales & Integration September 2022 - 7
Security Sales & Integration September 2022 - 8
Security Sales & Integration September 2022 - 9
Security Sales & Integration September 2022 - 10
Security Sales & Integration September 2022 - 11
Security Sales & Integration September 2022 - 12
Security Sales & Integration September 2022 - 13
Security Sales & Integration September 2022 - 14
Security Sales & Integration September 2022 - 15
Security Sales & Integration September 2022 - 16
Security Sales & Integration September 2022 - 17
Security Sales & Integration September 2022 - 18
Security Sales & Integration September 2022 - 19
Security Sales & Integration September 2022 - 20
Security Sales & Integration September 2022 - 21
Security Sales & Integration September 2022 - 22
Security Sales & Integration September 2022 - 23
Security Sales & Integration September 2022 - 24
Security Sales & Integration September 2022 - 25
Security Sales & Integration September 2022 - 26
Security Sales & Integration September 2022 - 27
Security Sales & Integration September 2022 - 28
Security Sales & Integration September 2022 - 29
Security Sales & Integration September 2022 - 30
Security Sales & Integration September 2022 - 31
Security Sales & Integration September 2022 - 32
Security Sales & Integration September 2022 - 33
Security Sales & Integration September 2022 - 34
Security Sales & Integration September 2022 - 35
Security Sales & Integration September 2022 - 36
Security Sales & Integration September 2022 - 37
Security Sales & Integration September 2022 - 38
Security Sales & Integration September 2022 - 39
Security Sales & Integration September 2022 - 40
Security Sales & Integration September 2022 - 41
Security Sales & Integration September 2022 - 42
Security Sales & Integration September 2022 - 43
Security Sales & Integration September 2022 - 44
Security Sales & Integration September 2022 - 45
Security Sales & Integration September 2022 - 46
Security Sales & Integration September 2022 - 47
Security Sales & Integration September 2022 - 48
Security Sales & Integration September 2022 - 49
Security Sales & Integration September 2022 - 50
Security Sales & Integration September 2022 - 51
Security Sales & Integration September 2022 - 52
Security Sales & Integration September 2022 - 53
Security Sales & Integration September 2022 - 54
Security Sales & Integration September 2022 - 55
Security Sales & Integration September 2022 - 56
Security Sales & Integration September 2022 - 57
Security Sales & Integration September 2022 - 58
Security Sales & Integration September 2022 - 59
Security Sales & Integration September 2022 - 60
Security Sales & Integration September 2022 - 61
Security Sales & Integration September 2022 - 62
Security Sales & Integration September 2022 - 63
Security Sales & Integration September 2022 - 64
Security Sales & Integration September 2022 - 65
Security Sales & Integration September 2022 - 66
Security Sales & Integration September 2022 - 67
Security Sales & Integration September 2022 - 68
Security Sales & Integration September 2022 - 69
Security Sales & Integration September 2022 - 70
Security Sales & Integration September 2022 - 71
Security Sales & Integration September 2022 - 72
Security Sales & Integration September 2022 - 73
Security Sales & Integration September 2022 - 74
Security Sales & Integration September 2022 - 75
Security Sales & Integration September 2022 - 76
Security Sales & Integration September 2022 - 77
Security Sales & Integration September 2022 - 78
Security Sales & Integration September 2022 - 79
Security Sales & Integration September 2022 - 80
Security Sales & Integration September 2022 - 81
Security Sales & Integration September 2022 - 82
Security Sales & Integration September 2022 - 83
Security Sales & Integration September 2022 - 84
Security Sales & Integration September 2022 - 85
Security Sales & Integration September 2022 - 86
Security Sales & Integration September 2022 - 87
Security Sales & Integration September 2022 - 88
Security Sales & Integration September 2022 - Cover3
Security Sales & Integration September 2022 - Cover4
https://www.nxtbook.com/emerald/securitysales/august_2023
https://www.nxtbook.com/emerald/securitysales/july_2023
https://www.nxtbook.com/emerald/securitysales/june_2023
https://www.nxtbook.com/emerald/securitysales/may_2023
https://www.nxtbook.com/emerald/securitysales/april_2023
https://www.nxtbook.com/emerald/securitysales/march_2023
https://www.nxtbook.com/emerald/securitysales/february_2023
https://www.nxtbook.com/emerald/securitysales/january_2023
https://www.nxtbook.com/emerald/securitysales/december_2022
https://www.nxtbook.com/emerald/securitysales/november_2022
https://www.nxtbook.com/emerald/securitysales/october_2022
https://www.nxtbook.com/emerald/securitysales/september_2022
https://www.nxtbook.com/emerald/securitysales/august_2022
https://www.nxtbook.com/emerald/securitysales/july_2022
https://www.nxtbook.com/emerald/securitysales/june_2022
https://www.nxtbook.com/emerald/securitysales/may_2022
https://www.nxtbook.com/emerald/securitysales/april_2022
https://www.nxtbook.com/emerald/securitysales/march_2022
https://www.nxtbook.com/emerald/securitysales/february_2022
https://www.nxtbook.com/emerald/securitysales/january_2022
https://www.nxtbook.com/emerald/securitysales/december_2021
https://www.nxtbook.com/emerald/securitysales/november_2021
https://www.nxtbook.com/emerald/securitysales/october_2021
https://www.nxtbook.com/emerald/securitysales/september_2021
https://www.nxtbook.com/emerald/securitysales/august_2021
https://www.nxtbook.com/emerald/securitysales/july_2021
https://www.nxtbook.com/emerald/securitysales/june_2021
https://www.nxtbook.com/emerald/securitysales/may_2021
https://www.nxtbook.com/emerald/securitysales/apr_2021
https://www.nxtbookmedia.com