Casino adopts LiDAR security and sensors without privacy risks | Security News

2021-12-14 11:48:51 By : Ms. Amber Lu

Illustra Edge camera with onboard exacqVision recording software provides a complete IP solution

HID Signo Access Control Card Reader

Dahua Technology’s video and access control solutions improve the safety of Empresa Panamena de Alimentos Food Company’s facilities

G4S deploys Everbridge control center to accelerate the digital transformation of physical security in Abu Dhabi Global Market Square

Avolon chooses HID mobile access® to upgrade headquarters security

Leonardo brought the ELSAG Fixed Plate Hunter LPR system to ensure the safety of the building and its surroundings

Webcast: Access control integration improves security while reducing costs

Nedap Identification System Webinar: Safe and frictionless access to vehicles on industrial sites

Provide frictionless cloud video storage as a service (VSaaS)

Webcast: Save time and money with wireless access control

Use AEOS to achieve frictionless physical access control

The rise of ethical facial recognition

Internet Video Technology for Safe City

Casinos provide a variety of attractive applications for LiDAR, including security and business intelligence. Using laser sensors, this technology can replace the use of surveillance cameras.

For casino security, LiDAR can track players' movements and provide complete coverage and accuracy that cannot be achieved with surveillance cameras. Compared with other technologies, large-scale coverage area can save the cost of sensor deployment.

LiDAR is a method of determining the distance by aiming a laser at an object and measuring the time for the reflected light to return to the receiver. The LiDAR sensor emits pulsed light waves to the surrounding environment, and the pulse bounces off the surrounding objects and returns to the sensor. The sensor uses the time it takes for each pulse to return to the sensor to calculate the distance it has traveled.

LiDAR is commonly used in markets such as robotics, ground surveying and mapping, autonomous vehicles, and industrial IoT (Internet of Things). Today, casinos provide a lucrative emerging market for technology.

LiDAR tracking enables casino operators to understand guest paths, journeys, queue times, counts

LiDAR can provide intelligence on the size of the crowd by counting the number of people at the door or part of the game floor to track the occupancy rate, thereby contributing to the guest experience of the casino.

LiDAR tracking enables casino operators to understand guest paths, journeys, queue times, counts, and other statistics by comparing previous time frames with current occupancy rates. This method enables them to understand the layout of digital media advertising and experience.

Gerald Becker, vice president of market development and alliances at Quanergy, said: "In the casino, sensors are deployed like surveillance cameras.

"But they are not security measures, but are used to anonymously track all those who walk through the game hall. We can obtain centimeter-level accuracy of the location, direction and speed of the guests. With this data, we can learn from the path, the number of stays and other Some analytics visit the guest journey, which provides intelligence for operations and marketing to make better decisions about product placement or advertising."

Quanergy is a US-based company that manufactures its hardware in the US and develops its 3D perception software in-house. Quanergy has various integrations with third-party technology platforms (such as Video Management System (VMS)) for operational and business intelligence security and analysis.

Sensors can be installed in the hotel to monitor potential objects thrown from the hotel. LiDAR is deployed in external and internal applications. For the exterior of a casino or resort, sensors can be installed in the hotel to monitor objects that may be thrown out of the hotel, or people in areas that should not be present.

For example, they can sense and prevent access to rooftops or private areas that are not open to the public. Some customers install sensors around the entire private property to protect the residences of executives and/or VIPs.

Tracking the size of the crowd can initiate digital signage or other digital experiences throughout the hotel to guide guests to other destinations in the hotel. It can also help with queue analysis at the reservation/check-in desk or other areas where guests are queuing to tell the operator to open another line to keep the guests' past traffic. 

Traffic tracking and queuing functions can help casino operators understand which game groups are frequently used by customers, and allow optimization of customer routing to increase casino interaction and game time, thereby quickly affecting the casino's financial performance and returns.

LiDAR provides a point cloud; it creates the contours of moving or fixed objects in millions of small points in 3D space

The current main obstacle is market adoption. Becker said Lidar is an emerging technology, but it is widely known for these new use cases. He commented: "In addition to the traditional IoT sensors that are now available, the huge functions that can now be implemented in 3D will take some time to educate the market."

One of the benefits of LiDAR is that it does not bring personally identifiable information (PII) risks, so there are no privacy issues. This technique does not capture PII. The camera can capture images and transfer them to other applications via the network. However, LiDAR provides a point cloud; its millions of small points in 3D space create the contours of moving or fixed objects.

Becker said that from surveillance and security to marketing and operations, people are very interested. "LiDAR will soon become part of the IoT security strategy for countless casinos. It will be common practice to see the deployment of LiDAR sensors to enhance existing security systems and provide more coverage."

In addition, the intelligence obtained through the accuracy of anonymous tracking of guests reassures visitors that they have not been singled out or tracked exclusively, but instead provide casinos with valuable data that they could not capture before. "This will help them maximize operations and strategy in the coming years," Becker said.

As an experienced reporter who has worked in the US security industry for a long time, Larry is the eyes and ears of SourceSecurity.com in the fast-changing security market. He participates in industry and corporate events, interviews security leaders and provides original editorial content for the site . He leads SourceSecurity.com's team of professional editors and content experts, guiding the "Edit Roadmap" to ensure that the site provides the most relevant content for security experts.

Aiphone's secure communication solution-configurable IP video intercom

Dahua provides surveillance cameras, NVR and Ethernet switches to enhance the safety of pet corners

Access control: 5 minutes with Mike Maxsenti of Genea

More and more business security practices are going digital. Mechanical keys are still the backbone of most company security plans, and a company's large-scale switch to electronic access control can be very expensive. Therefore, companies need to choose the most suitable access control system. What is key management? Key management is the process of protecting, tracking and scheduling mechanical keys. Why is this important? Because the key carries access to sensitive locations and assets within the organization, when you increase the security of the key, you can enhance the security of these valuable resources. The key management system also controls the cost of using physical keys. The system reduces the overhead caused by key loss or security breaches. Some smaller companies may be able to adopt a paper-and-pencil key management protocol. Larger companies, or companies that want to better understand and control keys, usually choose to use an electronic key management system. The key management system can safely store and distribute keys and improve the efficiency of the organization. Why use a key management system? The key management system can become the cornerstone of your key control process. At the most basic level, key management systems can accomplish two things that paper-pencil systems cannot: they store and distribute keys securely, and they increase the efficiency of the organization's use of keys through automation and analysis. What can the key management system do? 1) Improve access control By better protecting keys, you can improve access control to the space and devices unlocked by these keys. You can use your key management to simplify the process of providing one-time key access to temporary employees. In addition, the system can record all their key access records, so that everyone's behavior can be tracked. 2) Enhanced traceability. The software is a good key management system that can generate reports on key usage, user access requests, access exceptions and loss. In addition, you can track and audit key usage in real time. Combined with a comprehensive key control strategy, you will implement better accountability for key use to meet any industry or risk management compliance standards. 3) Reduce costs and prevent the loss of employees. When the key is lost, you will incur direct costs for replacing the key or relocking when it is lost. When an employee loses the key, you will incur direct costs, including purchasing a replacement key or relocking it. . However, the indirect cost of key loss is usually more significant. This is because employees first spend time looking for the lost key and then process the replacement request, all of which time is not spent on production work. 4) Improve the workflow. As we discussed, keys are often used in important workflows. The key management system allows you to better control these workflows. Passive electronic lock systems, also known as key-centric access control systems, have outstanding advantages in key management. Compared with the electronic access control system, the passive electronic lock system's "passive" feature has reduced the update cost for many companies.

In the new working age, our relationship with the workplace is defined by flexibility and mobility. Employees are working in homes, offices, and mixed spaces more than ever, and working hours are different to accommodate modern work schedules. This new mixed workforce model has the potential to cultivate more diverse talents and increase productivity, but it also brings challenges-one of which is how to ensure safety, health and safety in the workplace. A strong and smart security ecosystem Although nearly one-third of companies report that they have implemented a hybrid model, according to a recent survey by STANLEY Security, many companies still have a lot of work to do to make a good job for the office of the future Prepare. Building a strong and smart security ecosystem is critical to preparing for the future. Therefore, companies should consider technologies that help protect employees, protect assets, optimize operations, and protect networks. 1) The implementation of the security ecosystem to protect your employees seamlessly combines health, safety, and safety hardware and software solutions. Nearly 60% of medium-sized markets and businesses in the United Kingdom and the United States report that the health and safety of their employees and customers are implemented The main focus of modern and mixed working models. This begs the question: How can companies create a safe and healthy working environment when 59% of companies plan to return employees to the site in a certain capacity within the next 18 months? Part of the answer lies in implementing a security ecosystem that seamlessly integrates various health, safety, and security hardware and software solutions. Nearly half (46%) of business decision makers on integrated platforms expressed their interest in adopting such integrated platforms. This means integrating traditional and digital security solutions and then using the data and insights they generate to further enhance the workplace experience. For example, because employees and visitors enter and exit the office at different times, companies may lack supervision of occupancy or density levels, flow of people, work space arrangements, visitor registration procedures, etc. However, by integrating visitor management, access control, and other building/business systems, employees can reserve workspaces on specific days and times and be granted access to buildings. Using artificial intelligence and machine learning, visitors can pre-register, answer health check questionnaires and obtain mobile credentials before arrival. Once the visitor arrives on site, the system can issue an alert to the appropriate department-all without the close contact that traditional visitor registration processes usually require. When layering artificial intelligence and machine learning on top of data, companies can identify crowd trends and optimize opportunities for crowded areas. They may also find that certain rooms in the building are used more than others, and use these insights to manage their space more effectively. All of this is supported by a security ecosystem that can help companies better protect their employees while realizing other benefits in the process. 2) Protect your assets. When it comes to the mixed labor model, the company is worried about the security of its assets. More importantly, when it comes to the mixed labor model, the company is more concerned about the security of its assets. Approximately 72% of leaders stated that, in fact, this is their main focus on hybrid methods. Considering the impact of the pandemic, this number is not surprising. The pandemic has caused many companies to temporarily or permanently shut down, and few allow on-site management of facility operations. As a result of the pandemic, we have seen technology adoption accelerate at an alarming rate-simply because companies must implement cloud and remote technologies to survive when buildings are closed indefinitely. Remote management and visibility are especially true for security solutions, such as cloud video surveillance and cloud access control solutions, such as wireless IoT connection locks. Nine out of ten companies (91%) said they have implemented cloud security technology; of these, nearly half (48%) said it was due to the pandemic. These technologies allow remote management and at the same time provide visibility into business operations. For example, in a retail environment, cloud video surveillance enables companies not only to identify and track criminal activities, but also to identify and track traffic patterns, peak business hours, and staff shortages. Loss prevention strategies When integrated with retailers’ point-of-sale (POS) systems, companies can have a deeper understanding of their traffic counts, end cap effectiveness, membership card activities, and various POS anomalies, such as high-value transactions, repeated transactions, Excess returns, employee discounts, etc. Especially for retailers, a safe ecosystem means more effective loss prevention strategies that help protect assets and profits. 3) Optimizing your operations The "future of work" is still in progress, but one thing is clear: companies are looking for ways to improve efficiency, save costs, and ultimately optimize operations—especially the challenges posed by current price inflation. A relatively untapped opportunity for companies to achieve these goals lies in their security infrastructure. Security technologies and solutions have collected extremely rich data. After unlocking, they can help companies understand the usage of their buildings, the busiest times, and areas with heavy traffic. Using cloud video surveillance systems, companies can identify emerging employee training needs. Cloud video surveillance systems. For example, by using the insights generated by cloud video surveillance systems, companies can identify emerging employee training needs, which can ultimately increase employee satisfaction and reduce churn. However, most of this data remains the same in the infrastructure, leaving companies unaware of the opportunities before them. 44% of companies that currently use cloud security systems as their main purpose said they want to know how to use the technology, and the other 20% don't even know that it can be used in other ways. The future office of artificial intelligence and analytics is very promising, especially when we see that most companies (78%) will consider using artificial intelligence and analytics to optimize their operations and help their businesses operate more efficiently. Cloud technology Increased adoption, coupled with increased interest in artificial intelligence, machine learning, and advanced analytics, can enable companies to uncover valuable insights from their security infrastructure and use them to adapt and build business resilience. 4) Protect your network. Advanced technology can help companies improve network security and make it more difficult for hackers to invade. As network threats become more and more common, companies increasingly want to protect their networks and data. More than half (54%) of the respondents expressed interest in using artificial intelligence, machine learning, and advanced analytics to protect their networks by identifying and eliminating cybersecurity threats. Advanced automation technology can help companies improve network security and make it more difficult for hackers to enter larger corporate networks. Modern network security tools using artificial intelligence and machine learning can detect abnormal network traffic or alert and take action on suspicious behavior. Cyber ​​security software For example, if an IoT device suddenly starts broadcasting and establishes connections with multiple devices, the cyber security software can detect this abnormal behavior, send an alert, and immediately suspend traffic or isolate the endpoint-saving valuable during potential violations time. A data breach may lead to general distrust of employees and customers, which may lead to reduced business and litigation issues. Therefore, companies need to take actions to update and strengthen defenses to avoid downtime and continue to operate with peace of mind. Prepare your business for the future. Businesses will continue to find more ways to extract value from existing infrastructure, including security technologies. For many people, the tools to do this are already in place, it's just a matter of unlocking insights through the security ecosystem. With such an ecosystem—one that helps protect corporate personnel, assets, and networks while optimizing operations—companies can better protect the future of their workspace and embrace the new era of work with confidence. 

Security is a key requirement for all organizations. Getting the right security involves the right combination of people, processes, and technology. However, many enterprise companies do not consider including a complete portfolio of information security, but separate their physical security and business continuity teams from their IT security departments. According to ASIS research, approximately half (52%) of companies have integrated two to three of their physical, IT security, and business continuity teams, and most of them choose to bring their continuity and physical security teams together . About 70% of organizations that have not yet assembled a team have no plans to do so. It is important to integrate the security of all departments together because cyber security is considered to play a more professional role in the business, which prevents companies from integrating their departments together. However, although IT security has its own professional requirements and skills, it should not be treated separately. Companies are studying how to more effectively manage all risks in their operations. When their teams are isolated and cannot fully understand them, they will encounter problems. The Cyber ​​Security and Infrastructure Security Agency (CISA) has developed its own guidelines in this area based on the development of the Internet of Things and more connected devices entering homes and businesses, so this will continue to become more and more important. The rise of automation The pace of change facing companies today, coupled with the impact of the COVID-19 pandemic, means that more organizations are turning to digital services and automating their operations as much as possible. Security is no exception-according to our research on security and automation, 75% of companies said they need three or more additional analysts to handle all incoming alerts on the same day, while 83% of companies said their team Facing'alert fatigue. The IT security team is overwhelmed by data, but they feel unable to cope-but at the same time, they must also work more closely with other departments. Dealing with all these issues requires automation, but it should not be viewed in isolation. Although IT security teams are keen to invest in automation using technologies such as security information and event management (SIEM) and security orchestration, automation, and response (SOAR), these investments can be used for physical and IT security. As IT security teams invest in automation, they can adapt and extend their methods to help risk management and security in the physical world. The best way to succeed in this regard is to focus on the areas where the real world and IT security challenges faced by the enterprise intersect. To successfully adopt this approach requires a better understanding of business processes. Fraud detection process automation involves the use of data and analysis to improve how the process works from beginning to end, including where IT and technology are used to support physical interactions or activities. A good example is the fraud detection process in a bank, in which multiple digital and physical transactions must be monitored and investigated. Bringing together different teams—physical security, business continuity, risk management, and IT security—is about how to protect the entire organization from risk. Although the most well-known area of ​​fraud investigation is credit card transactions, there are many different types of transactions that need to be tracked, from domestic and international wire transfers to prepaid phone cards and other prepaid cards that can be used for credit card purchases. Each of these has its own workflow and requirements for investigating transactions. This may include checking whether the transaction is a false positive or requires further investigation. This is based on a mixture of digital documents purchased online and physical data from face-to-face transactions. At the same time, fraudulent The complex nature may mean that any investigation has a large number of IT components. Members of the IT security team may need to participate with the anti-fraud department. Although this investigation is necessary, it keeps analysts away from cybersecurity tasks, which is particularly frustrating when it comes to false positives. Instead, an automated investigation process can help. Integrating physics, IT, and risk management By integrating processes and automating workflows, this can integrate physics, IT, and risk management in a smarter and more efficient way. It can also improve the efficiency of the anti-fraud team because they can eliminate false positives from the workflow and get automated support for IT analysis. If the team needs more humane insight, they can take it where it is needed instead of needing it for every investigation. Although anti-fraud is an example of the need for such integration and collaboration, there are other use cases. For example, industrial control and manufacturing applications that run production lines around the clock are often targets of attacks, either stealing important data or disrupting business operations. This spans from the IT field to the operational technology field, where the systems are very different, and the systems used may have existed for many years or even decades. Bringing together different teams—physical security, business continuity, risk management, and IT security—is about how to protect the entire organization from risk. By working together, teams can be more efficient instead of working in separate islands. This involves better use of data between these teams, which will rely on more automation to increase efficiency. Using SOAR, security analysts and business risk experts can reduce the time required to respond to potential problems, reduce impact, and fix faster. At the same time, it reduces waste associated with false alarms and manual work. The focus here should be how to support the business with better security-by integrating processes and working more efficiently, the entire organization's security team can achieve this goal.

Why cellular connectivity is a smart choice for CCTV deployment

What security challenges does the healthcare industry face?

Meet Chris Bone, CTO of ASSA ABLOY Group

Protect unmanned infrastructure at the edge of the network

Use AEOS to achieve frictionless physical access control

14 successful cases on how video technology improves urban life

Webcast: Access control integration improves security while reducing costs

Mythic's AI chip uses analog technology to achieve faster speed and lower power consumption

HID Global celebrates the new promise of mobile access

Delta Scientific's vehicle guardrail improves public safety in difficult times

Alcatraz AI Rock & C•CURE 9000

Healthcare wireless access solutions

SourceSecurity.com-Make the world safer Copyright © Notting Hill Media Limited 2000-2021, all rights reserved. Our other website: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | Maritime Information Network

Understand how your organization has become safer and more efficient