© 2007 3VR Security, Inc. 1 Stephen Russell CEO & Founder 3VR Security, Inc. Search in Surveillance: A NewTool for Information Warriors.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
BIOMETRICS CONSORTIUM CONFERENCE BALTIMORE, MARYLAND September 19 – 21, 2006 Bill Wipprecht EVP/Chief Security Officer Corporate Security Wells Fargo &
XProtect ® Professional Efficient solutions for mid-sized installations.
Making Search Relevant SchemaLogic Gary Carlson Chief Taxonomist
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
A new Network Concept for transporting and storing digital video…………
Learning Center Webinar Series Strategies for Alumni Associations Using Presenting: Molly Wasko, PhD
AXIS Camera Station Flexible surveillance software for your Axis network video products Sales Presentation Welcome to this short presentation of the.
White Master Replace with a graphic 5.5” Tall & 4.3” Wide © 2010 Adobe Systems Incorporated. All Rights Reserved. Video Distribution Philippe Degery DMO.
LOSS PREVENTION AND RETURN ON INVESTMENT Point of Sale Software and Video Integration.
XProtect® Expert 2013 Product presentation
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Nexidia Confidential “Searching Audio and Video Sources On the Web” SpeechTEK West 2007.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Database Market By Ann Seidu, Keith McCoy, and Ty Christler.
ATM Surveillance Solution. LIST Outline & Key Point 1 Solution 1, 2, 3 2 ATM Surveillance Program – E-MAP 33 Conclusion 44.
Microsoft Dynamics. Introducing Al-Futtaim Technologies  One of the region’s leading System Integrators  Strong partnerships with leading global ICT.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
Safeguarding Financial Institutions with Pixim ® ’s Digital Pixel System ® Technology July 2008.
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
AxxonSoft Company Profile Products overview References.
Databases & Data Warehouses Chapter 3 Database Processing.
Thriving in a Hybrid World Dean J. Marsh Vice President, Client Success IBM Analytic Solutions.
Fault Tolerant Sensor Network for Border Activity Detection B. Cukic, V. Kulathumani, A. Ross Lane Department of CSEE West Virginia University NC-BSI,
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
1 © 2007 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Under NDA Avaya - Proprietary & Confidential. For Internal Use Only. Avaya.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
Profits, Right Before Your Eyes. Instant Image Verification.
Oracle Application Express. Program Agenda Oracle Application Express Overview Use Cases Key Features Packaged Applications Packaging Pricing Call to.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Intelligent Performance Management Empowering Your Enterprise Duane E. Presti, CEO PARIS Technologies, Inc.
© 2007 IBM Corporation IBM Information Management Accelerate information on demand with dynamic warehousing April 2007.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Smart Grid Big Data: Automating Analysis of Distribution Systems Steve Pascoe Manager Business Development E&O - NISC.
Kaspersky Small Office Security INTRODUCING New for 2014!
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Overview Presentation MKT-DSRV-P- 001E. Product Overview Network based video transmission product with on-board digital recording Allows analogue fixed/PTZ.
Loss Prevention, Auditing & Safety Conference 2009 Title Sponsor:
Advanced Endpoint Security Data Connectors-Charlotte January 2016
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
How to Sell IP Video.
Computer vision and biometric technology in credit risk
Matrix Video Surveillance Solution for Banking
Chapter 17 Using Technology in a Competitive Environment.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 IP Camera Market to surpass.
Operationalize your data lake Accelerate business insight
ECM for Legal & Law.
System And Application Software
Securing the Threats of Tomorrow, Today.
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

© VR Security, Inc. 1 Stephen Russell CEO & Founder 3VR Security, Inc. Search in Surveillance: A NewTool for Information Warriors

© VR Security, Inc million cameras 200 billion video hours

© VR Security, Inc. 3 Information Overload: Security manufacturers continually improve our ability to collect information … Proprietary and Confidential © VR Security, Inc. 3

4 … but our ability to “collect” has long since outstripped our ability to “analyze”, resulting in catastrophic human and economic loss. Proprietary and Confidential © VR Security, Inc. 4

5 The Security Gap

© VR Security, Inc. 6 Failure to close this gap has resulted in catastrophic human and economic loss Proprietary and Confidential © VR Security, Inc. 6

7 July 7, 2005 Proprietary and Confidential © VR Security, Inc. 7

8 How do you track 4 suspects among millions of hours of video?

© VR Security, Inc. 9 Recognizing Suspects Under Surveillance Khalid Al-MidharMohamed Atta 9/10 (Gas Station) 9/11 (ATM) Known Al-Qaeda affiliate on INS watchlist since 2000 Proprietary and Confidential © VR Security, Inc. 9

10 Surveillance –Innovation & Standards Holdout Security manufacturers have failed to leverage commercials useful innovations from information technology and management. Scalable Computing Computer Vision Search Databases SOAP/ XML

© VR Security, Inc. 11 3VR uses SEARCH technology to structure security data and connect security professionals. Proprietary and Confidential © VR Security, Inc. 11 Innovations in search and intelligent video are helping to close the information gap.

© VR Security, Inc. 12 SEARCH: Using technology to “structure” security data and “connect” security professionals is critical to transforming security industry. Proprietary and Confidential © VR Security, Inc. 12

© VR Security, Inc. 13 Proprietary and Confidential © VR Security, Inc. 13 “O’Reilly’s Internet Guide” Google Search brought “structure” to the Internet... …and in turn connected internet users.

© VR Security, Inc. 14 “Google for Surveillance” Proprietary and Confidential © VR Security, Inc. 14

© VR Security, Inc. 15 Face Recognition Restricted Area Motion Direction Abandoned/Removed Objects Use Video Analysis to Turn Video into Events

© VR Security, Inc. 16 Make Event Based Monitoring Possible

© VR Security, Inc. 17 Searchable Events Speed Investigations Conventional DVR Search Results 1.Review text lists 2.Wait for video downloads 3.Watch numerous videos, one by one Typical Investigation: 15 minutes 1.Scan storyboard to isolate event 2.Only download one video 3.Single click export to case management Typical Investigation: 2 minutes 3VR Search Results in EventStoryboard™

© VR Security, Inc. 18 Use Relevance to Enhance Quality Selectively compress face images to keep high quality evidence while still maximizing storage DVR Face Image3VR Face Image

© VR Security, Inc. 19 Use Relevance to Extend Storage Use intelligent recording and dynamic, user determined durations for key events to reduce storage and bandwidth by over 90% compared to conventional DVRs DVR

© VR Security, Inc. 20 Structured Information Optimized for the Network DVR or NVR3VR Distributes heavyweight video files Distributes lightweight metadata + key frames 2MB per transaction120K per transaction Searches only by transaction information, requires manual review of video. Searches across branches by face or transaction, easily scanned event cards

© VR Security, Inc. 21 Video Search Video Analysis Video Management … One Product 3VR SmartRecorder™

© VR Security, Inc. 22 About 3VR » Best Product –Fastest growth in commercial sector –Fastest rate of product innovation –Won nearly every industry award » Leading Company –Funded by IT and Security Leaders (Kleiner Perkins, In-Q-Tel, VantagePoint, DAG) –Led by Search and Video Visionaries (Inktomi, TiVo, USWeb) Top 25

© VR Security, Inc. 23 Search: A Disruptive Idea

© VR Security, Inc. 24 Banking $5B Check Fraud ($5B) Banking DVRs ($200M) Organized Theft ($31B) $31B Retail DVRs ($300M) Proprietary and Confidential © VR Security, Inc. 24 Search transforms security market with value-driven applications to address huge vertical problems… Economic impact of 9/11 alone: $1 Trillion RetailGovernment

© VR Security, Inc. 25 Proprietary and Confidential © VR Security, Inc. 25 Text Files + Mainframes Databases + Enterprise Software We saw something similar when databases made the enterprise searchable...

© VR Security, Inc. 26 Proprietary and Confidential © VR Security, Inc. 26 … as the market or databases expanded, the market for enterprise applications exploded.

© VR Security, Inc. 27 Proprietary and Confidential © VR Security, Inc. 27 » Purpose-built word processor » Sold bolt-on office applications (mail, spreadsheets, etc) » Killed by cheaper, more flexible, extensible software system (PC) » Purpose-built video recorder » Trying to bolt-on analytics (face, object, LPR, etc) » Killed by cheaper, more flexible, extensible software system (3VR) DVRs will be security’s Wang Computer DVR

© VR Security, Inc. 28 Example: Addressing Fraud in Retail Banks

© VR Security, Inc. 29 » Sample Text Proprietary and Confidential © VR Security, Inc. 29 » In 2005, banks lost $64 million to robbery » Those same banks lost $5 billion to fraud » Fraud is “the number one way criminals are attacking our financial system” – Chief of Financial Crimes, US Secret Service Fraud: Banking’s Biggest Problem Proprietary and Confidential © VR Security, Inc. 29

© VR Security, Inc. 30 CrimeGuard™ - Facial Surveillance to Stop Fraud CrimeGuard™ automatically indexes branch video with biometrics assigning a unique template to every face. Proprietary and Confidential © VR Security, Inc. 30

© VR Security, Inc. 31 SimilaritySearch™ Face templates can be remotely searched to link a fraudster’s activity across both time and branches » Solves previously unsolvable cases » Searches are instant and reduce investigation time » Proactively identifies even unreported fraud events » Robust to false identities Proprietary and Confidential © VR Security, Inc. 31

© VR Security, Inc. 32 PeopleShare™ With a single-click, PeopleShare™ publishes faces and alerts to watchlists within every branch across user-defined regions » Automates intelligence distribution » Prevents fraudsters from serially targeting branches » Centralized alert management PeopleShare™ Proprietary and Confidential © VR Security, Inc. 32

© VR Security, Inc. 33 SimilarityAlerts™ CrimeGuard™ performs real-time comparison of individuals in branches against regional watchlists. Matches trigger real-time alerts at teller windows, manager desks, or remote monitoring centers. » Stops fraud attempts and reduce losses » Increase deterrence to reduce future attempts » Stopping and deterring attempts means less investigations AlertViewer™ Proprietary and Confidential © VR Security, Inc. 33

© VR Security, Inc. 34 Fraud – Big Opportunity for Impactful ROI Example Scenario$ at RiskResult 1 st attempt$4,000Suspect in Database 2 nd attempt$4,000Attempt Detected and Stopped 3 rd attempt$4,000Attempt Deterred or Stopped 4 th attempt$4,000Attempt Deterred or Stopped $16,000 potential loss is reduced to $4,000 Proprietary and Confidential © VR Security, Inc. 34

© VR Security, Inc. 35 Demonstration

© VR Security, Inc. 36 Case Study Fighting Fraud in Los Angeles

© VR Security, Inc. 37 Pilot Program Overview » 15 3VR systems deployed across branches in an area recognized for high fraud activity » Multiple tests conducted to measure accuracy, false positives, investigative productivity, and effectiveness. » Tests conducted jointly by 3VR and customer

© VR Security, Inc. 38 Real-Time Watchlist Test - Results Metric Branches with Poor Conditions (Class 1 and 2) Branches with Good Conditions (Class 3, 4, and 5) Matching Accuracy9%94% Nuisance Alert Rate.005%.04% Number of Sites2 branches13 branches Total Faces Analyzed2,88585,724 With basic system tuning, 3VR accurately identified 94% of test subjects in branches with appropriate environmental conditions.

© VR Security, Inc. 39 Investigation Test Results (Post-Tuning) MetricDVR3VR Investigation Speed70 min44 min Quality of Evidence Images2 CIF4 CIF Number of New Events Found 528 Test Methodology » Two investigators given same fraud case. » One investigator used legacy DVR, one used 3VR » Investigators instructed to find additional instances of a suspect within the same bank branch.

© VR Security, Inc. 40 Proprietary and Confidential © VR Security, Inc. 40 Searchable Surveillance™ Disruptive innovation transforming traditional surveillance operations 1 Enabling new value-driven applications to expand government effectiveness using video 2 Platform for ongoing innovation and integration 3

© VR Security, Inc. 41