The intricate nature of security and surveillance operations in organizations today is further complicated by the vast amount of varied data that requires aggregation and analysis. These challenges drive the need for advanced technologies that can make sense of information and alert relevant parties about crucial intelligence. Autonomy's Command and Control brings together best-of-breed technologies in video surveillance and analytics, business process management, and meaning-based computing to proactively assist security officers in retrieving relevant intelligence in real time.
Autonomy's Command and Control solution is provided through Autonomy Visor's cohesive, user-friendly interface to give users functional tools to configure security settings and control the scene. Since Command and Control is fully modular, additional functionality can be added and controlled through the interface, to match your enterprise security needs.
Autonomy's Command and Control infrastructure enables all Autonomy products to work together seamlessly. It has been specifically designed to allow easy integration of third party equipment such as alarm panels, display units, and more. Although certain products can be deployed for simple functions such as standalone capture and archive, to perform more advanced functions, Autonomy provides four levels of Command and Control for a range of environments and needs—from simplistic rules-based models to highly complex, intelligent solutions based on conceptual analysis federated across sites.
Event Stream Processing (Level 1)
Autonomy's Command and Control Level 1 offers a simple rule-based solution that can be connected with other Autonomy Command and Control system modules. The solution operates using pre-defined instructions defined by a systems administrator. For example, if Autonomy Video Management System (VMS) and Facial Recognition were set up with Level 1, the system could be programmed to highlight individuals from a watch list. Autonomy VMS and License plate recognition might be deployed with Level I to monitor traffic at an airport to raise a barrier for particular vehicles while preventing entry for others.
Autonomy's Command and Control Level 1 handles logical interactions between disparate pieces of data. For instance, VMS, Intelligent Scene Analysis System and the Command and Control solution may be used to monitor vehicle speeds between points by identifying the same object and calculating the distance between the two points. The system calculates distance traveled within a given time frame and determines the vehicle speed(s) .
Complex Event Processing (Level 2)
Command and Control Level 2 provides state-of-the-art security infrastructure software for the most complex security operations, automating a vast range of tasks and bringing conceptual understanding of data. Powered by Autonomy's award-winning Intelligent Data Operating Layer (IDOL), the Level 2 solution employs advanced analytics to add intelligence to a wide range of security operations and information retrieval.
The Complex Event Processing offering forms a conceptual understanding of the meaning of virtually any piece of data, including text, video, or audio. By deriving an understanding of the available information assets, the Complex Event Processing solution automatically provides users with relevant background information, cross-referencing data according to its conceptual content to reveal emerging trends and identify potential threats. The information is delivered directly to the user in the form of hyperlinks or thematically similar clusters.
Autonomy's core technology, IDOL, is used by some of the most prestigious intelligence and defense agencies worldwide. One of the key reasons organizations choose Autonomy is its ability to discover the unknown concepts—which can significantly impact the effectiveness of many world-renowned security agencies.
Cross Site Federation (Level 3)
Autonomy's Command and Control Level 3 adds site federation to all the features of Level 4. This allows the cross correlation of data between websites, which allows security professionals to spot patterns and take actions based on a holistic view of information across the entire organization. This capability eliminates any manual tasks that may have been required moving data manually, to save time and increase efficiency and accuracy.
Secure Archiving, Retention, and Process Management
Providing evidence for court cases, compliance regulations, and risk management are just a few of the primary reasons why organizations must archive video content. Today, most organizations and police forces are swamped with CCTV footage which is typically not properly categorized or securely managed.
Autonomy offers enhanced video archiving to ensure digital video is efficiently controlled, protected, and only accessible to those with access rights. Videos can be retained according to corporate and legislative rules—an important capability should the organization need to produce videos for evidentiary purposes or hold them for a predetermined period and in a guaranteed unchanged state. While some legacy approaches can accomplish this type of archiving, they require videos to be manually identified and/or moved to a unique repository, which is typically a costly and time-consuming process. Unlike traditional solutions, Autonomy IDOL automates the retention and disposition of video footage by understanding its meaning, regardless of format or language.
Also available in the Level 4 solution, Incident Process Management is integrated with Autonomy's Business Process Management to automate the reporting process, and reduce the cost of data entry and information distribution to relevant users. This enables reports to more efficiently provide richer, more relevant content. For instance, if you deployed VMS and Automatic Number Plate Recognition to monitor car parking usage in multiple locations and needed to calculate usage percentages based on initial numbers collected, the Autonomy system could reveal which parking lot had the highest usage at 50 percent while north and south lots had 20 percent to 30 percent usage.
Autonomy's Command and Control uses Visor's cohesive, user-friendly interface to give users the functional tools required to configure security settings and control the scene. Since Command and Control is fully modular, additional functionality can be added and controlled through Visor, as the security needs within an enterprise evolves.
The Visor Toolbox includes a range of advantages, including the following:
Sequential navigation – Video footage is displayed on a timeline, and thumbnails are automatically created to enable users to navigate through footage visually
Independent and synchronized views – Camera views can be controlled using intuitive toolbars
Mapping – Groups of cameras may be selected and managed by region
Search – Video can be retrieved using event, time, or date parameters
Bookmarks – Bookmarks can be created manually or automatically to locate important events more easily
Drag and Drop Customization – Users can easily change camera views using drag and drop capabilities
Exporting – Data may be exported to a printer, external drive, or DVD for archiving and legal applications
Autonomy's Situational Awareness web client offers global organizations the ability to control and monitor security and surveillance activities through a rich user interface accessible over a standard Internet connection. The solution provides security officers with a secure, comprehensive view and analysis of security scenarios, and allows access to all relevant intelligence information without being restricted to the Security and Control Center.
The Situational Awareness web client frees security officers to engage in hands-on investigation and monitoring throughout the premise, allowing them to remain aware of situations in other areas via a mobile device, or through portals installed in strategic locations.
The Situational Awareness web client extends the Autonomy's Command and Control platform to bring together information from a wide range of applications and allows holistic monitoring and analysis of security data in real time. These capabilities allow you to streamline and facilitate traditional investigative methods by performing conceptual analysis to reveal trends and patterns hidden in the data set.
Forthcoming Events for Autonomy's Command and Control Solution
Archived Events for Autonomy's Command and Control Solution
Summary: ...sent to the AutoMerge Publisher module of TeleForm, which automatically faxes reports to the site where the form originated. Dr. Gams explained further, “This is an important step in the process—and one that sets us apart from other CROs. It allows us to remotely monitor the clinical study in a continuous,...
Summary: ...repositories such as the Firearms Licensing register, Holmes2 (Home Office Large and Major Enquiry System), NSPIS Command and Control, ANPR (Automatic Number Plate Recognition), custody records from legacy systems, and its own Lotus Notes repositories, as well as the force intranet. Case Study Customer...
Summary: ...printing and storage of paper-based forms. They also eliminated data entry errors by incorporating database validations, calculations and other intelligent eForm features. Additionally, the Bank raised employee productivity by adding automated business rules to forms to eliminate redundant tasks. To ensure...
Summary: ...TeleForm’s advanced recognition and verification engines convert the data at accuracy rates approaching 100%. TeleForm automatically identifies and corrects questionable data entries. The completed surveys are then automatically sent into the appropriate database for analysis. “Because productivity...
Summary: ...locate targeted content quickly with advanced retrieval tools, and uncovers hidden content effortlessly with intuitive navigation capabilities. Whether it’s a Navy commander needing exclusive images of a unique aircraft carrier or a government procurement manager comparing products, IDOL K2 is used...
Summary: ...and training module, Expert, along with Qfiniti's Survey module. Getting the Right Tools to Raise Satisfaction Northern California Kaiser Permanente members rely extensively on the NCAL Pharmacy Call Center. The contact center frequently handles prescription orders, which means agents typically interact...
Summary: ...owns, operates and franchises a variety of exciting attractions, including world-class aquariums, Ripley’s Believe It or Not! museums, Guinness World Records Museums and Louis Tussaud’s Waxworks. With a vast, ever-increasing digital collection of over 90 years of oddities from all over the world,...
Summary: ...Reduction in paper handling, manual data entry, and cycle time • Enhanced business rules (tax calculations, database lookups, routing) • Image/index generation for FileNet • 50–75 forms per batch, with up to 700 images are processed • Business rules assure correct deductions and calculations...
Summary: ...printing and storage of paper-based application forms. The municipality also eliminated data entry errors by incorporating database validations, calculations and other intelligent eForm features. Additionally, the County raised employee productivity by adding automated business rules to application forms...
Summary: ...and information processes under control. Paul Bromwell, the firm’s CIO, recalls, “Our original system involved index cards and we had file rooms spread across multiple offices. There were ad hoc file locations, too, that made managing and finding information a challenge. People would commandeer a...
Summary: ...Autonomy’s advanced collection software provided the ability to intelligently pre-cull and deduplicate all forms of data; this allowed the team to focus collections on priority content and eliminated the cost and time of a forensic bit-by-bit manually-driven copy utility that collects vast quantities...
Summary: ...As a leading accounting frm serving businesses throughout Ayrshire and right across the central belt of Scotland, Robert J Hart is focussed on delivering high quality value for money services through a wide ranging area of expertise. Robert J Hart is in the business of managing and working with vast amounts...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...officers retrieving relevant intelligence in real time. Command and Control is operated through Virage Visor, a cohesive, user-friendly interface which provides users with the functional tools required to configure security settings and control the scene. Since Command and Control is fully modular, additional...
Summary: ...Virage Security & Surveillance Overview. Through automatic profi ling, Command and Control understands an investigator’s interests and delivers highly targeted information in real-time to either a mobile device via SMS, by e-mail or over the Internet. By automatically identifying correlations and trends...
Summary: ...approach to your monitoring operations. Autonomy not only provides an unrivalled range of stand-alone security and surveillance products, but also a feature-rich, highly scalable platform that is capable of meeting security and surveillance requirements of any size organization. With an entirely modular...
Summary: ...integration with the full range of applications, including Electronic Point of Sale Monitoring (EPOS), Automatic License Plate Recognition (ALPR), Intelligent Scene Analysis System (iSAS) and Autonomy Virage’s unique central Command and Control platform.
...
Summary: ...reports on people and vehicular traffic patterns and alerting surveillance staff to situations which may require a response, such as traffic jams. Multiple counts can be configured simultaneously to allow for real-time resource allocation, service management, and analysis and forecasting. Asset Monitor/...
Summary: ...store 4 to 24 Tbytes of footage. Units can be configured to meet any requirements, from 100s of distributed small units across multiple sites to a centralized system monitored from a single point. From a single standalone site to a vast network that spans cities or even countries, Autonomy Virage can...
Summary: ...of data. With Autonomy, organizations are presented with a holistic view of their social media footprint in real-time. Leading organizations use multichannel customer interaction analytics to identify instances of fraud, breaches in confidentiality and disparaging commentary. They use patterns of activity...
Summary: ...names • Provides job launching and monitoring capabilities – view jobs and drill down into exceptions as required • Leverages existing investments in data centre tools, such as job schedulers, through supported command line instructions on all supported operating systems • Allows online archiving...
Summary: ...Paris, Pleasanton, Rome, San Diego, San Francisco, Santa Clara, Shanghai, Singapore, Sao Paulo, Stockholm, Sydney, Tokyo, and Washington, D.C. Database Integration and Action Assignment As well as unrivalled plate recognition, Autonomy Virage can automatically cross-reference captured plates with a vast...
Summary: ...as a : • Connection object Allows you to represent and store details of the ACI server. • Command object Allows you to store details of the request that should be made to the server (for example, the server action command and the parameters that it requires). • Data object Allows you to store the...
Summary: ...IDOL Echo - Proactive Legal Protection - Product Brief. Autonomy Systems Ltd. IDOL Echo Proactive Legal Protection IDOL Echo is a new module created by Autonomy to allow fully auditable and accountable monitoring of information use. Echo enables the enterprise to forensically account, track and trace...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Point of Sale Monitoring 05 Container Surveillance and Management 08 Automatic Number/License Plate Recognition 10 Intelligent Scene Analysis System 14 Biometrics and Audio Recognition 20 Command and Control 21 Security 26 Conclusion 27 Introduction Security and surveillance operations have become an...
Summary: ...Accelerating Your Enterprise With Business Process Management. The heart of the Cardiff LiquidBPM Engine is the multi-threaded state machine that analyzes the constraints and rules defined around a workfow, and activates tasks as appropriate. • Caching. Workfows are cached in memory for fast performance....
Summary: ...described below: 2.5.1 Large vocabulary recognition Using patented predictive technology the VoiceSuite module is able to provide the benefits of a large vocabulary speech recognition system without the overhead of a vast search space when considering sample audio. Figure 2: Time-first hypothosis extension...
Summary: ...escort • Real-time closed circuit TV monitoring • Commercial power feeds with generators for full backup power • Clean Agent Fire Extinguishing System (CAFES) and on-site firefighting apparatus and personnel • Internal and external 24x7 environmental monitoring alarms for temperature, “waterbug”...
Summary: ...for data security and protection, the proof of concept included two real-world security scenarios. Depending on content, the Agency has an obligation under DoD 5015.2 to prove certain information is protected. The command must depend on Microsoft SharePoint and HP TRIM to both use the appropriate user...
Summary: ...in the Data Protector bin directory on the entry point client system 19 – Specify the Data Protector PowerShell command (saved in the batch file SharePoint_hybrid.bat) as the post-exec option in the VDI based integration backup specification Figure 11: Specifying the Data Protector PowerShell command...
Summary: ...manage the transition from paper-based processes to electronic ones. Typical ROI Calculation for LiquidOffce Return on investment calculations for LiquidOffice are based on replacing manual and paper-based forms processing with electronic forms and automatic routing. Here is a typical example with representative...
Summary: ...2. 6 “Costs of a Data Breach; Can You Afford $6.65 Million?,” Larry Ponemon, February 4, 2009. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9127376 7 “Data Breaches are More Costly than Ever,” Brian Krebs, Washington Post, February 3, 2009. 8 “Rules Widen...
Summary: ...stage of a distributed architecture, customers can poll the status of submitted jobs. In thecase of intermittent network failure, jobs will be automatically retried. In addition, the archive mode instructs the entire IDOL distribution layer to archive each command it receives, with optional compression...
Summary: ...is restricted to each federated location and displayed separately in SharePoint web part. SharePoint also becomes heavily dependent on the search methods and the security protocol of the federated sites. Moreover, federating all searches carried out in SharePoint across to other SSPs not only puts an...
Summary: ...ones. Typical ROI Calculation for LiquidOffce Return on investment calculations for LiquidOffice are based on replacing manual and paper-based forms processing with electronic forms and automatic routing. Here is a typical example with representative ROI results.
...
Summary: ...Department of Education and Skills Ginnie Mae Derby City Council Intelligence Community Harlow District Council Internal Revenue Service Home Office U.S. Air Force Information Commissioners Office U.S. Special Operations Command Lewisham Borough Council Defense Information Systems Agency (DISA) MoD Corporate:...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.