Posts

Showing posts with the label Information and Communications Technology

Discover the Power of Cisco Meraki

Image
    Cisco Meraki MX Firewalls is a Unified Threat Management (UTM) and Software-Defined WAN solution. As a UTM product, Meraki MX provides content filtering, app-specific traffic control, intrusion prevention, malware protection, and site-to-site VPN that is deployable on hardware or virtually. It also enables firewall management remotely for 24x7 monitoring and accessibility. Users are able to deploy, monitor, and configure their Meraki devices via the Meraki dashboard web interface or via APIs. Once a user makes a configuration change, the change request is sent to the Meraki cloud and is then pushed to the relevant device(s).   Meraki Cloud Architecture The Meraki cloud is the backbone of the Meraki management solution. This "cloud" is a collection of highly reliable multi-tenant servers strategically distributed around the world at Meraki data centers and select public cloud service providers. For the remainder of this document we will refer to both the Meraki data cen

How does Artificial Intelligence Affects Surveillance?

Image
  The good part of AI is that it can be trained to identify and learn patterns and parameters, similar to the human brain. Machine learning and deep learning are both types of AI. With machine learning, systems embedded with AI can automatically adapt and learn from events without being explicitly programmed. However, a machine can also be trained through program settings to follow a set of rules, i.e. algorithms, to give  advanced features when it comes to security. Using behavioral analytics, a self-learning, A.I. takes the data from video cameras and continuously classifies objects and events that it sees. Take for example, a person crossing a street is one classification. A group of people is another classification. AI algorithms can effectively detect anomalies, such as unattended bags or suspicious activities, and raise alerts in real-time, significantly reducing response times. Using rule-based intelligence, AI and video analysis tools enable security teams to detect potential c