background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция"

input logo icon
Video tags
|

Video tags

комплексные
автоматизированные
системы
безопасности
эффекты
примеры
внедрений
конференция
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:01
safe apiary we we are
00:00:06
developers and manufacturers of complete
00:00:08
cycle of all these security systems
00:00:11
well, our complexes integrate
00:00:13
the task is actually a global task
00:00:15
provide the customer with
00:00:17
operator of this service for the operation of your
00:00:20
objects so universal
00:00:23
a tool that was convenient
00:00:26
each type of system operator
00:00:30
security and we have a lot of them
00:00:32
there are pass office operators there
00:00:34
CCTV operator available
00:00:36
there are operators at the checkpoint
00:00:39
tolerate systems so on and so on then
00:00:42
there are many, many different operators and they
00:00:45
work appropriate
00:00:46
in the corresponding models before the incident on
00:00:50
and as if this was an incident on the model
00:00:52
something else is our task
00:00:54
provide them with some
00:00:56
universal tool for the customer
00:00:58
having such a comprehensive solution at home
00:01:00
object depending on the operator’s tasks
00:01:02
gave him either one or the other interface
00:01:04
systems
00:01:06
the appropriate ones are the most convenient specifically for
00:01:10
this is the integration scheme here
00:01:14
we'll do we've worked out the horizontal
00:01:18
integration of our systems and platforms
00:01:22
it works both ways and
00:01:24
respectively, all events from one
00:01:26
systems have the ability to transmit
00:01:28
information into one system and another
00:01:32
systems into other food based on these
00:01:35
events you can accordingly
00:01:37
customize reactions
00:01:39
for its operators during the completion of the era
00:01:42
these reactions either during operation
00:01:43
before adjusting this way you will reduce
00:01:46
human factor to a minimum and decide
00:01:49
a very global task actually when
00:01:55
your operator stops thinking and
00:01:57
follows only the instructions given
00:02:01
systems is of course a maximum program
00:02:03
however, this is also not a solution
00:02:07
of the whole task, yes, this is approximately 85 according to us
00:02:10
the estimate is 85 percent
00:02:12
approximately in your tasks and there is also
00:02:16
outsider
00:02:17
and systems that often do not have
00:02:19
attitude towards the security system as
00:02:21
as such, that is, the brick or system
00:02:26
systems there is a system with y t p there is
00:02:28
engineering systems many many different
00:02:30
various other systems our platforms
00:02:33
have unified interfaces for
00:02:37
integration with systems of this type
00:02:41
here are the corresponding tasks of the systems
00:02:43
integrated system security
00:02:44
security it becomes much wider
00:02:47
and is a supplier
00:02:50
and a receiver of events
00:02:59
file
00:03:00
please, do you happen to have a microphone?
00:03:02
turn off the microphone literally disappear
00:03:06
there were seconds I hope yes great this one itself
00:03:11
it turns off on its own and this is it
00:03:15
the solution is already a complex big solution
00:03:18
going beyond
00:03:19
complex of security systems it is already
00:03:21
is a global tool for
00:03:24
customer and within the framework of such an instrument
00:03:27
he can decide one hundred percent of his
00:03:31
accordingly, there are more tasks here
00:03:38
one thought but not a thought repetition mother
00:03:40
stuttering so I better repeat it again
00:03:43
and I want to say the following when implementing systems
00:03:49
production company about the company twin
00:03:52
interaction is ensured
00:03:55
subsystems between the film about Bastion
00:03:59
device software and hardware complex
00:04:00
bastion and software and hardware complex
00:04:03
securos at the software level
00:04:07
interface is provided accordingly
00:04:10
operator depending on the role
00:04:12
which he performs his official duties
00:04:16
responsibilities
00:04:18
thus, for those objects where already
00:04:23
our solutions were implemented nearby
00:04:27
the operator looks either in the cue interface
00:04:29
times either in the Bastion interface or
00:04:32
there and there at the same time
00:04:34
We will give such examples a little later as
00:04:36
realize how they interact
00:04:38
systems at the level of one platform
00:04:43
why exchange information messages?
00:04:45
it leads to economic effects
00:04:47
which the customer receives
00:04:49
We'll talk about this a little later, so
00:04:51
based on the experience we have at
00:04:54
the current moment has already taken shape we are talking about
00:04:56
made the appropriate gradation which
00:04:58
allows us to say that implementation solves
00:05:02
ninety nine nine percent of problems
00:05:03
on the topic of 0 1 percent, you can sort of
00:05:08
discuss on discuss if there is
00:05:13
we can do some cases live
00:05:15
develop a technical solution or
00:05:18
then in a separate chat in our chat
00:05:20
there are colleagues who can
00:05:22
answer live questions about
00:05:25
video system and system
00:05:27
well, or rather, according to the Siqueiros system
00:05:29
search in the Bastion system colleagues there
00:05:33
quickly grab it and accordingly
00:05:35
Andrey indicated that he would also read out
00:05:38
We will be happy to answer your questions
00:05:42
one amendment that I would like to note
00:05:44
if you have any question
00:05:46
in live mode you can set it the same way
00:05:47
because dialogue is always much
00:05:50
more interesting than when you see the audience
00:05:53
when someone raises their hands it is much
00:05:54
more interesting than just looking at the screen and
00:05:57
not to see even from the other side who
00:06:00
takes part not to see
00:06:01
interest in the eyes or everything there
00:06:03
fell asleep so we continue and
00:06:06
accordingly, the next step we want
00:06:09
talk about some processes
00:06:12
automation as part of a comprehensive
00:06:15
security systems at checkpoints
00:06:18
There are a number of solutions that allow
00:06:20
automate operator action
00:06:22
reduce its impact on the system
00:06:26
our implementation of such systems will allow
00:06:29
ours to control his actions
00:06:30
varnish these actions system who
00:06:33
turned the camera away who turned off the camera and
00:06:35
log are recorded to increase personal
00:06:37
responsibility of each operator
00:06:39
who participates and interacts
00:06:43
system that is, there will be things such as
00:06:46
inspection system bottom for system
00:06:48
general control of some person is rude
00:06:51
speaking I make my digital signature on
00:06:53
the fact that he looked at the load on him already
00:06:56
is the person's responsibility in case of
00:06:58
debriefing
00:07:00
incident I'll come back now words
00:07:03
the floor and he will pass further along
00:07:05
already directly by section number
00:07:09
one that's why all this was a preamble
00:07:12
now we proceed directly to
00:07:15
automation solution automation
00:07:18
checkpoint automation
00:07:20
auto checkpoint access points
00:07:24
these are classic ships, of course
00:07:27
difficult passage points are definitely one
00:07:29
the court can decide these issues differently
00:07:31
maybe these issues can be resolved by our court
00:07:34
can resolve any issues legally
00:07:37
advertising
00:07:38
anyway it's a classic
00:07:41
modern management control system
00:07:42
access they mainly work on
00:07:46
multifactor multifactor algorithm
00:07:49
passage and factor second there second
00:07:54
third fourth factor according to
00:07:55
additional passage factor for
00:07:57
car person or someone can
00:07:59
serve mainly as a biometrics system
00:08:01
or with him there recognition
00:08:03
car number plates analyst
00:08:05
personifications well contact systems
00:08:09
us fade into the background saved
00:08:11
coronavirus era let's say then
00:08:13
finger feeding so on therefore
00:08:16
Facial recognition is trending right now.
00:08:19
world memory number recognition
00:08:21
and persons or similar reasonable things and
00:08:26
accordingly these are all these tasks
00:08:29
implements video surveillance systems and
00:08:32
video analysts receiving accordingly
00:08:35
here is our integration model we get
00:08:39
complete
00:08:40
we will demonstrate this unconditionally we
00:08:43
we receive complete information from the system in the form
00:08:45
analytics and we can do more than just receive
00:08:47
this is the form of metadata we can
00:08:49
use this as 2 3 4 unimportant
00:08:52
additional factor for the system
00:08:54
management control board also
00:08:56
integration done in both directions and
00:08:58
certainly to you as a client
00:09:02
to the user of the system
00:09:03
you don't need to use many different ones
00:09:05
interfaces for the pass office to
00:09:07
start up there are photographs of people or there are numbers
00:09:12
cars and up in different systems
00:09:14
in parallel you do it all from one
00:09:16
windows further she does everything for you
00:09:24
this data is impregnated in the system
00:09:26
where you need it you don’t need to bother
00:09:29
Moreover, just put it to the person
00:09:31
access level the system knows what this is.
00:09:34
it works with two factor there 3
00:09:36
factor identifications except
00:09:39
diameter to biometrics of numbers and everything
00:09:42
the rest there are also additional
00:09:44
things that are clearly a trend
00:09:46
today's visa is control
00:09:48
temperatures are breathalyzers
00:09:51
these are different frames of metal detectors
00:09:53
these are yes viewing systems which also
00:09:56
integrated into the control system
00:09:58
access control but for things like this
00:10:00
video verification is required and
00:10:02
snap directly image with
00:10:06
cameras at the time of an alarming event
00:10:09
automatic image snapping and
00:10:11
cameras for this event
00:10:14
our integration also allows
00:10:16
do it without any problems, moreover
00:10:19
there are still more like this
00:10:23
specialized systems like
00:10:25
thermal imaging control or then
00:10:26
they have their own viewing systems
00:10:28
interface and operators working on these
00:10:33
systems to which they sit there in
00:10:35
seen at the airport many times
00:10:38
is engaged in inspection, operators are working
00:10:41
in its interface so here we are thanks
00:10:43
our integration with these systems too
00:10:45
are ready to provide them within our
00:10:47
systems show them these interfaces
00:10:51
maknae needs
00:10:53
with additional layout systems
00:10:55
show them video surveillance for example
00:10:57
watched and watched the broadcast zone
00:11:00
interface from local system
00:11:01
monitoring center is there sides
00:11:04
I am some kind of system, for example we are all in
00:11:06
reports saw a huge
00:11:08
interscope of which the operators are wearing seat belts
00:11:11
this is what the operator sees only sees
00:11:14
operator everyone else seems to be
00:11:16
can't imagine what's going on
00:11:19
central security control post
00:11:21
which you should also see and what’s there
00:11:23
something is happening and only the camera is on top
00:11:26
demonstrates our functionality to them and
00:11:29
openness to integration with third parties
00:11:31
systems allows you to pick up as an event
00:11:34
from the same thing, for example, imperial like this
00:11:36
and the interface of the operator itself which
00:11:40
will be output to the top level and level
00:11:45
you are a monitoring center where the operator
00:11:48
the upper level will be able to additionally
00:11:51
control the work of that operator
00:11:54
which is located at the local point that
00:11:56
the same story with each individual
00:11:59
there are checkpoint operators who are at
00:12:02
separate local checkpoint on large
00:12:05
large objects we know what is there from
00:12:07
two or more checkpoints that could be like
00:12:10
automobile so car
00:12:12
fixed automobile pedestrian
00:12:15
railway and so on
00:12:19
respectively, all interfaces that
00:12:21
local ones can be selected as well
00:12:23
collect bring out central
00:12:27
monitoring we will also tell you about this
00:12:28
a little lower now we are talking about
00:12:30
local security
00:12:32
gearbox what is important when working with
00:12:36
thermal imaging systems that we saw
00:12:40
at this moment
00:12:41
implements these solutions everyone saw the same
00:12:44
as manufacturers of video surveillance systems
00:12:48
that is, cameras were produced cameras
00:12:50
There are now plenty of thermal imagers on the market
00:12:52
run around with their decisions
00:12:54
temperature control
00:12:56
but as frag practice shows this
00:12:59
the solution is effective but not completely
00:13:02
yes, well, I think everyone imagines it
00:13:05
if possible 5 put a plus sign
00:13:09
those who have already applied the technology on their
00:13:12
temperature control facility and we
00:13:15
accordingly, as if the hangers began
00:13:22
the glitches started, yes great, that's all
00:13:26
colleagues who
00:13:28
somehow collided with systems
00:13:29
noticed that the thermal imager
00:13:32
detects temperature rise
00:13:34
something specific and accordingly
00:13:37
as if a status bar is sent by something
00:13:41
event about exceeding and then the operator in
00:13:43
manual mode if he has time
00:13:44
work out these so-called events
00:13:48
that's good, but if there are a lot of events, checkpoint
00:13:51
for example, there’s a lot he can’t keep up with
00:13:53
process in addition there are false
00:13:55
event and they must manually
00:13:57
In addition, the thermal imager itself will be worked out
00:14:00
unable to identify and recognize
00:14:04
face technology is already being used here
00:14:06
facial recognition and
00:14:08
the trick of the same is that
00:14:11
incident on i management model
00:14:12
allows you to receive events on a specific
00:14:16
individual who recorded
00:14:18
temperature rise
00:14:21
block it with access control
00:14:25
incidents for which the operator must
00:14:27
will work with a certain
00:14:29
specific results and this result
00:14:31
will be archived for further analysis
00:14:33
flights you give a report and so on here
00:14:35
using the technology that I said with
00:14:39
directly let's say with securos there is
00:14:42
specialized form that is visible
00:14:45
directly below here
00:14:47
temperature determination happened here
00:14:49
accordingly, in the model it happened
00:14:52
recognizing who it is and below that's if
00:14:55
The temperature is shown a little later
00:14:58
bring the image directly into mode
00:15:00
the presentation is not visible, colleagues say it is not
00:15:03
visible presentation visible visible
00:15:06
presentation yes here is his audience
00:15:08
therefore confirms Alexander Borisov and
00:15:12
apparently your mobile
00:15:13
iPhone and please switch there
00:15:17
for the customer on a bench and chop coarsely
00:15:22
so everything will be fine thank you yes great
00:15:28
accordingly, it’s like an incident on me
00:15:30
the model allows the operator to quickly
00:15:33
work through all incidents in drinking none
00:15:36
that is, nothing will hide behind the horizon
00:15:38
and yarn both in real time
00:15:41
to immediately and withdraw the necessary ones there
00:15:45
cameras and event confirmation
00:15:49
bushy on the face and this is very important because
00:15:51
what practice shows there is 50/50 50
00:15:54
percent of incidents in live mode 50
00:15:58
percent later they sort it out when it’s already
00:15:59
something happened, this is also important to understand
00:16:02
where is there something with the battle of Lada?
00:16:04
or something happened and where it needs to be strengthened
00:16:08
technical means for example something else
00:16:11
so it is very important to choose a mode and
00:16:16
I would also like to add that we are now
00:16:19
we’re talking about automation, it’s scarce and it’s important
00:16:25
multifactor authentication is what it's all about
00:16:27
than quite kalachi said a little earlier
00:16:30
the essence is the following passage
00:16:34
carried out using your card, that is
00:16:36
using card + face yes
00:16:38
you can also control the presence of a mask
00:16:41
can also be pour controlled
00:16:43
presence of temperature any any
00:16:46
deviation creates an incident and
00:16:48
I have already told you about the incident, that is, if
00:16:51
due to one of the factors something went wrong
00:16:53
so the system blocks an incident is created
00:16:55
and the person is already, as it were, an operator entering into
00:16:58
side for manual debriefing well
00:17:03
let's move on here for real
00:17:05
in fact, you can talk a lot and
00:17:08
throw various
00:17:09
I suggest you still throw more
00:17:12
what what what did you meet before there
00:17:15
x-ray inspection metal detectors
00:17:19
throw whatever you want into the chat guys
00:17:22
will answer and try their best
00:17:24
do it quickly, but since we
00:17:28
We were talking about demonstrations, let's do it
00:17:31
tell yourself in the first part show
00:17:35
or rather
00:17:37
some some such a case about which
00:17:40
we didn't even talk within the structural framework
00:17:42
schemes there is such a trend this is automation
00:17:46
pass office
00:17:47
directly using the term
00:17:49
terminals for independent
00:17:50
visitor registration
00:17:52
this is now often used well
00:17:57
the economic effect of this is very
00:17:59
quite big
00:18:01
Well, this is quite an image effect
00:18:03
serious and such decisions allow
00:18:07
and remotely form for form
00:18:10
applications and quickly receive skipping on
00:18:13
at the entrance
00:18:14
go through the last thing about this that one
00:18:17
grandma may not be able to cope and what is important
00:18:20
present there in modern times from
00:18:23
minimize human contact with the same
00:18:26
pass office at one of the facilities
00:18:30
us we'll show you the case now
00:18:33
we were only allowed to film the pilot when
00:18:36
we tested it all there
00:18:38
but I think the next people they will eat new
00:18:41
about the dialogues, we’ll tell you how everything happens
00:18:42
yes look at this medical facility
00:18:48
which is necessary there is a need
00:18:53
submit an application for a pass remotely
00:18:55
using your own portal
00:18:57
own site there
00:18:59
medical school in this case yes
00:19:01
through public services through the hips and so on
00:19:03
this application is generated by the user
00:19:07
understand that a medical institution
00:19:08
it's paid, it can get into it
00:19:12
everyone having previously climbed
00:19:15
paid and signed up yes but do
00:19:18
You can do this from home and set a time for yourself
00:19:20
then he comes to
00:19:23
object well come to medical
00:19:25
institution he needs to get
00:19:27
pass and here it is important that according to someone else
00:19:30
medical policy to a conditionally alien
00:19:32
records didn't come someone else here we are
00:19:35
we can solve this issue with the help of
00:19:37
two-factor identification and how
00:19:39
on self check-in kiosks and
00:19:41
to the passage points and accordingly
00:19:44
then this person goes on
00:19:47
the territory goes directly
00:19:49
our office there was worked out
00:19:54
initially further development of this
00:19:57
the system is also an information system
00:20:00
difference booking system
00:20:02
positioning and information
00:20:03
person where he directly needs
00:20:05
go to which office using
00:20:07
information boards and monitors here and
00:20:10
this man comes out already on the map there
00:20:13
there are certain features, that is, we
00:20:16
initially a card is issued, he enters using
00:20:19
face by only one factor
00:20:21
but it comes out on the card, well, the customer
00:20:24
really wanted to come to us
00:20:26
I have no problems with this
00:20:29
could do a two-factor defecation
00:20:31
at the entrance here and back
00:20:34
and now something about specific cases
00:20:37
Sergey I’m thinking of commenting now
00:20:40
I hope everyone has a good video
00:20:42
quality acceptable quality I launch
00:20:48
that's how much the client registration itself
00:20:51
registered through government services
00:20:54
attach your passport happens
00:20:56
attraction of passport photos with
00:20:59
received in live mode here is the camera
00:21:02
directly black . after comparison
00:21:04
the check confirms there you can also
00:21:06
confirm that you agree with the processing
00:21:08
data pierce after which the system checks
00:21:12
if such a person is in the database and gives out
00:21:14
the corresponding pass and immerses in
00:21:16
access control system
00:21:18
the received photo in live mode
00:21:20
which we just made
00:21:22
and accordingly the right where to go
00:21:25
need to go that is the route to
00:21:27
specific office and how just
00:21:29
seen on video clips
00:21:31
directly colleague approached
00:21:35
checkpoint
00:21:36
1 factorial is implemented here
00:21:39
authentication is a pass through the face in
00:21:42
the other side of the man comes out
00:21:44
by loading the card into the card reader in case
00:21:48
if you need to implement two-factor
00:21:51
authentication or stop there
00:21:53
thermal imaging control is already a system
00:21:55
as if this one is growing further
00:21:59
the suitcase that is on
00:22:01
on her table right here too
00:22:02
I will demonstrate we also have guests here
00:22:07
present is a mobile brush that
00:22:09
there are 2 of them which is present in the company
00:22:11
intro and in company with
00:22:13
this mobile allows
00:22:14
connect to any turnstile and
00:22:17
directly on a living object
00:22:20
show how the system works in
00:22:23
live mode
00:22:26
so yes I'm accepted if
00:22:28
you will need to see it with your own eyes and
00:22:31
we can touch such a suitcase
00:22:34
bring along with our specialists and
00:22:36
demonstrate directly on
00:22:37
your object we continue further here we
00:22:43
let's talk about the automated system
00:22:45
inspection of the bottom, which is very important
00:22:48
current point in time during automation
00:22:51
checkpoint
00:22:53
enterprises with increased Sergei
00:23:00
and I have the following question for you
00:23:03
there will be several interesting to me
00:23:05
it seems there are questions to what you already
00:23:07
they said when it’s cooler
00:23:09
you can turn to the answers, that is,
00:23:12
spend a few minutes or so
00:23:13
comment on the subtext when
00:23:19
great then maybe before
00:23:21
go bend
00:23:22
mission yes, you were just talking about
00:23:25
several factors about facial recognition
00:23:27
and there are questions related to this, let's
00:23:29
I'm going to kick the speed and you kick them
00:23:33
accordingly about answer no
00:23:36
that's what it means
00:23:39
I have several questions, including from
00:23:42
Vladimir Orlov what software
00:23:44
provided with technical means
00:23:47
operation of the control system and
00:23:49
etc. including for users not
00:23:51
having dedicated automated
00:23:54
this is the place I answered
00:23:57
answered the question is it worth it for a long time
00:24:00
we have Dmitry with a percentage please
00:24:04
let me see that there is an answer but no
00:24:09
less that's always when it comes to
00:24:12
biometrics
00:24:14
is it a matter of protection or depersonalization
00:24:17
or where is it stored or how?
00:24:20
provided
00:24:22
information security I'm ready I'm ready
00:24:26
ready of them so here are the questions
00:24:28
look there is a face yes it is biometric
00:24:31
sign
00:24:32
binding to persons directly there
00:24:35
surname first name patronymic it's already called
00:24:37
personal data
00:24:39
this question is 152 in total look great
00:24:47
there are naturally degree requirements
00:24:49
to information security we have
00:24:51
a number of companies that cooperate with us
00:24:52
and provides services within
00:24:55
information security and protection
00:24:57
information
00:24:58
hardware there software
00:25:00
encryption and so on, well, that’s all
00:25:02
connected to the canals in part of Bastion 2
00:25:06
in terms of the people who work there
00:25:09
I'll type in the blanks, for example, yes they are
00:25:11
are operators of personal data
00:25:13
there is a requirement to log every
00:25:15
operator actions related to Persians
00:25:18
spears data, that is, looked at the pier
00:25:21
data copied changed pier number
00:25:23
data there or something else passport number
00:25:25
changed the last name, changed one pin and
00:25:27
so on and there is a requirement for a separate
00:25:31
logging actions of the Spears operator
00:25:32
data we have specialized
00:25:34
the module for this is called
00:25:35
a software module is called a module
00:25:37
bastion audit which is just the same
00:25:39
implement this function and of course
00:25:42
as the main main administrative
00:25:47
such
00:25:48
[music]
00:25:50
tool is the seal of the pier agreement
00:25:54
data and when issuing a pass
00:25:56
we can issue automatically from
00:25:59
without trio print according to preset
00:26:00
template pulls out the entire database
00:26:03
we know how to convey information, that's all
00:26:06
print these agreements automatically
00:26:09
everything else is about protection
00:26:11
information regarding interaction
00:26:14
CCTV systems and
00:26:17
we are just throwing information there
00:26:19
we don't work there with pier data, we're in this
00:26:23
parts and assign special
00:26:25
unified specific codes
00:26:27
photos
00:26:28
conditionally universal identifier
00:26:31
indicator and exchange only
00:26:33
identifiers contain personal data
00:26:34
Moreover, they don’t walk around in the secures system
00:26:36
they are not stored, they are only available with us
00:26:39
but with us they absolutely must because
00:26:41
that we have a client card and so
00:26:44
then everything is there, that's why we have it
00:26:48
implemented exactly like this I hope I
00:26:58
I follow the leitmotif of this question, yes if
00:27:00
these are fake but Vladimir helped there and
00:27:04
answered about digital signatures by
00:27:08
the first question is different
00:27:10
the tool is a particular integration
00:27:13
judge for me the active directory which
00:27:17
implemented at the enterprise clarifying
00:27:24
question grow funky how I understand it
00:27:28
maintain distance on objects
00:27:30
installations that certification too
00:27:35
context of children's school
00:27:39
look at biometrics from the point of view
00:27:43
at the final site
00:27:46
directly from the certification customer
00:27:49
and the customer himself is responsible for the certification
00:27:52
yes we do not have the corresponding
00:27:54
competencies
00:27:55
and licenses to carry out such work
00:27:57
For such tasks there are such companies
00:28:04
information security professionals
00:28:06
let's not advertise the corpse no
00:28:09
will understand and eat accordingly
00:28:12
regulating clarification on the stack like this
00:28:17
recently at one of our facilities
00:28:18
I just had a very difficult conversation
00:28:21
papers data first story all about
00:28:25
a number of protected databases are transmitted via
00:28:27
secure channels
00:28:29
channel and all encrypted for interception
00:28:32
events on these channels
00:28:34
first you need to get into the local network
00:28:36
in order for Colin to get into
00:28:38
local network which should be
00:28:39
essentially allocated at each facility
00:28:42
where security needs to be ensured
00:28:47
This is the task of the direct customer
00:28:50
that is, we are not engaged in protection
00:28:53
transport, so to speak, there are others
00:28:56
technologies encryption technologies other
00:28:59
other this part is probably not for
00:29:04
we are often asked the question how to
00:29:09
biometrics are stored in the secu system
00:29:12
data biometric data from point
00:29:14
view quantitative distance between
00:29:18
eyes, pupils there, etc. and so on.
00:29:20
they are stored linked to the indicator
00:29:25
without not to the person, that is, to understand who it is
00:29:29
and that this is impossible can only be understood
00:29:32
in case there is a break-in
00:29:35
systems
00:29:36
bastion and there, using indicators, reveal about
00:29:40
than what colleagues from tempra say
00:29:44
there is a corresponding table about
00:29:46
How is text protected on the pier?
00:29:50
data we cannot accordingly
00:29:52
share if anyone is interested
00:29:54
write to your chat our dear colleagues
00:29:58
you will be answered after the end of this
00:30:01
Events
00:30:04
yes thank you I think it will be
00:30:07
very useful because it's new to create
00:30:09
here everyone has intensified the discussion here
00:30:12
these security issues to cronix as
00:30:14
transmitted to you will decipher for what with
00:30:17
passport details so that with the model there
00:30:20
pull out faces
00:30:21
so on I think and even then it’s useful
00:30:25
please dear participants and our
00:30:29
partner I think that if there is either in
00:30:32
presentation on the country road based on the results
00:30:34
turn off the address to the cult the link to which
00:30:37
could turn to and people side
00:30:40
interested will be very good
00:30:43
Sergei Pavel I propose further we are the most
00:30:46
operational issues removed
00:30:48
here by the way we had one like this
00:30:51
we had a few comments here
00:30:55
such an idea
00:30:56
question I'll post the right question
00:30:59
customer very often suggest
00:31:01
facial recognition as you can see here we are in
00:31:04
our solutions we offer using for
00:31:06
this video filtering system server
00:31:09
who is a student here is a question for the terminals
00:31:12
be sure to ask questions
00:31:14
to manufacturers because the terminal and that's it
00:31:17
who are engaged in facial recognition
00:31:18
they keep the base on board in part even
00:31:22
152 written indicated if suddenly
00:31:26
the device can be removed with information
00:31:30
security the same device
00:31:32
You can take it off and take it somewhere later
00:31:36
having opened it and received all the personal data
00:31:37
from here right here
00:31:39
The figure is large enough for the system terminals
00:31:42
CCTV
00:31:43
Naturally the camera only deals with
00:31:46
video surveillance recognition
00:31:48
handle servers and data transfers
00:31:50
the servers are already working too, they are standing
00:31:52
secure place in court server so
00:31:54
next is a short comment
00:31:56
be sure to use this question
00:31:59
when you are offered solutions based on
00:32:01
and also when a solution is proposed
00:32:05
based on terminals it was proposed to set
00:32:07
question how
00:32:09
This terminal is administered because
00:32:11
what about management control systems
00:32:12
access sometimes there is a question of exchange from
00:32:15
entering the same data
00:32:18
these removals the person was fired there
00:32:21
everything needs to be cleaned, climb over, pour out
00:32:23
not all the same interface or this
00:32:25
Well, they often just use this one
00:32:27
the terminal is placed on the turnstile without any
00:32:29
where is the man and he just clicks the relyushka
00:32:33
on board so all data is available
00:32:35
as if below I won’t say the object yet
00:32:38
they came there to meet us and show us
00:32:40
technology, look how cool it is
00:32:43
it works but accordingly there is still
00:32:46
at the bottom
00:32:47
if the guest pass says
00:32:50
and if there is a person Nikolai comes
00:32:53
Stepanovich, good afternoon, so don’t be a threat
00:32:55
submitting photographs, we already understand this
00:32:57
what is phase 152
00:32:59
she's crying so let's move on now
00:33:05
let's talk about a little automation
00:33:09
inspection of the vehicle and
00:33:11
remote inspection of vehicles
00:33:13
facilities
00:33:14
by operators and by remote
00:33:17
operators I just have one moment Sergei
00:33:22
Attention your colleague Korolkov
00:33:24
posted a link to the virtual pit
00:33:27
I will explain the saying, dear participants
00:33:31
what is this for so that we are here in
00:33:34
our basically such a virtual
00:33:36
the conference room moved at a good pace
00:33:38
you if you have questions for example about
00:33:41
Is it commercial cooperation?
00:33:42
discounts like one of the participants
00:33:45
asked so can you switch to
00:33:48
this very virtual meeting and there
00:33:51
representative and actually both
00:33:53
our partner companies are you
00:33:55
Can you use voice in chat?
00:33:57
talk in more detail
00:34:00
Is there no more private chat?
00:34:03
Our conference is being recorded
00:34:06
so that you can respect Czech
00:34:08
then get a link to this very post
00:34:11
This is what I really wanted to say: transition
00:34:13
we'll just be
00:34:14
click on click on the link which
00:34:16
published by Nikolai Korolkov we are all
00:34:19
we can move on thanks novel
00:34:24
drop a little texting
00:34:28
your camera is on and you are next to us
00:34:31
you are there and will consider everything please
00:34:33
sorry for the comment hi let's move
00:34:38
further regarding gearbox automation in
00:34:41
parts of the bottom inspection system
00:34:43
we have such a solution, it's completely
00:34:47
our own production there
00:34:50
starting from the aircraft hardware itself
00:34:56
We manufacture aluminum and accordingly
00:34:59
Naturally, we don’t make diodes inside
00:35:01
there is a wide-angle camera that without
00:35:05
compression allows you to stream video
00:35:11
directly to the server and 1 server
00:35:15
happens directly
00:35:17
processing the received video more
00:35:19
I’ll tell you in detail now how it is
00:35:21
looks connected
00:35:24
more often next slide
00:35:27
but what is the advantage we, for example,
00:35:32
past last week were in
00:35:34
Vladivostok and were at one of the facilities
00:35:37
quite interesting ones there
00:35:40
interact children's camp and here
00:35:45
vehicle inspection process
00:35:48
as if with the forces of an operator with a mirror, well
00:35:52
the grandson arises and questions
00:35:54
efficiency of such work operator on
00:35:58
tee mirror made mirror
00:36:00
passes around the vehicle
00:36:04
formally, that is, in fact, I don’t know
00:36:06
what could he see in this mirror but I
00:36:09
I think it was ineffective I think
00:36:11
everything basically, well, we kind of saw it like this
00:36:15
will inspect the inspection occurs more or less
00:36:18
there is a formal history of our proposal
00:36:19
is that we don't say something
00:36:21
completely a thing that excludes
00:36:23
operator we say that this system
00:36:25
allows you to get
00:36:27
expanded panoramic image
00:36:29
image of the entire bottom of the vehicle
00:36:32
passenger trucks
00:36:34
vehicle tie it to
00:36:37
vehicle number at
00:36:39
primary passage his inspection inspection
00:36:41
produced it can be entered as a template
00:36:44
when passing the vehicle again
00:36:46
the remedy by number gets this one
00:36:49
reference image template on
00:36:50
in the image the first image can be
00:36:52
call differently and compare with that
00:36:55
image which was obtained in
00:36:57
the result of the journey made
00:36:59
just now and the operator is shown two
00:37:01
pictures in parallel which can
00:37:04
sum up a certain area and
00:37:06
select those areas directly
00:37:10
which you are interested in and see what
00:37:11
difference plus in addition the tape there more
00:37:16
Moreover, he had already made the decision to pass
00:37:20
one or another transport
00:37:22
personified it misses on that
00:37:25
the same object that we were little
00:37:28
that the inspection is carried out there
00:37:29
formally moreover after that still on
00:37:31
in winter the barrier key fob button is pressed
00:37:33
Naturally the blink button is not for anyone
00:37:36
tied to pressed pressed who pressed
00:37:38
when you can’t tell ours after a while
00:37:40
really from who was on that shift who
00:37:43
I was on duty and so on I could still
00:37:46
I don’t know how to answer the questions right away
00:37:49
[music]
00:37:53
difference in volume we will yell
00:37:55
louder I'm looking for some sound please
00:38:01
then confirm your comfort and fine with us
00:38:04
I can hear it normally so I often still
00:38:12
I have a question about the system
00:38:15
inspection bottom next is it possible
00:38:18
automatically compare the reference
00:38:21
bottoms with those that received in
00:38:23
as a result of fresh passage and
00:38:25
automatically detect
00:38:26
with the help there you can talk
00:38:29
neural network analytics of deviations
00:38:32
boxes and so on the answer is simple yes
00:38:35
is it possible if we are in Arabic
00:38:37
emirates where the bottom is always you
00:38:39
fire and sand and always clean
00:38:41
conditions of real Russian
00:38:46
the origin of the roads there is pollution
00:38:50
bottom snow icing and so on
00:38:53
it happens that in principle it’s like nothing
00:38:56
some customers can be seen using
00:38:58
this type, but this is not visible even when
00:39:00
using a mirror, that is, using a mirror
00:39:03
the bottom is also not visible so here it is
00:39:05
Don't look for automatic analysis
00:39:06
impossible because the deviation is too
00:39:09
high there just a red square
00:39:11
everything is normal and some are ineffective
00:39:14
customers who implement data
00:39:15
the technology they make
00:39:17
well, for whom it is very important to do this
00:39:19
panel washers with warm steam
00:39:21
they knock down the ice there in the north
00:39:24
there is and after that an inspection is carried out
00:39:27
[music]
00:39:29
manual mode about there is often a question
00:39:32
about the polluted pollution
00:39:34
the very best of snowboarding as we do it
00:39:36
we call it quite easy to clean there
00:39:39
the simplest option is the rag the most
00:39:41
the correct option is a Karcher dome
00:39:47
overtook which rubbed follows that
00:39:50
anti moisture what is it now domed
00:39:54
format, therefore, if drops come into contact with it, it
00:39:56
automatically drains very quickly
00:39:58
there is a device like a wiper in
00:40:01
there is no need to accept it
00:40:04
and inspect the system operation more easily
00:40:18
let's go and dive in, this is what it looks like
00:40:21
bottom inspection system here it is
00:40:22
operator encrusted in asphalt
00:40:25
would have carried out the inspection promptly
00:40:26
pressed the corresponding button or there
00:40:30
noted count or here's the interface
00:40:32
operator here's how it's done
00:40:33
reading no system works too
00:40:38
in a very interesting way I'm from yours
00:40:40
let me pause and show you the principle
00:40:44
work and how it differs in principle from
00:40:46
alternative systems on the market speed
00:40:49
the passage is very happy
00:40:51
at the enterprise directly at the checkpoint
00:40:55
it happens from different angles the arrival occurs
00:40:58
that's why distortion happens
00:41:00
generally travel at different speeds, that is
00:41:04
he drove slowly then he sped up
00:41:05
slowed down and we understand that everything is there
00:41:09
panoramic cameras were taken in
00:41:10
two thousand years
00:41:11
which occurs as if thrusting into
00:41:13
in our case this is excluded by the fact that in
00:41:20
during the journey, if you pay attention
00:41:22
attention mouse we can see right here
00:41:25
a small stripe, well, roughly speaking, there
00:41:28
two centimeters from the entire panoramic camera
00:41:31
are chosen and simply done
00:41:34
screenshot of threads 0 and just this one
00:41:36
the stub is folded into a separate base and
00:41:40
then at the end of the journey
00:41:41
vehicle neural network
00:41:43
analytics merging this image into
00:41:45
one complete picture if it happens
00:41:48
rolling it back and not the car then
00:41:50
repetition occurs accordingly
00:41:51
pictures never system starts given
00:41:55
puzzle collect she sees repeating
00:41:58
elements and excludes them this way
00:42:01
there is a set of fairly correct
00:42:06
appearance of the image we are working on
00:42:09
on optimization and quality improvement
00:42:13
glue it together equipped glued it together
00:42:16
image there are more recent videos
00:42:19
who allow this, if you pay attention
00:42:21
attention this is February 19 of the current year
00:42:24
moment of time and deformation in general as
00:42:27
such in principle even up to separately
00:42:31
I'll show you the video clips later
00:42:33
wall, if you pay attention here
00:42:38
here are the edges of the children they are
00:42:40
ribbed is exactly the result
00:42:42
from the very same gluing on again
00:42:46
license plate recognition system and here it is
00:42:49
we have inserted the image here
00:42:50
image of a better machine
00:42:52
the car drove forward, drove backwards and
00:42:55
here's an additional image
00:42:57
it turns out and here are two images
00:42:59
image quality you see it like
00:43:01
times the application of technology in Arab
00:43:02
emirates what I was talking about
00:43:04
from the sandblasting bottom, are you even here?
00:43:06
We probably have a moment of such cars
00:43:10
the car dealership is taken away, well, basically
00:43:14
It works like this:
00:43:17
can be inserted into locking zones can be
00:43:21
just insert before entering in order to
00:43:24
to record something drove it into
00:43:26
within the framework of solving anti-terrorism tasks
00:43:28
again when the operator is personified
00:43:32
with your travel card it all remains in
00:43:36
their login password in history
00:43:38
operator is saved in the same history
00:43:41
the travel process is saved as
00:43:44
in the archive you can see everything with a quick click
00:43:46
you can go from the archives system
00:43:49
see how it all happened
00:43:52
debriefing, for example, as is often the case in
00:43:55
Belarus I had an event with
00:43:57
military and here is one military man
00:44:01
jumps up and says this is amazing
00:44:04
Now it’s clear who will sit down
00:44:06
this formulation was reached
00:44:12
colleagues and we want to smoothly immerse you in
00:44:16
a landfill located in the city
00:44:18
St. Petersburg where they are located
00:44:21
Twin's solutions are simple
00:44:24
different sections of the pristom system
00:44:25
security lighting protection system
00:44:28
perimeter management control system
00:44:30
different types of access are installed
00:44:34
fence somehow mesh somehow
00:44:37
concrete fencing forged in the same place
00:44:40
technology is present
00:44:43
companies and with the network, here it is
00:44:47
displayed on the right in this polygon
00:44:50
fully functional mini deployed
00:44:53
enterprises with perimeter protection with
00:44:56
various technical solutions
00:44:58
systems are integrated with each other, we provide you with
00:45:01
Today we will show only part
00:45:03
certain solutions in the center of the Gauls in
00:45:06
in principle we invite everyone there
00:45:09
ready to show interaction set up
00:45:12
show system interaction scenarios
00:45:15
how do they interact
00:45:16
take part in this interaction
00:45:17
each customer partner can
00:45:19
independently grandchildren the presence of us well
00:45:24
and accordingly we can more deeply
00:45:26
immerse into the system infrastructure this and that
00:45:29
what we are not doing today because
00:45:30
essentially these are two Lego boxes that
00:45:34
swear among themselves behind walls
00:45:37
different cubes can be used to build
00:45:38
various locks
00:45:40
interesting solutions and so on we smoothly
00:45:44
switch to watering
00:45:46
guys advance woola meet at
00:45:52
training ground I'm Victor, or hello, what's my name?
00:46:00
I can hear it well I need it ok well not yet
00:46:03
seen hello heard good level
00:46:06
your sound is also higher than ours
00:46:10
speakers, therefore, by the way, Sergei Vorota
00:46:15
microphone diagrams are positioned so that
00:46:17
when you're closer
00:46:19
about 30 centimeters on the screen there is sound
00:46:21
the sound level increases sharply
00:46:25
this is Ilya's view please we will build and
00:46:29
Do you hear my name is Ilya everyone
00:46:31
now we are at the training ground on our
00:46:34
city ​​of St. Petersburg here we are
00:46:36
testing our integration systems with
00:46:38
by third party developers in this block
00:46:41
Let's demonstrate how we work together
00:46:46
works with elsys scanner and recognition module
00:46:48
faces their sex at the passage points which
00:46:52
located behind my back implemented
00:46:56
actually beech factor authentication
00:46:58
in order to minimize risks
00:47:00
related to unauthorized
00:47:02
penetration implemented on on
00:47:05
integration of the miss recognition system on
00:47:07
based on shooting neural networks if you're
00:47:10
a space x confused with through
00:47:12
Bastion hardware and software complex
00:47:15
I'll ask my colleague for another screen share
00:47:19
servers
00:47:26
if so, we'll try now
00:47:32
work through a standard scenario
00:47:34
walk through how it works and how we walk
00:47:42
passage points
00:47:44
attach the card, the system is waiting
00:47:47
confirmation from recognition module
00:47:49
if not the conductor is face recognized
00:47:54
[music]
00:47:56
open let's say your card
00:48:01
fell into the hands of the attackers were
00:48:03
intruder act my colleague
00:48:05
victor victor fits well with
00:48:11
cops apply to the reader
00:48:14
the system is waiting for confirmation of access for me
00:48:17
provides here
00:48:23
access denied is acceptable
00:48:29
intruder besides your card what
00:48:31
I got your photo somewhere
00:48:35
fits .
00:48:36
photo a card appears from your photo
00:48:42
The system does not recognize a face
00:48:46
message about the possibility of substitution and
00:48:51
denies access
00:48:57
like this
00:49:02
works
00:49:03
two-factor verification helps
00:49:07
secure additionally and will be .
00:49:10
passage
00:49:11
well, actually in this part
00:49:16
our demonstration is over
00:49:21
next we will demonstrate joint
00:49:25
work analytics bastion analysts cheek
00:49:28
times and hardware-software complex
00:49:30
I wish he was now thanks for your attention
00:49:35
thank you great Sergey we are switching on
00:49:44
thank you Ilya Ilya will not forgive us yet
00:49:51
will still be there when you turn on the second block
00:49:53
third we will move further along
00:50:00
presentations are going on and the sound here is very
00:50:10
bad you can there somehow
00:50:14
turn the microphone or move closer to
00:50:16
it's okay for him, it's better yes I
00:50:21
I'll ask my colleague Leo for something
00:50:24
interactive carry our presentation like this
00:50:26
additional to create interest
00:50:29
do and takes the floor from colleagues good afternoon
00:50:34
now Moscow will turn on the next one for us
00:50:38
slide
00:50:39
we want to remember this a little before
00:50:43
next step we have a question for
00:50:47
the audience is such a warm-up for the needles
00:50:50
brain, here we offer you to solve the problem
00:50:54
which is now on the slide and
00:50:57
write answers in chat accordingly
00:51:00
write the answer in the chat only correctly 1
00:51:03
Those who answer correctly will receive prizes from
00:51:06
twin pro companies and s companies
00:51:09
Well, to put it briefly, yes, I’m a little bit
00:51:13
I'll hold the slide for you so everyone can
00:51:16
read it I think everyone can see
00:51:18
the problem is so interesting and we can do it for now
00:51:27
Alexander Ryzhov has already considered saving
00:51:31
other work options
00:51:36
Pinkov Olga Inshakova
00:51:38
from the company the schedule also decided
00:51:41
take part
00:51:42
Andrey Parshin but there is a participant
00:51:48
who says that too little data is impossible
00:51:50
counting the answer correctly was no longer possible
00:52:00
this is Andrey Parshin Sergey how would it be
00:52:04
correct solution 2 600 to
00:52:10
[laughter]
00:52:13
Be sure to leave your details with you
00:52:16
We will contact you and send our branded prizes
00:52:18
useful well there life at work yes I
00:52:23
I'll comment a little
00:52:26
another topic that Ilya told before
00:52:30
demonstration pay attention to this
00:52:35
somehow took me to Sergei's position
00:52:37
I can hear you better than you, I don’t know how
00:52:39
reason but really sound level
00:52:41
very different a little bit
00:52:51
I’ll comment on our video from our training ground
00:52:54
I just want to watch the live broadcast
00:52:57
pay attention Sergey and guys
00:53:00
chat if anything, details will be answered if
00:53:03
no one is interested, please pay attention
00:53:05
on 2d
00:53:07
facial recognition we
00:53:12
distinguish a photograph from a real person
00:53:14
it's important it's important just but often people
00:53:20
who are engaged in 3d recognition
00:53:22
they come and say that it’s nothing but 3D
00:53:25
cannot distinguish the substitution simply
00:53:28
please note that we know how to make them
00:53:30
taxes there, the nuances can be told if
00:53:34
someone will be very interested
00:53:36
interesting fact probably follows
00:53:38
reply above tag next
00:53:41
facial recognition for a company with a product
00:53:46
secu time to work according to the algorithm before
00:53:50
quart, that is, at the stage of entering the frame
00:53:52
faces a lot of faces going on
00:53:58
their capture and automatic recognition
00:54:00
until the person
00:54:04
will present some kind of border pass
00:54:07
directly in the buffer
00:54:09
this is for understanding this is during implementation
00:54:13
checkpoint mode when a crowd of people is walking
00:54:17
video surveillance systems even before approaching
00:54:19
turnstile
00:54:20
for example, it already recognizes the turnstile
00:54:23
faces and holds them in a cove buffer which
00:54:25
adjustable in time it is possible
00:54:27
tune in keeps them in buffer and man
00:54:29
by applying the card the system already knows and
00:54:32
selects it from a specific one only
00:54:34
circle of people
00:54:35
is there such a thing or not such a thing and
00:54:38
this money happens directly
00:54:40
text with text come get down
00:54:42
this is important to ensure the necessary
00:54:46
passage speed that is, in fact
00:54:48
man approaching the entrance
00:54:50
firstly, he doesn’t need to position
00:54:52
face because reaching the entrance
00:54:54
reaching the turnstile he somehow
00:54:56
turned her face and got into the frame and him
00:54:59
already recognized
00:55:00
and it is important that the system does not choose with the whole
00:55:03
heaps and don’t ask
00:55:06
for video surveillance systems at this particular time
00:55:09
moment in time, let's go since I'm late
00:55:12
no one is forced to recognize her
00:55:15
everything has already been done, then the person walks as if
00:55:17
the usual picture is actually both signs
00:55:19
already immediately compared in our complex
00:55:23
and the person does not notice he is walking or the street
00:55:26
it turns out everything is already the second sign already
00:55:29
was this is very important when implementing the regime in
00:55:32
checkpoint just noticed us
00:55:37
I'm not for like Andrey with a break without
00:55:40
alibama break for a while yet
00:55:42
questions are not a question, you can move on to
00:55:48
the second section doesn't seem like a break
00:55:50
we need a little kulish for the task
00:55:54
solved ok, you can ask
00:55:56
rest a little before moving on to the section
00:56:00
2 is automation of control over
00:56:01
technological processes in non-standard
00:56:04
situations but here are actually tasks
00:56:08
a lot this is exactly the story
00:56:10
top level and top top even
00:56:14
not the top rio third-party level like this
00:56:16
called over the system hesitated on the side
00:56:18
security systems here too
00:56:21
in fact, I would like not to dive into the schemes
00:56:25
don't tell you where something is
00:56:29
I'll give you the algorithm, I'll just give it to you
00:56:33
Sergey will also give one example of it
00:56:35
example there was such a task not from the service
00:56:39
the security of some enterprise was
00:56:41
task of preventing fuel theft
00:56:45
at one of the oil refineries
00:56:47
factories all very simply came to
00:56:51
pain car prohibited for pouring
00:56:56
fuel stood there on his platform
00:56:58
a pile of batteries or bags of nails
00:57:01
whatever it is in short
00:57:02
traditional scheme he stopped by
00:57:04
territory of the enterprise received some
00:57:06
documents the load went to the weighbridge
00:57:10
weighed in as empty and arrived in bulk
00:57:13
before he rode from the weighing station to
00:57:16
during the bulk period of this time he
00:57:18
reset ok
00:57:19
Ulya Taras poured himself a drink from his platform
00:57:21
there are 300,400 liters of fuel more than
00:57:24
arrived at the weighing room as expected
00:57:26
and weighed himself and showed me 304, well that’s
00:57:30
the classic scheme went beyond
00:57:31
the territory continued to be drained of gasoline
00:57:33
losses
00:57:34
the enterprises were really colossal
00:57:37
very serious and we’re not even there
00:57:40
service commercial department of the enterprise
00:57:42
set such a task by introducing the system
00:57:44
license plate recognition
00:57:46
together with an access control system and
00:57:49
route tracking systems
00:57:51
I’ll tell you right away what will happen later
00:57:57
one month after implementation
00:57:59
did they cut down 80 percent of thefts?
00:58:03
fuel has decreased, everything is very simple from
00:58:05
the boiler arrived and received documents for
00:58:09
at the entrance to the enterprise territory further
00:58:13
assigned to him randomly
00:58:15
system er in the upper level system with
00:58:19
those ASU TP was assigned an arbitrary weight
00:58:23
he went thinner naturally
00:58:26
limited access to check-in only
00:58:28
certain owl so that there is no
00:58:29
let’s say the fact of collusion did not adjust the scales
00:58:33
so he drove on and weighed himself further, each
00:58:37
route to the premises of the enterprise
00:58:39
tracked by time was set
00:58:42
temporary regulations what if more than 15
00:58:45
minutes it travels from the weighing room to the bulk one
00:58:47
after all, to throw off the battery there
00:58:49
either the bags need time and you need a check-in
00:58:51
somewhere in the other direction I myself am more than 15
00:58:54
minutes goes by, it just gets blocked
00:58:56
next point of passage and beyond
00:58:58
security services to figure it out
00:59:00
why did he take a long time to get to the next one?
00:59:04
or an incident is created and naturally
00:59:07
the entire algorithm is prescribed to the control system
00:59:09
access control
00:59:10
if a route violation occurs if
00:59:13
on the 3rd owl I went not some kind of liquid
00:59:15
another part of the enterprise there
00:59:18
Naturally, they also sit or are blocked
00:59:21
you need to go back completely or
00:59:24
we are already working in a higher mode
00:59:26
accordingly there in an arbitrary way
00:59:27
liquids were handed over and further
00:59:31
in reverse order it's about the same
00:59:33
all data is absolutely time of entry
00:59:37
photos
00:59:39
roller driving the car along with but with
00:59:42
Rasputin's number was transmitted by the system
00:59:44
days, of course there was a full protocol
00:59:46
loading arrivals and so on if simple
00:59:48
analysis of the incident hum then they raised
00:59:50
quickly here is the protocol
00:59:54
specific car and everything all at once
00:59:57
it became clear right away I want to clarify that
01:00:01
such implementations are possible only in
01:00:04
close interaction with the service
01:00:05
customer's clear statement of tasks and from
01:00:09
customer but the most important thing is that we
01:00:12
We provide tools to solve
01:00:14
such tasks payback of the system
01:00:17
this is an economic effect for us
01:00:19
the leitmotif should go throughout
01:00:21
presentation of system payback two
01:00:23
a month and a half, everything is fully implemented
01:00:26
design there, installations and everything
01:00:28
the rest is a month and a half and the system
01:00:30
paid for itself but they stole gasoline there a lot, so I
01:00:36
I tried to tell you in words so as not to
01:00:38
Sergey did not reproduce the interactive here
01:00:42
in manual mode on the board we also have a board
01:00:45
there is therefore Sergei now
01:00:47
switch your camera and show you
01:00:52
your case
01:00:54
process control systems
01:00:57
looks like case I'll tell you how
01:01:01
implemented then I'll turn off the sound now
01:01:09
microphone now
01:01:18
well, probably included a couple of yours
01:01:22
Screen sharing can be removed
01:01:31
so colleagues and I appeared on the list
01:01:35
yes, at the top you can click on mine
01:01:41
here's a picture with a paper clip so that
01:01:45
go more than 1 upper level to
01:01:48
let's go here please, we can definitely see my forest
01:01:51
and we hear very well so great we
01:01:57
We are at the company office with
01:02:00
Here we have it, plus minus, that’s all
01:02:03
looks like this at the current time
01:02:04
we work live on steam video
01:02:07
We do not have various displayed
01:02:09
technical solutions there in more detail
01:02:11
I'll go through them at least here's one
01:02:15
interesting case
01:02:16
here Pavel directly spoke about
01:02:18
weight and how it happens
01:02:22
stealing something right there
01:02:26
we can eat at the weighing station
01:02:27
twist here I came across one
01:02:29
tasks when there is a window at the weighing station
01:02:33
on top and here is the adjustment window
01:02:37
where does the accuracy adjustment take place?
01:02:41
measurements so if you put it there
01:02:43
magnet and move it depending
01:02:46
from the distance the more there from
01:02:48
moves away a certain distance
01:02:49
that magnet, the greater the deviation in
01:02:52
weight to solve this problem we have
01:02:55
there is and I don’t know how it will be good
01:02:58
is it visible is it difficult to see is the analytics
01:03:03
positioning a person in space
01:03:06
there is a man bent over a man has fallen
01:03:10
the man sat down the man stood up, that is
01:03:12
we understand the human situation in
01:03:15
space we can analyze it
01:03:17
behavioral instinct using this way
01:03:21
similar analytics or there are two types
01:03:23
analyst even on the weighing platform when
01:03:26
is happening this is a ring, a person entering the zone is
01:03:30
there is already at least 1 way to inform about
01:03:34
that the security operator must
01:03:37
pay attention to what happens next
01:03:38
occur if a person is in
01:03:42
zone of this window we accordingly
01:03:45
we will select the appropriate zone for
01:03:47
to control her
01:03:48
the operator will receive a notification about this
01:03:52
if a person sat down, for example, next to this
01:03:55
Accordingly, the window is no longer needed
01:03:59
just kind of pay attention to how in
01:04:02
in the first case you need to add and already
01:04:04
emphasize that he will be there
01:04:07
continue to do accordingly under this
01:04:09
the incident is recorded in the archive and
01:04:13
further debriefing can be arranged
01:04:18
I tried accordingly
01:04:20
draw on the board
01:04:24
the structure is kind of banal
01:04:27
object and here on the object we see but
01:04:30
there is a perimeter
01:04:33
there is a checkpoint
01:04:37
weight yes railway checkpoint yes
01:04:41
there is an administrative building from
01:04:44
pedestrian areas
01:04:46
the railway track is the essence of it
01:04:52
images next when transport
01:04:54
the vehicle arrives at the checkpoint and in it
01:04:58
directly record documents that
01:05:02
he brought there and so on is recognized
01:05:04
vehicle number bastard
01:05:06
you can pull information from the river about
01:05:09
what is in Georgia here is an example
01:05:11
one of the objects was supplied with saltpeter
01:05:14
ammonia and, accordingly, according to documents
01:05:18
there were 20 tons according to the algorithm
01:05:22
the vehicle must enter
01:05:25
territory
01:05:26
scales on the territory of the enterprise after
01:05:28
document checks
01:05:29
pass through the weighing room weigh the mass
01:05:33
gross net travel to warehouses loading
01:05:36
and return directly
01:05:38
overturn in the same way and
01:05:40
and enterprises with the assurance of all
01:05:41
documents directly to
01:05:43
car gearbox
01:05:44
so this is what really happened
01:05:46
a vehicle also passed
01:05:48
I was driving past to the warehouse with a group
01:05:51
like-minded attackers and not
01:05:55
downloaded the missing ones there
01:05:57
bags or them with Big Bregan and in the opposite direction
01:05:59
side returned to the weighing area
01:06:01
accordingly the route was disrupted
01:06:02
movement throughout the enterprise in this way
01:06:07
weight
01:06:10
naturally it turned out as if there
01:06:12
documents everything as needed as received
01:06:18
in this case when solving a case
01:06:20
installed a license plate recognition system
01:06:22
vehicles at the weighing station she was
01:06:25
and so on when changing the route
01:06:27
the transport number was recorded
01:06:29
means if the number is closed some
01:06:32
for example, with a cloth as fashionably as possible
01:06:34
in Moscow in a parking lot to do this so as not to
01:06:37
pay for it yes we fix
01:06:40
the vehicle is in the zone
01:06:43
without a vehicle number what
01:06:45
automatic incident which
01:06:47
needs to be resolved by force
01:06:49
security services therefore applying
01:06:54
system interaction technologies
01:06:56
weight not derpy system system
01:06:59
CCTV on lithic systems
01:07:00
access control control can be solved
01:07:03
Territory routing issue
01:07:05
enterprises while we are here near
01:07:10
I want this presentation slide
01:07:14
also note the railway checkpoint
01:07:17
because very often business cases
01:07:20
related to number plate recognition and
01:07:23
railway cars here is an example
01:07:27
implementation of such a case here in a mix
01:07:31
there are railway tank cars and
01:07:34
containers there anything that is they
01:07:37
can be within one carriage
01:07:40
accordingly, all numbers are recognized
01:07:42
these numbers can be downloaded
01:07:45
Excel can be used for control systems
01:07:47
access control can be uploaded vrp
01:07:50
enter the enterprise system by yourself
01:07:56
railway accounting
01:07:59
composition and integration are different there
01:08:01
countries and so on and so on
01:08:05
back to slide back to
01:08:09
slide and, accordingly, at the same checkpoint
01:08:13
all departing carriages are recorded
01:08:16
accordingly, how they are counted
01:08:20
keeping track of how many moved in, how many left
01:08:23
because, for example, there are cases where
01:08:25
very huge enterprise not like me
01:08:28
I drew it here on the diagram
01:08:33
a large number of railway tracks
01:08:36
and there are places where these railway
01:08:40
settling tank cars are called stored
01:08:46
for a while so that's when they are there
01:08:49
they are stored for some time, they are rented
01:08:51
the question arises of paying rent when and
01:08:55
where is this carriage which way will we take?
01:08:57
he left quickly and efficiently for this
01:09:00
the question is very difficult to answer
01:09:01
accordingly you can system
01:09:03
recognition can be used in the same way as
01:09:06
as a wagon accounting system in Yarppi
01:09:08
systems to determine on which branch
01:09:11
is this car located and what time is it?
01:09:12
he is there and place
01:09:15
the appropriate service about what has arrived
01:09:18
time to push the car back because
01:09:22
it is possible to extend the rental period
01:09:26
this is the next story about the rp system
01:09:32
for example for example for example but also
01:09:36
good case
01:09:37
system interaction
01:09:39
analytical control with
01:09:42
technological safety for
01:09:44
ensuring environmental safety
01:09:46
there are roads at the enterprise
01:09:49
pedestrian zones often arise
01:09:53
injuries are associated with the fact that the truck
01:09:55
for example, I was driving
01:09:57
a man crossed the road one another without
01:10:00
I saw I was wearing headphones and talking on
01:10:02
the phone doesn't matter, there was some kind of accident
01:10:08
let's call it fatal and here
01:10:11
It's like asking how much life is worth
01:10:13
person before using the system
01:10:16
monitoring control the presence of people in
01:10:20
directly in the pedestrian zone if
01:10:23
no, leave the pedestrian zone
01:10:25
an incident that allows, as it were,
01:10:27
service corresponding either there
01:10:30
demotivate a person to do so
01:10:32
no longer did this penalty
01:10:34
sanctions or, well, administrative
01:10:37
impact on him pronounce
01:10:39
the same story if for example
01:10:41
the vehicle enters
01:10:43
pedestrian zone, that is, check-in
01:10:46
vehicle pedestrian zone
01:10:48
this is also some kind of violation
01:10:52
in addition, there are stories for example about
01:10:55
internal object where there is for example
01:10:58
some kind of warehouse and in the storage area
01:11:01
some kind of loader is working and in
01:11:05
there is no time there at this moment
01:11:07
a person should not be in principle
01:11:09
Well, in general there should be an entrance to the warehouse
01:11:13
limited, that is, this issue is poorly resolved
01:11:15
her second story is about presence
01:11:17
personal protective equipment for example
01:11:19
such as helmets the most popular story
01:11:21
which is flying away with us with a bang
01:11:27
I'll give you an example
01:11:28
here we come, this is an example of implementation
01:11:33
the presence of helmets on the head accordingly
01:11:36
How can the whole story be linked with this?
01:11:38
access control system then
01:11:41
is if a person passed without a helmet and his
01:11:44
needs to be stopped
01:11:45
if the person is wearing a helmet
01:11:48
tell me the image allows at all
01:11:50
see what is written there
01:11:52
or everything is very terrible look we have
01:11:57
two images means one image
01:12:00
worse through the screen pause and 2 approx
01:12:05
yours and it is much more legible
01:12:11
two screens are displayed I can try
01:12:17
disable this one let me do this
01:12:23
I’ll connect the part like this and now
01:12:30
Now we see much better clearly
01:12:34
better please great that's great oh
01:12:42
loss, I can also see it has become more beautiful
01:12:44
great, but the presence of helmets on the head
01:12:48
tracking lady where did you go definitions dream
01:12:51
that is, here are several uses
01:12:53
types of analytics on one camera
01:12:56
allows you to analyze
01:12:57
automate some actions
01:12:58
It’s clear that analytics is not omnipotent, but
01:13:02
it can reduce reaction time
01:13:04
operator when something happens
01:13:06
the same emergency situation at the facilities
01:13:10
there are over 100,200,300 cameras and so on
01:13:14
when, for example, there is one of the big ones
01:13:20
objects and two thousand cameras is possible but
01:13:23
cry really hard on these cameras when
01:13:25
you can't see anything there, it's hardly possible
01:13:28
determine something quickly
01:13:30
work out here is an example of how analytics works
01:13:33
for example, at the same training ground in
01:13:36
St. Petersburg I'll run away and leave
01:13:37
object there I cross the line I enter the zone
01:13:41
and accordingly this all happens on
01:13:44
one camera ran and accordingly
01:13:50
object detected
01:13:52
left by Hector entering the zone and
01:13:54
other things like this happen when
01:13:59
soloist analyst works out creates
01:14:02
some reactions, for example if
01:14:03
some kind of perimeter security then
01:14:06
poster turns on
01:14:08
included in the operation of security systems
01:14:11
lighting charge if this is for example
01:14:13
running man yes we will show it all
01:14:15
how does it work live on
01:14:17
training ground
01:14:18
if a person is well or there and we are waiting for a visit and
01:14:21
if a person, for example, basically
01:14:23
the territory of our facility is moving
01:14:30
very quickly and he ran perhaps
01:14:31
some kind of emergency situation
01:14:36
attention is required
01:14:38
relevant operators regarding
01:14:42
warehouse pedestrian crossings
01:14:44
complex I told that is, finding
01:14:46
in the helmet control zone there and so on
01:14:49
there is a lot of work in the forklift area
01:14:51
various cases can be cited in
01:14:55
attention but at the moment it’s better than them
01:14:57
actually demonstrate on
01:14:58
the training ground is such a seed we all
01:15:00
We are waiting, we invite anyone who is interested
01:15:02
We can organize it as best we can, but plus
01:15:04
with the training ground and this whole story
01:15:08
Let's demonstrate, we don't know, I can't
01:15:10
show again for quality
01:15:11
the pictures were more beautiful everything to be had
01:15:15
body, this is the interface, just the system
01:15:17
tank car number recognition
01:15:21
containers into the system interface
01:15:24
there for number plate recognition
01:15:26
vehicles in flow mode
01:15:29
situational analytics detectors
01:15:32
left slabs of objects in clusters
01:15:34
people for example there are things like
01:15:36
whether there are intersections food and so on that is
01:15:39
every element but analytics
01:15:42
works out the question here as if what
01:15:44
further, that is, introducing some
01:15:46
the system needs to understand what's next with this
01:15:48
information to do and just a decision on
01:15:51
automation of interaction with the company
01:15:54
twin about integration with event bastion
01:15:58
which arrive from our system
01:16:00
situational analytics do not allow there
01:16:03
I know, unlock the turnstile, turn on
01:16:04
lighting
01:16:05
turn on the row of lights turn on there
01:16:08
turn off the elevator ventilation and lower
01:16:11
down for example there and so on
01:16:16
let's go back I
01:16:18
and I give half a word, turn off the microphone or
01:16:22
direct or and pass the word
01:16:24
let's go straight to the forefront of Ilya's words
01:16:26
turn on Lyama leader and then we are here
01:16:37
I can hear spring
01:16:39
we see we hear so and so we a little
01:16:43
changed location Sergey already showed
01:16:47
some analyst interaction
01:16:51
secura and fast recording systems now we will show
01:16:57
from the floor it's on the camera behind me
01:17:01
somewhere in the distance video analytics is working
01:17:05
permanently implemented detectors
01:17:08
abandoned objects of people without helmets
01:17:11
penetration into the zone while in the zone
01:17:15
moving in the wrong direction
01:17:17
loitering detector and detector
01:17:19
crowds of people first
01:17:24
I'll tell the systems to each other
01:17:27
interact in the severus interface
01:17:30
configured for example prohibited and
01:17:34
direction of movement and when moving
01:17:39
person person in the frame in this
01:17:42
forbidden direction are formed
01:17:45
alarm message bastion queue
01:17:50
includes a security lighting system and
01:17:54
turn turn the camera to
01:17:56
specified during installation so
01:18:01
now I will turn on the necessary script
01:18:07
literally the first demonstration
01:18:11
moving in a prohibited direction
01:18:13
movement from me behind my back is allowed
01:18:17
the system does not respond at all please
01:18:22
attention tax in the bastion
01:18:24
the system does not react to the person
01:18:30
turns around goes forbidden
01:18:32
an alarm message is coming in the direction
01:18:34
bastion security lighting is turned on and
01:18:39
The camera rotates when installed
01:18:43
live images of micro similar
01:18:48
interaction of different scenarios
01:18:51
work, you can adjust the mass second
01:18:57
point we will demonstrate the work
01:18:59
penetration detector into a sterile
01:19:04
zone is exactly the same in the syphilis interface
01:19:07
we drew a polygon located on
01:19:12
the lawn behind me and so penetrates
01:19:16
restricted area for a while
01:19:24
the time window is also configurable
01:19:30
after a while the system will work
01:19:34
apply this alarm message
01:19:38
security lighting will begin and
01:19:40
the camera turns as usual to us
01:19:45
so I hope everyone saw everything well
01:19:49
above me there is a lamp system
01:19:54
security lighting zarya ptz camera
01:19:59
image see further seen and heard well
01:20:07
participants please maybe you would like
01:20:10
to
01:20:11
or is she what you are especially for
01:20:14
you were commented showed please
01:20:16
We have a live broadcast, maybe you should know
01:20:22
any scenarios involving analytics
01:20:26
also our products we can here
01:20:29
run demonstrate live
01:20:31
the training ground is open to the public again
01:20:35
reminding you that it is located near St. Petersburg
01:20:38
call us and show him
01:20:41
let's demonstrate here there is maxima maxima
01:20:44
bingo ptz camera question
01:20:47
50 only by saving them points
01:20:51
worked on saved points or leads
01:20:53
violator
01:20:56
I will answer this question, see
01:21:02
resulting in penetration such as a railing
01:21:04
from through the fence section we are from the sensors
01:21:08
dotted line with we receive the address event and
01:21:11
understand which one or group of cameras
01:21:14
must be displayed to the operator for
01:21:17
processing this incident again if
01:21:20
there is a camera in zone 50, she goes there
01:21:22
will turn further tracking
01:21:25
operator is done manually why
01:21:29
manually why not automatically with this
01:21:33
marketing
01:21:34
activities are related to what can be done
01:21:37
would correct a person to convey
01:21:39
from hand to hand stops working when in
01:21:42
more than two faces appear in the frame
01:21:44
scatter in different directions and
01:21:45
accordingly, as if one of the rider
01:21:48
violator one of them is an employee there
01:21:50
companies that are just nearby
01:21:51
passed someone's attention 30 here's a question
01:21:55
therefore the operator directly which
01:21:58
resolve this incident
01:21:59
he yes before takes the operative
01:22:03
appropriate action to
01:22:07
prevent the intruder from advancing into
01:22:10
the depth of the enterprise calls the GBR and so
01:22:14
further tracking directly
01:22:17
1 violator is now being implemented even
01:22:19
there on cameras for example brand xxi
01:22:22
made a radar that controls
01:22:25
presence and accordingly leads to peace
01:22:27
drink graceful in the wake of this
01:22:30
violator to us colleagues from axis at this time
01:22:32
the test site confirmed this provision
01:22:35
such a demonstration camera and
01:22:38
Accordingly, we will have it soon
01:22:39
you can see how it is
01:22:43
works like it works with two s
01:22:46
three and five violators therefore
01:22:49
manual mode in this case
01:22:52
would the analytics be relevant at the moment?
01:22:54
time cannot be forbidden to determine
01:22:56
violator passing nearby
01:23:00
company employee
01:23:02
well, that is, with a small amount
01:23:06
violate with one violators is
01:23:08
it is possible, in principle, theoretically possible
01:23:11
with more it is simply not advisable with
01:23:13
in terms of accuracy here on
01:23:17
then arises in Maxim Penkov
01:23:19
who asked the question next question
01:23:22
what kind of support
01:23:23
10 operators then he has only
01:23:26
only two or three seconds to make a decision
01:23:33
I understand that
01:23:40
collegium live broadcast from the training ground
01:23:43
then I'll turn off 3 sections now, see you
01:23:48
we will show the implementation of distributed systems
01:23:53
at the base of the bastion thank you for your attention
01:23:57
Pavel Sergeeva
01:24:00
Maxim, I’m answering your question about
01:24:02
Richie decides in 2 seconds
01:24:05
the camera rotated filmed someone's heels
01:24:07
search
01:24:09
if there is only one camera on the object
01:24:12
which looks 360 degrees at me
01:24:14
it seems we need to work on ensuring
01:24:16
trembita safety
01:24:18
the first story about categorized
01:24:20
enterprises can we talk about how
01:24:22
this enterprise is critical, is it possible
01:24:24
make the first second milestone just for
01:24:27
solving problems to prevent
01:24:29
promotion to the teacher in the corner
01:24:31
the enterprise uses, among other things,
01:24:34
virtual boundary that is when the camera
01:24:35
you can look at the left
01:24:38
fence, that is, inside the enterprise and
01:24:40
on the right there are cameras that are on
01:24:42
at least they are installed on the perimeter
01:24:44
can be displayed in the first milliseconds
01:24:47
when the violation occurred so far
01:24:50
50 camera rotates in winter weather
01:24:54
although it’s already visible from these two cameras
01:24:57
specific violator except when
01:25:01
the intruder is already on the fence, too, as if
01:25:03
How late is it for me to look?
01:25:07
what happens before
01:25:10
a fence if it is, for example, objects
01:25:13
high category
01:25:14
there is another story when along
01:25:17
the roads are like busy highways there
01:25:19
you can't see enough of these either
01:25:21
technologies are used for example
01:25:23
virtual border of snare bones on neuro
01:25:26
network plasticizer when
01:25:29
determined in the frame by man machines or
01:25:30
animal if there are animals along the fence
01:25:32
walking it's not an incident if you stop
01:25:35
the car is in front of the fence or stopped
01:25:37
a person that is when he passes by
01:25:39
there are no questions when a person
01:25:40
stops and starts
01:25:43
rude loitering triggers
01:25:46
analytics but haven’t climbed the fence yet
01:25:48
the process is simply emphasized to me
01:25:50
they are the operator that needs to be monitored
01:25:52
what happens in front of the perimeter
01:25:54
thus the violation is leveled out
01:26:01
here yes maxim this is straight Sergey answered
01:26:04
for questions and you are here you wrote in
01:26:06
the first question is what the operator accepts
01:26:07
the solution to the two to three second exercise is here
01:26:09
the operator does not make a decision on the merits
01:26:12
at the very beginning this is the most important thing when
01:26:14
there was a perimeter violation incident
01:26:17
traffic is prohibited there board entered
01:26:18
on and kitten camera automatic
01:26:20
naturally turns around no there
01:26:22
there are no two or three seconds, then there’s more
01:26:24
accompanied by a person
01:26:25
the guard makes a decision if it's
01:26:28
you need to castle you accept which one
01:26:30
make decisions and instructions if there
01:26:32
something happened grab the joystick
01:26:34
and further leading the offender is already spears
01:26:40
responsibility and further
01:26:42
go deeper
01:26:43
about protecting the enterprise if we are there with
01:26:45
large perimeter can be used
01:26:50
We have a radar control system
01:26:53
Dmitry Galkin is present in the group
01:26:56
micron group
01:26:58
they have wonderful radars we carried out
01:27:02
lady's solutions about integrated we
01:27:05
we receive events including from
01:27:07
radar
01:27:08
broadcast the operator interface to
01:27:11
local level where they work
01:27:13
operator directly
01:27:15
broadcast to another situational
01:27:18
level there is a monitoring center and so on
01:27:20
further, that is, you can use
01:27:22
additional technologies to control
01:27:25
near suitable
01:27:27
[music]
01:27:29
territory before work runs 1st line
01:27:33
I also have an interesting question
01:27:35
about three people you want
01:27:38
we reproduced this at the training ground, you can
01:27:39
It’s not a problem for three people to do it
01:27:44
we're not there for a groan 3 4 we don't have where
01:27:47
you can try it calmly
01:27:51
send everyone out for a walk once
01:27:55
third part we can take and
01:27:56
play or I'm going to hear this
01:28:00
I'm also interested in the demonstration or
01:28:05
and movement in prohibited controls I
01:28:07
I'll just give one example
01:28:08
customers
01:28:09
just uses this algorithm
01:28:12
I have a strictly regulated
01:28:16
work security service at an enterprise what
01:28:20
security guards change every two hours and
01:28:22
changing security posts, we have a fence like
01:28:25
there are always transparent ones and there is a mesh with scp
01:28:28
or something similar and they clearly have them
01:28:32
must go in the same direction
01:28:34
but one boundary perimeter from abroad
01:28:38
they can
01:28:39
from outside and from abroad from outside it can
01:28:43
put at gunpoint
01:28:45
thus there conditionally deciding
01:28:47
opportunity to take the radio and notify
01:28:50
security, well, about the fact that he was taken under
01:28:56
sight and turns somewhere he can
01:28:58
take it just turn around and go to another one
01:28:59
Analytics will work on this side
01:29:01
the lighting will turn on and either on or
01:29:04
intruder or shooter who
01:29:08
capture aggressive action wants
01:29:10
produce leblon will get scared and run away
01:29:12
that something has already happened and started
01:29:15
some kind of reaction or a guard at the checkpoint
01:29:19
who stands and waits for him to come
01:29:22
the shift will immediately see what is happening
01:29:25
there is such a case we implemented on
01:29:27
one of the objects
01:29:31
like this
01:29:34
the problem was applied please tell me
01:29:38
without Alexey Ivanov question about
01:29:42
trekking, that is, accompanied
01:29:44
intruder 500 camera want
01:29:47
comment why not?
01:29:50
automated method of support
01:29:52
it’s the partisans, well, answer again
01:29:57
I’ll repeat this question, what’s in the frame then?
01:30:01
located it's like a swan cancer pike yes
01:30:04
everyone ran in different directions
01:30:07
It’s not clear where the camera should turn
01:30:09
the first operator determines who
01:30:15
accompany a good question on this topic
01:30:20
there is a task therefore the case actually
01:30:23
really because we are such a company
01:30:25
as if applied we accordingly as
01:30:28
let's do some developments
01:30:30
individual here and here necessary
01:30:33
here you can see the link and the camera from the car
01:30:36
that is, the camera turned to the desired area
01:30:39
there are, for example, three goals, one of these goals
01:30:42
violator well that is I would I
01:30:45
approximately this task there so so alexey
01:30:47
one of these targets is violators
01:30:50
the operator determines who the intruder is
01:30:51
should click on it there is some
01:30:54
some software development so you can
01:30:56
select an object but I don’t know how to select
01:30:58
its rectangle click on it
01:30:59
how much more time will it take?
01:31:01
I would like to take a look and even the camera is already starting
01:31:04
or at the hardware level
01:31:06
transmit this information to the camera or
01:31:08
cameras on the steering wheel hardware or view
01:31:10
analytics begins to lead only this
01:31:13
man in a red jacket
01:31:16
in something else there, yes I’m even right
01:31:19
break that this system is still in
01:31:22
in principle will simplify the work of the operator
01:31:24
but then there will be a human factor
01:31:28
botany human factor when
01:31:32
a decision is made on whom exactly
01:31:34
poking is not the most important decision
01:31:35
the actual side opening takes
01:31:38
all colors and the clear system works
01:31:45
the question needs to be thought about
01:31:47
Is it even logical to use this?
01:31:49
apply and so on from one side to
01:31:51
on the other hand, you can find a bunch of why
01:31:55
no, I think Alexey lower you
01:32:00
interested write because you
01:32:07
see here a completely open approach
01:32:09
if you understand the best problem and if it
01:32:12
the best alternative then why not
01:32:14
I see, here are the cameras for how
01:32:17
areal
01:32:20
observation or observation of what
01:32:24
cut the perimeter with extended lengths
01:32:25
are actually used more like
01:32:27
additional tool about this already
01:32:29
said but you need to understand the task of the work
01:32:36
let's move and actually the questions
01:32:52
Guys, first of all, we have tasks I also
01:32:56
Once we checked the condition it turned out this
01:33:00
thing we didn’t depict quite accurately
01:33:03
the perimeter is therefore generally in the original
01:33:09
file of course the correct answer is 2 600
01:33:12
element of which there is 1 and answered
01:33:14
this answer is correct but the picture is not quite right
01:33:18
not entirely correct, excuse us
01:33:21
please about this experience won
01:33:24
it turns out the one who said that Alexey
01:33:30
first and they gave the formula by which
01:33:34
consider it showed an unknown thief
01:33:36
parameter
01:33:37
yes yes yes that's why we Andrey want to clarify
01:33:40
we will have a recording here guys data that
01:33:45
we could have taken it for ourselves, it’s better now
01:33:48
Well, in the chat we are the best to write down further
01:33:52
Naturally, according to the registration list you too
01:33:59
have to make a decision you announced a
01:34:02
Now let's mark everyone on the first question
01:34:10
we discussed, I see the guys are writing
01:34:14
answers here
01:34:15
Quran problems on the screen here
01:34:19
So let's see now
01:34:23
someone who answers us here is Anastasia
01:34:40
Igor Kuznetsov
01:34:41
she says so alone because factor
01:34:46
Good luck
01:34:49
Alexander Yezhov you guys how often
01:34:55
this situation happens when you get a
01:34:57
already lost the boxes of coldness up
01:35:15
the correct answers are there Nikolay
01:35:18
in general there are actually 1 1 layouts
01:35:20
enough Nikolay Ruslan she is a factor
01:35:24
good luck ruslan course
01:35:27
ok actually we mixed up the boxes
01:35:31
they are slightly different sizes so
01:35:32
creating another one will be good thanks
01:35:38
We hope to everyone who participated that then
01:35:41
a little warm-up happened, let's move on to
01:35:44
our final part for today
01:35:47
then we'll move on Sergey Pavel to you
01:35:51
the word yes well and I should be heard well
01:36:02
and actually move on to the final one
01:36:03
parts are already some kind of global
01:36:05
thing is implementation
01:36:06
we're talking about her on this nut part
01:36:09
Let's try not to stop for long
01:36:11
We just won’t tell you what it is, of course.
01:36:14
the task of local objects is long ago
01:36:16
there are things that concern only KSB it happens
01:36:20
regarding related engineering systems there
01:36:24
more systems with a more correct approach
01:36:27
but there are big tasks with big
01:36:29
verticals when it is necessary to create
01:36:33
centralized security systems
01:36:35
distributed objects and here there are
01:36:37
many different approaches to creating these
01:36:40
things or centrally own
01:36:44
yes I'll go back to this slide here it is
01:36:46
object new system which solves
01:36:49
the tasks of the skating rink specifically its object
01:36:51
locally on such objects there may be
01:36:53
a lot and bring it all into one center
01:36:57
You can also eat on the basis of our platforms
01:37:03
different approaches, as it were, and organizations
01:37:06
sectional center including but more often
01:37:08
just one way or another there are downloads that
01:37:11
sectional center sells only on
01:37:13
based on the closed circuit television system
01:37:15
further forgive me for the expression
01:37:19
it's amazing how much information there is
01:37:21
which needs to be processed
01:37:24
and we are his operator and they go to
01:37:28
an incident occurs in the management model
01:37:30
on the contrary, a patient is only created when
01:37:32
go lo odessa
01:37:34
go out and anxious and no
01:37:40
no visual confirmation
01:37:42
there is no verification in the center, that’s also
01:37:45
wrong I'm such a thing we imagine
01:37:47
such a combined solution and what in
01:37:50
to distributed objects on based
01:37:53
our systems
01:37:54
they are able to work autonomously
01:37:57
completely independent with its own servers
01:38:00
with their clients and essentially losses
01:38:03
connections are not afraid of losses for them
01:38:05
There is definitely no information about the loss of connection
01:38:07
what's more will happen
01:38:10
the scalability of our systems is
01:38:12
not limited as below yes as
01:38:15
directly in full
01:38:16
security and at the local facility
01:38:19
in terms of workstations, servers and
01:38:24
they are also not limited on the global
01:38:27
level there can be many seasonal centers
01:38:30
Operator roles are provided in different ways
01:38:32
We also have user rights
01:38:35
adjustable quite flexibly
01:38:37
routing of certain events
01:38:40
escalation of anxiety and much, much more
01:38:43
so here the task is of course
01:38:47
global
01:38:48
and the customer certainly when he builds there
01:38:51
local I integrate the system
01:38:54
security of the object if the future
01:38:56
it is assumed that this is all in
01:39:02
single center or vice versa yes
01:39:03
distribution of this information across
01:39:05
different others at different centers yes and or
01:39:12
for local objects, then of course he
01:39:14
you need to start with choosing a platform
01:39:16
here we go again, our opinion
01:39:19
universal platform no some
01:39:23
they're starting to work for us, that is,
01:39:25
here's an example but for now quick 2
01:39:26
Historically, this
01:39:28
the system went from there
01:39:30
and accordingly there
01:39:32
but quite dense work with the base
01:39:34
data interesting Tamara implementation I take
01:39:37
absences from working hours
01:39:39
there are many, many tricky passage algorithms
01:39:41
what, but we work with video
01:39:46
we directly understand the video from
01:39:49
produced well, there are no such flexible
01:39:52
What kind of tools does anyone have there?
01:39:54
the platform has secures which initially
01:39:57
started working with exactly that
01:39:59
CCTV there further there
01:40:01
analytics yes and that and vice versa yes
01:40:06
that is, this universal one is ours
01:40:09
the solution allows us to implement our
01:40:12
objects
01:40:14
any absolutely distributed
01:40:16
centralized actually possible
01:40:19
give an example
01:40:20
sales 17 business center not shown
01:40:25
and there are also 17 business centers in
01:40:27
St. Petersburg and Lakhta itself
01:40:30
center
01:40:31
it is implemented on the basis of scud for now
01:40:34
bastion and in each every object
01:40:38
has to work autonomously from each
01:40:40
object you can give the map to the user
01:40:44
on any other objects can be global
01:40:47
I don’t know the access level to make all-terrain vehicles
01:40:49
dependencies how to help and you can do it
01:40:51
do any workplace from any building from
01:40:54
anyone from any city without any
01:40:57
any problems, well, the scale of the systems
01:41:01
small but that's not the limit there
01:41:04
for our systems 4 st more than 4000
01:41:07
controllers, that is, there are problems here
01:41:09
no no Sergey will also comment
01:41:13
about the company with is also quite large
01:41:17
number of completed projects with
01:41:19
distributed systems and so on
01:41:21
one of the brightest ones we just decided not to
01:41:25
you know someone will be interested
01:41:26
an additional case can be added there
01:41:30
we will tell you additional cases here
01:41:33
for example, the Lukoil case where it is present
01:41:36
a large number of gas stations
01:41:38
there are a large number of oil depots there
01:41:40
oil refinery each
01:41:42
the object is the local KB on which
01:41:45
problems of integration with
01:41:48
security systems for record keeping
01:41:53
departing transport
01:41:56
means of weight accounting of petroleum products and
01:42:01
so on timely arrival at
01:42:04
fuel truck refueling area, etc.
01:42:07
everything else is integrated with Yurka
01:42:09
the system works as a single mechanism
01:42:12
unfortunately we don't have a video from there
01:42:15
we can show you because it's closed
01:42:17
object here, but everyone stopped at a gas station
01:42:21
see lukoil or as easily as possible
01:42:25
get blacklisted if you don't pay
01:42:27
refueling since recognition is carried out
01:42:31
vehicle numbers which
01:42:33
someone drove up or but and the speakers from that or
01:42:36
the other side and, accordingly, if not
01:42:38
will pay, you can also pay by mobile
01:42:41
application
01:42:42
the number gets added to the blacklist the next time
01:42:45
upon arrival at Lukoil the operator will receive
01:42:49
notification of what is needed
01:42:56
take snow and bills
01:42:57
he should need to connect Alex
01:43:03
which means working with accounts receivable
01:43:10
paul target me as you want now
01:43:15
build that is a little more
01:43:18
tell your hands eat them then you these
01:43:20
demonstrations or as simple as you
01:43:24
mentioned situation centers
01:43:26
we met on purpose several times
01:43:29
with the largest Russian customers
01:43:31
to discuss the problems of sacred tasks
01:43:36
centers I have a couple of questions when
01:43:38
You better ask them right now
01:43:42
live mode and give it away ok
01:43:47
Here is a question that arose for example
01:43:50
money with colleagues from nickel
01:43:53
which, as you know, implements the system
01:43:57
distributed situation centers
01:44:00
various territories of presence in
01:44:03
enterprises there to expect is formulated
01:44:06
as the first thing to consider as an incident as
01:44:12
differentiate information from noise
01:44:15
escalate upward, that is, the system
01:44:17
higher level
01:44:19
so what to submit for control
01:44:22
or allow at some level there
01:44:26
let's assume and which this situation was
01:44:28
discovered means
01:44:30
let's say it came their example went to
01:44:34
Eight people left the site
01:44:37
si and is this an incident or ni-cd came here
01:44:42
there were three people, that's probably more
01:44:46
significant once, and secondly, through whom
01:44:54
to the next level that is
01:44:55
recognizing the correct signatures that
01:44:57
this is really meaningful
01:44:59
event they are crazy and definition as
01:45:04
notify
01:45:05
to escalate or not is probably the question
01:45:10
probably not
01:45:12
can independently answer this
01:45:16
Question for CCTV systems
01:45:18
video analytics of control systems
01:45:20
access control and I do not have ICS systems
01:45:24
answer the question what is
01:45:28
incident at this point in time is not
01:45:30
exit of 7 people from the territory
01:45:35
enterprises we don't know one student is
01:45:37
or don't sit down, they'll decide what it is
01:45:39
incident and again who are these people if
01:45:42
for example there are five people who entered
01:45:44
to a certain area where no one
01:45:46
should be located or for example in this
01:45:48
zone started what kind of fire that
01:45:50
can be modified
01:45:52
as a result of system integration
01:45:56
fire extinguishing yes it has smoke detectors
01:45:59
worked and there is for example 55
01:46:02
a person in this zone is an incident
01:46:04
this incident is correct and here
01:46:06
the question is how to react to it and
01:46:08
Of course I'm interested in tools that
01:46:10
systems supporting these
01:46:12
sanctions centers provide for
01:46:16
we understand the tasks of Norilsk Nickel in general
01:46:28
why because we are also with them
01:46:30
interact with colleagues we understand
01:46:32
what's on the local object first
01:46:34
the queue needs to be defined with types
01:46:35
incidents I'll have to what's in
01:46:37
principle incident in order to understand
01:46:39
what to do with him next what incident
01:46:41
should remain local
01:46:42
for example 5 contractors out of the required 10
01:46:48
which must go out every day
01:46:52
incident or non-incident we don't know about
01:46:54
this, but again make a system that
01:46:56
will control the number of incoming
01:46:58
on the territory of contractors' enterprises
01:47:01
we issue a daily countdown
01:47:03
Naturally we can intent the information
01:47:06
unload vrp system burpee system
01:47:09
exit records will be kept
01:47:12
so then you microphone turned on and
01:47:16
please enable yes in the army system
01:47:19
will be conducted
01:47:24
output will be recorded accordingly
01:47:28
employees of this department
01:47:32
who are there to perform some kind of work on
01:47:34
they also have zones such as enterprises
01:47:40
where everyone assumes where according to the instructions
01:47:46
cannot work or be alone
01:47:48
maximum two people here is control in the zone
01:47:53
the corresponding number of people is
01:47:55
using the same video on the face
01:47:56
one of these people is being decided to exit
01:47:58
should affect the interaction of systems
01:48:01
so as to be the first to report
01:48:04
to a local post about what a person is there
01:48:06
no, it would automatically turn off for example
01:48:10
switch that stops work
01:48:12
of this machine, for example, in order to
01:48:17
the person did not receive the corresponding
01:48:18
injury incident incident further spill
01:48:22
oil up to, for example, some kind
01:48:25
compliance with this integration with systems
01:48:28
automated control system with appropriate sensors if
01:48:32
the sensor is triggered
01:48:33
there is appropriate integration with
01:48:35
operator video surveillance system
01:48:39
the judicial system allows
01:48:41
Well, or rather, reduce the reaction time
01:48:43
he saw that something was happening
01:48:46
emergency situation he visually
01:48:48
confirms this incident
01:48:49
accordingly such incidents
01:48:51
intruder model threat model
01:48:56
in emergency situations it is necessary
01:48:58
it needs to be worked out
01:49:00
and what will be the matrix?
01:49:02
what will be a local incident
01:49:04
which should have risen a long time ago
01:49:05
regional level it is difficult to fly to
01:49:07
Moscow level
01:49:08
this is a matter of elaboration in the global
01:49:10
large technical task with the concept
01:49:12
with the understanding that on each of
01:49:15
levels must be decided by tools
01:49:18
answers questions from the tool
01:49:20
of course there is a category there
01:49:23
list conditionally category not events that
01:49:25
you can manually set the systems and they
01:49:28
will end up with one or the other
01:49:29
operator to the required level
01:49:32
it is clear that the scale of the natural disaster
01:49:34
or the scale of a local enterprise
01:49:37
here it is important to send events again
01:49:42
there is an escalation of anxiety in cases
01:49:45
if the guard simply did not react to
01:49:47
locally it automatically
01:49:49
rises to a higher level
01:49:51
so that there are no events left
01:49:53
unnoticed in any case so that at least
01:49:54
someone reacted this is such a mode
01:49:56
Reservation guards have a wave
01:49:59
Messages
01:50:00
that is, one guard needs to see
01:50:03
one thing the other needs to see the other she needs
01:50:05
price doesn't need to see everything
01:50:06
but so as not to go crazy on the patient
01:50:08
who sits in Moscow as a security guard
01:50:10
he only needs to see global ones
01:50:12
events that can directly lead there
01:50:15
to natural disasters
01:50:16
features of the enterprise all 1
01:50:18
yes yes there are transport there
01:50:21
enterprises and threat model tasks are
01:50:26
I understand one more question but that's all for now
01:50:28
more and more units
01:50:31
department of demons and work with
01:50:33
internal functional customers
01:50:35
often these internal functional
01:50:38
customers are not not related to the field
01:50:40
security before this is very different
01:50:43
division we have so much emphasis
01:50:46
exactly without fear now but in general
01:50:49
if we talk about the interface to the system
01:50:51
architecture
01:50:52
there are implementations of such
01:50:56
sectional centers or control systems
01:50:58
when by consumers by users
01:51:00
are not only units with
01:51:02
wall and other functional services
01:51:06
we see such an example right on the screen
01:51:10
Yes, this is not a question about safety
01:51:12
this is already a question about business processes
01:51:16
total accounting is the first story second
01:51:19
story about logistics tasks what
01:51:23
we talked about routing to
01:51:25
the territory of the enterprise is again not
01:51:27
maybe technological safety
01:51:30
maybe a logistical problem because
01:51:32
Is weight control the same?
01:51:34
accounting is integration with personnel systems
01:51:40
time and attendance accounting
01:51:43
control control of the arrival of exactly that
01:51:45
the person who should come to
01:51:47
work did not attach a card for another
01:51:49
turned Wernicke and passed enough
01:52:00
well at least we’re talking about this
01:52:03
this one they said that there is a system about
01:52:07
they need to show safety downstairs
01:52:12
need to show screen before update update
01:52:16
across the screen
01:52:22
we complete the twist, for example the same one
01:52:25
slide that displays interaction
01:52:28
from the system here below we see
01:52:31
classic security system
01:52:34
at the top we see the different systems
01:52:37
which may be here at the enterprise
01:52:39
at the enterprise so on about that
01:52:41
what did I say yes integration with automated control system
01:52:44
technological processes yes that's what
01:52:46
is not already related to the system
01:52:50
security yes there is control
01:52:53
operability of equipment that
01:52:55
us interacts with the son of the inventory
01:52:57
protocol collecting this data
01:52:59
tie
01:53:00
video, for example, can be done more quickly
01:53:04
inform the relevant operators
01:53:06
serve 1c organizers
01:53:08
who works there works for us
01:53:11
accounting work logistics
01:53:13
services and they also have appropriate
01:53:16
the functionality they have
01:53:18
can use we have
01:53:20
such a specialized presentation
01:53:22
who would be interested, we are ready for it too
01:53:24
send
01:53:25
she's not talking about these pictures
01:53:27
interaction system clearly
01:53:29
describes what functionality to implement
01:53:31
this system of two systems of complex
01:53:36
solutions in this from implementation
01:53:37
complex solution of what gets first
01:53:39
face
01:53:40
enterprises what the service receives
01:53:43
there is no security that the service receives there
01:53:45
because, for example, coffee is one of the most interesting
01:53:48
clips
01:53:49
we are undergoing training yes
01:53:52
Now they keep magazines in an important form
01:53:54
someone was instructed and signed
01:53:58
boards or date time while as if
01:54:01
a signature can be forged in fact up to
01:54:03
and when, for example, personification in
01:54:06
electronically passes listened to
01:54:07
instructions and then you apply
01:54:09
card and face
01:54:11
slang card face and as a result
01:54:14
an entry is created in the electronic journal
01:54:17
game speak digital signature and qatar
01:54:20
card + person's face went up to him
01:54:23
present or for example
01:54:24
medical examination before departure
01:54:29
to the route of a specific driver
01:54:32
vehicle
01:54:33
integration with the same and checks in which
01:54:36
can feed the keys to this
01:54:39
vehicle until passed since
01:54:45
world
01:54:46
imitation what is it called but how
01:54:51
the presentation is called so that we which
01:54:56
include in general briefly about the main thing
01:54:58
I ask dear participants here
01:55:03
here is a presentation with a lot of
01:55:08
new space cases application for
01:55:11
various tasks of various functional
01:55:13
services buns if you want to receive
01:55:18
It’s good that we’ve switched off a year before
01:55:23
see the auger and how much it reacts
01:55:28
interesting by the way, sorry about the women there
01:55:40
Pavel Strunin says yes, it’s especially important
01:55:43
know which indicator has improved
01:55:45
benefits look at benefits and we are here
01:55:49
in short
01:55:51
some were inserted diagonally
01:55:54
implementation effects so to speak
01:55:56
economic or just where the person is alive
01:55:57
remained this is also some kind of effect yes
01:55:59
someone did not sit down as a result of some
01:56:02
effect on the example of an enterprise where
01:56:07
an automation system was introduced
01:56:09
such as hand washing
01:56:12
development by our specialists
01:56:14
was produced by this food enterprise
01:56:16
allowed to reduce
01:56:18
insurance premium paid
01:56:21
enterprise when insuring its
01:56:23
enterprises from emergency situations
01:56:27
allowed us to buy the system one and a half times
01:56:31
there is another story about when it's big
01:56:34
the company is insured, well, I’ll say mine
01:56:37
facility prior to introducing various technologies
01:56:40
work with auditors if proven
01:56:42
efficiency and we can sort of
01:56:44
get involved in this work prove
01:56:45
efficiency implemented technology
01:56:47
you can revise the insurance ratio
01:56:52
insurance premium that will affect
01:56:55
the decreasing side is absolutely absolutely
01:56:57
not the same amounts we are currently operating with
01:57:00
Yes, how much does video surveillance cost there?
01:57:03
network camera there is important essentially things
01:57:08
because of course decision making
01:57:11
on the side of a large customer this is before
01:57:15
Total
01:57:16
financial justification and any examples
01:57:19
they will be on this topic, I think we’ll paint here
01:57:24
we are very grateful for them and this is of course
01:57:26
extremely extremely helpful board here
01:57:31
shared so as not to be unfounded
01:57:34
security file is called
01:57:36
briefly about the main thing
01:57:38
here are the company's main solutions from the case study
01:57:41
what is that multitool doing there?
01:57:44
what is comp formula complex
01:57:46
security systems what is included what
01:57:49
such a wide range of soybeans, etc. And
01:57:51
etc.
01:57:52
this is a bunch of rowan berries so to speak
01:57:57
is KSB and who is her
01:57:59
users what functionality is in
01:58:02
the result is that someone here
01:58:04
keeper police security service IT service
01:58:07
accounting service
01:58:09
management logistics departments
01:58:12
supply will be technological
01:58:14
security medical service court
01:58:16
object spices segments spokes cops
01:58:18
dedicated segments where there are competent
01:58:21
organs work and they have more
01:58:24
top level
01:58:25
ban everything everyone needs everything
01:58:28
moment I don’t know some kind of current
01:58:30
enterprises and Vladimir Vladimirovich
01:58:32
comes to this service event
01:58:34
three letters to us
01:58:36
start fighting for someone's resources
01:58:39
hangs black
01:58:41
packages on cameras, someone walks around and takes them off
01:58:45
someone then came in, came out, and so on
01:58:47
so these are all presentations
01:58:51
the rest in the voice of just cases is real
01:58:53
a lot and sometimes you don’t know
01:58:56
tell that is, if the problems are on
01:58:59
throw straight primroses
01:59:01
we may already have a number of cases
01:59:05
We have already solved this problem
01:59:07
and even if this decision is clear with us
01:59:11
the team is huge
01:59:12
at the stage they quickly decided to
01:59:15
by existing means 2 oh well
01:59:19
he cup we agreed on properly
01:59:22
spin and Sergei that here is the presentation
01:59:25
which flashed on your screens we
01:59:26
We will also join the paint mailing list
01:59:32
in the process of this discussion there arose
01:59:35
a couple of questions
01:59:36
fell for it and acted against let's or
01:59:41
attention and let's move on, do you have a question or
01:59:45
everything Ivanova is as flexible as possible
01:59:47
customize the matrix and price on the object
01:59:50
allow the interface to be customized
01:59:52
incident matrix by administrator and
01:59:55
what are the requirements in such a case?
01:59:57
administrator qualification by the way
02:00:00
this is an important moment
02:00:03
Alexey Ivanov because what gives such
02:00:07
class system it makes it possible
02:00:10
learn first the customer where he
02:00:13
Do you understand situations better?
02:00:15
you can improve the solution
02:00:17
regulations and re-clarify the actual and
02:00:22
protocol and regulations matrix and so on
02:00:25
further here therefore it is very important how
02:00:28
what the system supplier provided
02:00:32
support this process because
02:00:35
PhD
02:00:37
please distinguish Alexander friend there
02:00:41
simple configuration tools there
02:00:44
conditionally, there is routing
02:00:51
user user of the system
02:00:54
user safety
02:00:55
has certain rights
02:00:58
you can set it conditionally this way
02:01:03
at the program level, first of all
02:01:04
cut off the opportunity to either control or
02:01:08
do something up to I don't know
02:01:11
he can't open the turnstile
02:01:13
close the same goes for events
02:01:15
there is an alarm level for each event
02:01:19
every incident has a level you can
02:01:21
set it flexibly you say events
02:01:23
such and such they are there 12 these are a little on
02:01:29
we actually shoot sparrows from a cannon
02:01:31
or maybe here is the [ __ ] who asked this
02:01:33
question turn on the microphone so we're in
02:01:36
dialogue mode, the production was filmed first
02:01:38
tasks because the incident model
02:01:43
incident matrix is ​​a story for what
02:01:47
operator roles because we are now
02:01:50
there will be more to do we are just an example no
02:01:53
maybe there’s just a specific task there
02:01:57
ready to turn on the microphone and
02:02:00
give me a little explanation of the problem
02:02:05
to clarify the essence of the issue, we are simply ready
02:02:11
Alexei
02:02:13
really shorter probably simpler and
02:02:17
question general person writes question general
02:02:20
then artificially create and
02:02:30
send them to a specific operator
02:02:31
operator has authority there is another
02:02:36
approach is also an approach to dialogue
02:02:42
dialogue stories when the system
02:02:44
starts communicating with the operator here I am
02:02:47
I want to say right away that such things are like
02:02:50
they only aggravate human
02:02:53
factor as reaction time shows
02:02:56
increase as practice shows for
02:02:59
human yes you give you
02:03:01
essentially limiting the operator
02:03:03
yes no answers to questions yes no but this
02:03:07
increases reaction time
02:03:08
bring back the filling time of this incident
02:03:13
there is a person who climbed onto the perimeter
02:03:15
conditionally there is a violator he climbed on
02:03:17
the perimeter is essentially what the operator needs
02:03:20
the operator needs a point on the map where he is
02:03:22
useful and need verification of this event
02:03:25
everyone has nowhere to run
02:03:36
that is, he even has the maximum
02:03:39
the shortest possible instructions
02:03:41
over with the operator working in two modes
02:03:43
or when a special service soldier comes and that’s it
02:03:46
well that's 90 percent of the time
02:03:48
object or when something happened
02:03:51
incidents he panics if he has
02:03:53
there are no strict instructions on what to do
02:03:56
at the same time at the same time at the same time we guys
02:04:00
lost consider that he falls into
02:04:04
panic and we will never solve the incident
02:04:06
that's why when setting up interaction
02:04:11
systems between themselves as much as possible
02:04:12
minimizing the human factor
02:04:14
Initially, of course, this is the task of the customer
02:04:17
who sets us this task, well, it’s clear
02:04:20
system capabilities are very flexible
02:04:22
is done in our systems and any
02:04:23
anyone can control the hardware there
02:04:25
piece of iron in any scenario according to the formulas
02:04:27
there as you wish with ten pieces of iron here
02:04:31
most we minimize than but in the end
02:04:34
the incident is not even at the end at the beginning
02:04:37
incident, the operator must receive
02:04:39
what level of anxiety should it come?
02:04:42
only available if the object is large
02:04:44
yes it can be divided into flexible pieces
02:04:46
object to be given by a different operator and
02:04:48
verification of this event and everything in essence
02:04:52
everyone ran further and there are instructions
02:04:54
when you need to catch it what we added
02:04:57
moved away from formulating the incident matrix
02:05:00
went very well by the way yes but I'm done
02:05:03
I’ll answer the question anyway
02:05:05
additional questions when drawing
02:05:09
the incident matrix is ​​not drawn correctly with
02:05:12
ceiling then what we will decide
02:05:13
it is drawn based on regulations
02:05:16
which should be used
02:05:19
as a result of some such incident
02:05:21
as quite a lot of practice has shown
02:05:25
working with various clients such
02:05:29
There are no regulations describing everything
02:05:32
people most often act intuitively
02:05:35
first and basic rule
02:05:39
for example, as part of security
02:05:40
security saw the intruder
02:05:43
prevent it from penetrating the sky
02:05:45
the enterprise does not matter in what way you
02:05:48
doctor why sooner is better if you are under
02:05:51
use the dog's hand to release the dogs if there are any
02:05:52
traction bernovo seki they went there like
02:05:56
shows the practice of transmitting to
02:05:58
mobile device these stories are there
02:06:01
where is the intruder located?
02:06:04
I tried to run away at night with my soul's phone and
02:06:07
heartbreakers navigate by
02:06:09
the map is at least inconvenient
02:06:12
besides we have
02:06:15
customers are not everywhere
02:06:18
adapted for rapid movement
02:06:21
runner, you might stumble somewhere and
02:06:24
There will already be a work-related injury
02:06:26
so there is no need to fantasize about
02:06:29
mother-of-pearl fantasies need to be grounded
02:06:32
for good luck and setting the task as if for
02:06:35
push off the ground, why?
02:06:37
and what do we do and what do we do in
02:06:39
the result of such an incident and what
02:06:41
the action must be performed by the operator that
02:06:46
in general is an incident
02:06:48
determine the purpose of this word in
02:06:51
within the framework of some cases and after that
02:06:54
already, as it were, catching up with something from the dialogue in
02:06:56
first of all you need to
02:06:57
push off then understand what
02:06:59
technologies must be applied and then
02:07:01
these technologies must first
02:07:02
the raid is filled to ensure that everything
02:07:04
control receive and then some
02:07:06
additional data and provide
02:07:10
interaction of systems and is already at the stage
02:07:11
interaction of systems, the matrix is ​​taken
02:07:13
these incidents are what starts
02:07:15
so yes yes Sergey thanks one more
02:07:19
question of connection with what you said
02:07:21
and pay attention lion boars don't know
02:07:24
for what purpose is it asking you to turn it on?
02:07:32
mentioned a very interesting situation
02:07:35
really detailed regulations
02:07:39
are some of them missing or is there this
02:07:41
the incident matrix is ​​incomplete and has begun
02:07:46
apply a system of this class
02:07:48
your joint box system starts
02:07:53
better understand how it works
02:07:56
object where it has risk zones where it has
02:08:00
more concentration of some events
02:08:02
requiring attention and it has to
02:08:05
and I am not making a retrospective assessment of the situation
02:08:09
to for the purpose of making management
02:08:12
solutions
02:08:13
for example there are a lot of abandoned objects
02:08:16
restrict access fur coats does not leave there
02:08:19
well, for example, or something else, and here it’s very
02:08:22
it is important what such a system offers
02:08:25
him for the actual study of his object
02:08:28
yes and using the results of this
02:08:30
training that is to accept and drill
02:08:33
to ensure the adoption of management
02:08:35
solutions there are different answers, does anyone have one?
02:08:38
there's beshbarmak, that's sockets, there's more and more of them
02:08:41
more used when throwing wildly
02:08:43
attract google analyst where
02:08:46
prediction based on this here
02:08:49
your approach is interesting
02:08:52
look we will answer this way
02:08:59
we prefer to work with tasks
02:09:01
which on earth I still have the right time
02:09:06
I was asked there was a situation when people
02:09:09
analyze what often happens to them
02:09:12
at the facility and what needs to be changed is that example
02:09:14
just what you indicated before
02:09:17
retrospective analysis and what's in the future and
02:09:19
so on accordingly as expected
02:09:24
system that edits events
02:09:26
We have corresponding reports by type
02:09:29
in directions so on because
02:09:31
the system it seems to be
02:09:33
infrastructure as we showed there
02:09:36
plus minus here it is on the slide
02:09:41
here you can collect quite statistics
02:09:44
the big question is what about this
02:09:46
statistics will be made in the future
02:09:49
size winter the system itself is not in
02:09:52
able to advise
02:09:53
ours at the current time I don’t know
02:09:56
in general, such a system that is now in
02:09:57
market there is not met in the husband there force
02:10:01
due to limited time there
02:10:04
further but not the point, I have not met the system
02:10:05
who says here you go
02:10:07
I'll send a camera to place here atlas
02:10:10
stick the comb and here is the atom
02:10:12
in any case, based on some
02:10:14
system performance results by quantity
02:10:17
events of one kind or another in any case
02:10:20
some kind of audit should work, but here it is
02:10:24
how often are we audited and
02:10:27
basically there come on come on faster
02:10:29
Yesterday we had to close everything because
02:10:30
that we don't always live in yesterday mode
02:10:33
never received a request for
02:10:35
commercial offer for settlement
02:10:37
preparation of a technical solution where
02:10:38
they say you have two weeks this
02:10:42
history is urgently burning urgently yesterday and now
02:10:46
everyone needs it at the same time
02:10:48
end of the year because the budget is going away
02:10:53
Has anyone written a prescription for what I need?
02:10:56
we solve the operational problem
02:10:57
disconnect from the immediate solution
02:10:59
tasks that are currently
02:11:02
earthly
02:11:03
here's about the technologies that will allow
02:11:07
there in the long term 5 7 years to provide there
02:11:10
this is modernism, we will open the system
02:11:14
this is not the case at the moment
02:11:16
we provide but we have the tools
02:11:19
which will allow you to analyze this
02:11:21
situation, well, first of all, we ourselves will certainly
02:11:25
will be in trends there with our systems
02:11:27
we develop in accordance with trends
02:11:29
certainly, but if you have such a system
02:11:32
someone will appear and offer you
02:11:34
cottage and open upstairs
02:11:36
integration this top part
02:11:37
slides we will load it to him system
02:11:45
some there I don’t know some there but
02:11:47
world gas monitor point system
02:11:51
please interface and everything is covered
02:11:57
standardized interface is convenient
02:12:00
they are constantly saved constantly
02:12:02
supported by our systems we give away
02:12:05
there are examples we have an example
02:12:07
integration with such systems there
02:12:11
I will not be one of the objects in Moscow
02:12:13
to name a few, there are a lot of twenty s
02:12:18
superfluous objects in fact in Moscow
02:12:20
and the customer upstairs for the big one
02:12:21
leadership for
02:12:22
dell there 3d modeling is beautiful
02:12:24
show this object show all
02:12:26
events on it, well, that’s how I wanted it
02:12:29
customer please give it
02:12:30
up all the information themselves
02:12:32
drew what they could in their systems
02:12:35
showed it is not a system
02:12:37
security they are used in the mode
02:12:39
presentations when they talk about your
02:12:42
objects in large meetings
02:12:44
conferences and so on and so on then
02:12:46
it's convenient, the camera is the same
02:12:49
notice when any construction is going on
02:12:51
Large and Kansky object often cameras
02:12:55
who are watching in timelapse mode
02:13:01
transmit the image
02:13:02
they are also used in platforms for
02:13:06
end of participation in conferences please
02:13:09
it could also be cameras that
02:13:11
we deal with security, that is, we
02:13:13
we don’t give everything there ourselves yet
02:13:17
we claim because the customer does not have
02:13:19
such a system or the customer cannot
02:13:21
clearly formulate your task or
02:13:25
the cost of developing such a system is not
02:13:29
Absolutely clear answer indeed
02:13:33
problems are encountered more and more often but at the top
02:13:37
level came to cash borscht dorn and
02:13:40
other but you have good open
02:13:44
strategy for interaction in general
02:13:46
this is my answer
02:13:47
By the way, there are a lot of companies now
02:13:49
who have this clear
02:13:51
and PR strategy that allows the customer
02:13:55
understand that not everyone performs, but
02:13:58
will be able to integrate with
02:14:01
participating
02:14:02
from the new world by means of work not
02:14:07
joining a sect and it is important we can
02:14:11
move on next turn
02:14:17
turning on the guys got bored in St. Petersburg and we
02:14:20
let's show, try to simulate
02:14:24
some kind of distributed system as far as
02:14:26
is it possible
02:14:27
don’t describe direct inclusions, they
02:14:31
such local things show
02:14:33
but again, the training ground is welcome
02:14:36
Ilya I give the floor to you, I can’t hear Ilya
02:14:47
yes guys are in touch and you are again
02:14:53
moved on enough give
02:15:01
warmed up How did we move the server room from here?
02:15:05
I'll show you my work
02:15:07
three modules bastion two catia belts
02:15:12
bastion 2 patient bastion 2 and to with for
02:15:17
building an integrated system
02:15:19
security of the association territorially
02:15:22
distributed objects as part of and for now
02:15:24
realized there are several mods
02:15:29
since the system is modular it is possible
02:15:31
use both one module and them in
02:15:35
coupe a few first first
02:15:43
Let's demonstrate the operation of the Bastion 2 module
02:15:47
replication will help me with this
02:15:49
colleague of Samara Vodka
02:15:52
Vladimir Orlov I'll launch it now
02:15:57
Let's continue screen sharing
02:16:11
taxi obviously I hope now we are yours
02:16:19
the screen on which we see you is
02:16:23
okay so I'll show you the window now
02:16:31
bastion so here is the first module
02:16:37
replication makes it possible
02:16:40
synchronization of pass databases between
02:16:42
branches of the organization, that is, types
02:16:45
pass in one city or branch
02:16:47
organization it automatically gets
02:16:49
other branches
02:16:51
so what about this
02:16:56
for the module to work, let's start replication
02:17:04
which is located in drive c
02:17:11
folder program files x86 there is rum bastion
02:17:18
22 c ripley krishna to start with first me
02:17:30
I'll show you what's in my office
02:17:32
passes
02:17:34
there is no organization now
02:17:40
Vladimir will start the organization
02:17:44
called chamomile division engineer
02:17:48
Oleg will issue a pass to Sidorov
02:17:51
Ivan Ivanovich
02:17:55
you'll have to wait a little
02:18:02
rubric modules get inbox
02:18:06
changes
02:18:12
will take some time
02:18:14
[music]
02:18:18
things change
02:18:25
Vladimir
02:18:33
So
02:18:40
when replication is configured these are these
02:18:44
changes that come from branches to
02:18:46
the center in this case is the center on the polygon
02:18:48
branch in Samara according to schedule
02:18:52
apply immediately to wait we now
02:18:55
manually apply incoming changes
02:18:59
I’ll briefly explain the topology a little, this is 2
02:19:04
absolutely independent from each other
02:19:06
systems generally work on their own
02:19:08
they have their own servers from the working one
02:19:15
the stations are working at all
02:19:16
Absolutely no don't know this module
02:19:21
application it allows you to combine but
02:19:24
feelings between each other there are their own databases
02:19:29
everyone has their own base like this per module
02:19:33
implemented in 17 business centers
02:19:36
St. Petersburg and issuance regulations
02:19:40
passes it is consistent with a single
02:19:42
services there
02:19:44
[music]
02:19:45
unified customer service and always
02:19:48
only they agreed on it
02:19:51
accordingly but you give a pass there
02:19:56
people on the ground could apply
02:19:59
any of these objects, however, actually
02:20:04
yes the organization daisy appeared
02:20:07
division of engineer and issued
02:20:11
Petr Petrovich Sidorov appeared in the passes
02:20:16
so hot card it has already been issued and there
02:20:26
Petr Petrovich can already with his
02:20:29
use the card to easily enter the facility
02:20:32
St. Petersburg
02:20:33
but they knocked it out for him in Samara, that’s not
02:20:36
It's actually rare when a customer
02:20:38
offers such solutions
02:20:43
one of their banks is internal
02:20:45
regulations is one of his banks
02:20:47
there are many branches around the country 350
02:20:50
branches but they don’t issue permits everywhere
02:20:52
only in Moscow and then special mail and
02:20:55
they send it all to some department
02:20:57
regional ones are unclear
02:20:58
but the departments work autonomously and this
02:21:01
important because the connection is unstable
02:21:05
connection disappears all low locally
02:21:09
works in the field
02:21:21
Next we will demonstrate the operation of the module
02:21:24
bastions goals I apologize
02:21:29
we all say at the same time and now
02:21:40
Let's look at the second module Bastion 2
02:21:42
central monitoring console
02:21:45
collects information in a single
02:21:47
center in the sense of their facilities equipped
02:21:50
local security systems on
02:21:52
base and for now the bastion, that is, on
02:21:55
the central object can be monitored
02:21:56
events of other games and build reports
02:22:01
manage local systems
02:22:03
in our example, my strength is 2 which
02:22:10
located at the training ground will perform
02:22:11
the role of the center for Samara
02:22:15
the Samara system will play a role
02:22:20
branch
02:22:23
now in Samara he will attach it to the reader
02:22:28
The access stark appeared in the event log
02:22:34
events Samara branch
02:22:36
door one unknown card upon exit
02:22:38
from the owners
02:22:41
this is how the patient works
02:22:44
events to built-in events that
02:22:48
configured to observe will you tell me
02:22:52
to fly here to the patient and this too
02:22:59
can be shown now we will clean and
02:23:05
third module bastet 2x
02:23:08
or integration of personnel systems it
02:23:10
designed for organization
02:23:12
information interaction between systems
02:23:14
enterprise management, what's it about?
02:23:17
Sergei and Pavel were talking about it just now
02:23:21
automated ordering systems
02:23:23
omissions HR accounting systems
02:23:25
systems and so on now we will show
02:23:33
how to manage passes
02:23:36
from from Samara here is my colleague now
02:23:40
will perform a regular login and will now exit and
02:23:47
made a regular server login further
02:23:53
Vladimir you will demonstrate your
02:23:56
screen how do you do it
02:24:03
yes, here is a third-party one using web api
02:24:07
Now the riot police are sent to block
02:24:10
now a microfarad can pass through the pass
02:24:13
don't try it so hard anymore
02:24:16
it means Samara
02:24:17
mantra victor you try it once
02:24:25
Please
02:24:27
remotely Vladimir blocked the abyss
02:24:30
city ​​Victor
02:24:32
this is how it works now I have a pass
02:24:37
reverse unlock and wake up back
02:24:42
again so please go back
02:24:51
errol pass did it all remotely
02:24:55
there is Samara
02:24:56
I remind you that we are in the city
02:24:59
St. Petersburg so well, like the video from
02:25:06
using various modules for now Bastion
02:25:08
can be done
02:25:11
a whole host of different tasks you can
02:25:15
any task you are interested in
02:25:18
write to the chat and we’ll try to solve them
02:25:22
thank you, I pass the word back to Moscow
02:25:29
thank you guys Ilya thank you very much
02:25:37
great fun now all knees
02:25:41
saw real live examples of how they
02:25:45
work every day but look
02:25:50
it's all done quickly enough
02:25:53
scenarios that are actually done
02:25:56
fast without services
02:25:58
initially as problem setters
02:26:01
yourself at the training ground initially you are the same
02:26:03
drew how we would all be
02:26:05
implement and now when to us
02:26:08
customers come there to the testing site for
02:26:10
to be something
02:26:11
we really demonstrated
02:26:13
interactive we have some things
02:26:15
which are preconfigured there but
02:26:18
we are usually amateurs to do so we
02:26:22
the customer is talking about come up with us
02:26:23
what kind of scenario would you like, well, see
02:26:27
the systems that are installed there
02:26:28
the customer comes up with a scenario
02:26:30
says this is how I want it and right there on it
02:26:33
eyes happens quickly for this not
02:26:36
you need to know the language in terms of you
02:26:39
customers yes how to use this
02:26:41
there is no further need for the system for this
02:26:44
know special programming languages
02:26:46
there are scripting languages, it’s all done in
02:26:49
there are levels that are clear to logic
02:26:51
event sources are events from these
02:26:53
sources have objects in management
02:26:55
there is an action that needs to be done with
02:26:58
these control objects and essentially
02:27:00
this one there are four five steps
02:27:02
Every interaction can be flexible
02:27:04
flexibly configure our system
02:27:05
That's why
02:27:07
You are welcome again to our training ground
02:27:11
we agree we need to agree
02:27:19
in advance but in any case we are ready in
02:27:23
any moment to accept you and show you and
02:27:26
solve your problem, I'll turn it on now
02:27:33
a slide that is absolutely necessary
02:27:37
yes yes our contacts
02:27:39
well, actually there are contacts and in the chat there
02:27:43
guys, I see they’ve already written a lot where there
02:27:45
Is there any info? Is there any phone numbers please?
02:27:50
you can contact me, you can set tasks
02:27:53
directly they are small or
02:27:54
big it doesn't matter don't be shy
02:27:58
we are ready to solve any problem, this is our job
02:28:03
here I am, as I planned
02:28:10
because there will probably be some
02:28:11
questions will still need to stop time
02:28:13
and Andrey I thank you all and Andrey
02:28:17
I give the floor to the presenter, thank you very much
02:28:22
I think it turned out great
02:28:26
interestingly clear about it was in front of you
02:28:30
the need to decide what will happen
02:28:32
the story happens because well set
02:28:36
whose task you say today is
02:28:39
he's like this x not many people have your task
02:28:41
they say it seems obvious to me that you
02:28:44
made the right decision to build here
02:28:46
firstly in such a dialogue mode with
02:28:48
demonstrations are now rare and
02:28:53
it is clear that we are very involved
02:28:55
good there were a few
02:28:59
I think let's, dear participants
02:29:02
By the way, very good retention
02:29:04
Yes, we have practically no audience
02:29:06
decreases stays at 200
02:29:10
a man talks for three hours
02:29:14
about what you
02:29:16
Sergei Pavel made the right decision
02:29:20
let's join the staff
02:29:33
dear participants, you listened
02:29:37
looked important
02:29:41
way of the event so that there is no
02:29:45
the impression that the most important thing is not
02:29:47
they told me to ask some good one
02:29:50
question without which you think that
02:29:53
for you it will not be beneficial for you
02:29:55
quite enough if there is no pressure on him
02:29:57
get an answer maybe give some
02:30:01
such a difficult task
02:30:04
colleagues could demonstrate at
02:30:08
training ground
02:30:09
or comment on the hour then can
02:30:12
be another demonstration so difficult
02:30:15
complicated task because in general
02:30:18
the logic is clear the worse we formulate
02:30:21
the more accurately the task is obtained, the more
02:30:24
more effective and useful demonstrations
02:30:27
so your task is also good
02:30:29
you can keep silent, but here we are
02:30:32
there are several questions that can be asked
02:30:35
comment
02:30:36
Naturally there is a question here
02:30:39
integration
02:30:40
there were issues of integration into tracers here
02:30:43
right now here is integration with delpy like this
02:30:49
there seems to be an astra linux platform on
02:30:53
Alina's bed was notified to a trusted person
02:30:57
linux builds
02:30:59
Here's a question about reporting
02:31:06
for example
02:31:10
Ruslan asks please let's do it
02:31:14
Let's talk then about questions about him
02:31:17
Dear participants, write new ones with us
02:31:19
some more time available please
02:31:22
well, the answer to a number of questions is the same
02:31:30
Colleagues
02:31:31
referring to four hundred and fifty eight
02:31:34
government decree which
02:31:37
relate directly tq everyone knows
02:31:39
that depending on the category of the object
02:31:42
required to apply
02:31:45
auxiliary storm with open source it
02:31:47
190 point we this requirement completely
02:31:51
for example, we overlap there integration
02:31:53
some parts occur in visiting water
02:31:56
Some parts are happening in secure Russia
02:31:59
Secura stands as a processing collection system
02:32:03
information in this case it comes out
02:32:04
one step higher and pulls everything up
02:32:06
their interfaces outputting one or another
02:32:08
information depending on the setting
02:32:10
tasks what is actually needed and what is needed is this
02:32:13
ensuring comprehensive security at
02:32:15
object, that is, issues of the protection perimeter
02:32:18
perimeter issue of security alarms
02:32:22
display of sensors introduction of alarms
02:32:25
cameras that belong there and
02:32:28
logging of all events
02:32:31
the incoming system is here for the current
02:32:33
moment in time for which he hits the Russian Guard
02:32:37
what does she want to get out of it?
02:32:39
we have the implementation of such systems and
02:32:43
with the construction of a single shopping center
02:32:46
corporate objects respectively cases
02:32:59
there is to disclose them strongly that the solution
02:33:05
Halifax has us too
02:33:07
astra linux or just on simple ones
02:33:10
mortals linux and on simple ones
02:33:11
mortals will work even better
02:33:14
because it's less stripped down
02:33:15
or swelling various because on astra
02:33:17
linux has its own too, especially that
02:33:19
which is certified directly by Smolensk
02:33:22
commit version to with truncated
02:33:25
functionality therefore some types
02:33:27
analyst there for porting quite
02:33:30
it’s difficult, there are still questions like this
02:33:43
popular
02:33:44
yes, but connected with the inputs on each other
02:33:50
yes look here at home example
02:33:56
brought it but can we do it again
02:33:58
consider that is, we have some
02:34:00
entrance group if she has a pacifier house
02:34:02
then it’s clear then we need to sue the house
02:34:05
I still want to go home and take a walk through the events from this
02:34:07
things if we just have it free
02:34:09
conditional inspection zone, then you need
02:34:15
of course integrate it into both legs
02:34:19
systems if you create a maximum example
02:34:22
let's figure out when there is a shortage and there is a ha
02:34:24
viewings and video surveillance are all here
02:34:27
quite simple and at inspection
02:34:31
operator he has his own
02:34:32
interface this interface is assembled if
02:34:36
in simple words say like an ordinary
02:34:38
the camera seems to be climbing into the system
02:34:41
video surveillance with which we
02:34:42
interact
02:34:43
we from introscope of get alarming
02:34:47
events either in the form of a protocol or in
02:34:50
form
02:34:51
but if simply there is no
02:34:52
something exotic is worth bothering with
02:34:55
it is also possible to receive via dry contact
02:34:56
controller which is directly this
02:34:58
the access point deals with these two
02:35:01
events are communicated within the system by
02:35:03
alarm equipment we introduce camera
02:35:07
corresponding interface and video
02:35:08
video system is recording
02:35:12
displays more information from mixed
02:35:15
cameras that are around and actually
02:35:18
Well, he adds this archive with
02:35:22
with the corresponding markers we refer to these
02:35:26
with a marker, then sports and enter the protocol
02:35:28
we interpret any event
02:35:30
coming there while the bastion is like this
02:35:33
you want it to be interpreted like this
02:35:35
that's
02:35:36
and such an event will be written for you
02:35:39
as you say the parameter it will be
02:35:41
there are bases for Spartak to pick up, and here they are
02:35:44
in fact, all this is put in the protocol
02:35:47
from which you can scream there quickly
02:35:49
get for the vile images with the desired
02:35:52
cameras including those from the inspection
02:35:54
complex there is one more story then I tell you
02:35:58
I’ll just tell you an example when in large numbers
02:36:01
introduced metal detector frames and
02:36:03
hand-held metal detectors everywhere
02:36:06
it was necessary to inspect people there manually
02:36:09
when there was a large flow, the guards did
02:36:11
very simply he kept squeaking everything
02:36:14
contract for the key whales for everything else and
02:36:18
the guard simply entered it without pressing
02:36:20
button famous story like a camera
02:36:22
stood there was no driving
02:36:24
You couldn't use a metal detector there
02:36:28
press the button every time
02:36:30
is equivalent to spending five minutes on
02:36:32
each person gathers in line and
02:36:36
an angry mob can take it
02:36:39
guard somewhere to the side here
02:36:42
the guys have integration with
02:36:45
metal detectors
02:36:47
manually and they have become they have
02:36:48
the base station of these metal detectors and
02:36:50
they transmit this information through the channel
02:36:53
subtitles are superimposed directly into
02:36:55
live mode on the image with the camera
02:36:58
Is the metal detector working?
02:37:00
button and that he found metal or
02:37:03
and this is superimposed on the video archive here
02:37:08
same same same pier of responsibility
02:37:10
there is an image if there are no subtitles
02:37:13
pressed the metal detector button that's all
02:37:15
the guys seem to be responsible
02:37:17
I didn’t press it, you can press it with passion
02:37:20
depression i.e.
02:37:22
here it seems to be actually very simple
02:37:24
things with integration here
02:37:27
inspection of complexes there, well, the thing is
02:37:31
that they can be integrated into the front
02:37:33
protocol which they basically give away
02:37:35
there according to a well-known protocol, but here it is important
02:37:39
understand that there are always these pre-examination
02:37:41
operators are sitting in the complex
02:37:43
specialized ones are not direct operators
02:37:45
from our
02:37:46
complicated we're all used to
02:37:47
used to this is a specialized operator
02:37:50
tuned in exactly to this thing
02:37:51
therefore, native software is always used
02:37:54
security system from these to
02:37:56
viewing complexes only need video
02:37:58
depicts me and anxiety alarming
02:38:01
event yes they have one there there everything
02:38:05
just anxiety so anxiety they are like that
02:38:08
conditionally a threshold thing, so now I’m still
02:38:13
I'll see what else is there
02:38:18
Spain what are the waiting times for
02:38:22
functions confused the nose with the one indicated in with
02:38:24
Sergey a question for you Igor Igor a question with
02:38:33
the need to develop a library
02:38:34
why the Nazi belt is clear what it is
02:38:36
What are the deadlines for launching libraries and
02:38:39
I don’t know, this answers to break those who
02:38:42
This astra linux should be trimmed regularly
02:38:45
[music]
02:38:47
certifies and so on, that is
02:38:49
here the question is probably there first
02:38:51
and the question for you is what problem will we solve?
02:38:54
maybe there is already some functionality
02:38:56
I'm just saying there are two bags of Lego
02:38:59
you can collect something from them and there if
02:39:02
difficult task
02:39:04
one teacher told me
02:39:07
University sausage needs to be cut according to
02:39:08
pieces, that is, any complex task
02:39:11
it becomes easy if her
02:39:12
spread out into some stages and
02:39:14
look at it from a different angle
02:39:17
so maybe there is a solution that
02:39:20
You can already arrange it, we need to discuss it
02:39:23
what do you need me too
02:39:26
here you can intervene a little with help
02:39:28
truly respected participants
02:39:29
let's separate these questions that is
02:39:32
suppliers the system can really
02:39:34
ask what implementations are next
02:39:37
available yes what assembly suits your needs
02:39:40
maybe maybe already working so
02:39:43
as for broke those others
02:39:45
companies that make these very
02:39:50
trusted
02:39:51
systems we collect them abundantly from us
02:39:55
there is an event when
02:39:57
but there are 5 suppliers of these operating rooms
02:40:00
systems talk in detail for an hour at a time
02:40:04
every
02:40:05
and we invite you firstly I send
02:40:08
you to the archive for everything they dance
02:40:10
see technical policy stories
02:40:13
in retrospect of our events we had
02:40:15
not just one, several meetings dedicated to this
02:40:20
information security and Russian
02:40:22
operating systems
02:40:23
[music]
02:40:25
Well, welcome to the future
02:40:29
It’s already in our plan, so let’s get it
02:40:32
really determined and smash those and
02:40:37
others here on our topic because they are so
02:40:40
They usually fly widely, they have a universal
02:40:43
you and I have a specific remedy
02:40:45
tasks that support and so
02:40:49
system of stylistic protection and systems
02:40:52
security of critical facilities
02:40:55
from the topic of transport security to us
02:40:58
I care
02:40:59
what is their technical policy and what about
02:41:01
these libraries
02:41:02
so I'll come up with a great reason for that
02:41:06
so that these guys
02:41:08
invite for more detailed information
02:41:10
conversation I'll call Tim's wife and Igor I
02:41:16
I will answer your question which is you
02:41:19
additionally set this library
02:41:20
in the form of analytics, this is probably not a cruise
02:41:23
Peter you are absolutely right libraries
02:41:25
video analytics are actually not for us
02:41:27
and in the form of analytics these are like modules
02:41:31
analytics but there are various libraries
02:41:35
for example, if windows is expanded into
02:41:38
there's no way for the shelf
02:41:39
there is a built-in library that
02:41:42
allow by turning to them they perform
02:41:44
some function and returns it back
02:41:46
this is for Odessa residents up to the programmer level
02:41:48
go down you can't go up or enter
02:41:51
The state of the programmer is like this
02:41:54
need for appropriate
02:41:57
libraries that you can
02:42:00
to the standards of long winters there are
02:42:02
truncated version of Linux is missing and
02:42:06
there is a need for such
02:42:08
there were libraries so that you could use them
02:42:09
communicate at the program level in order to
02:42:13
so that analytics takes off because without
02:42:15
things are difficult there without support
02:42:17
what to do but commenting on this one
02:42:21
the question is a little further if after all
02:42:23
these are problems to solve for smoothing out a
02:42:27
or or just there but if you just
02:42:30
Linux lover, this is good, of course
02:42:33
if the task is for once in the city I want to notice
02:42:35
that in our unit the Russian Guard
02:42:37
regulates the soybean system and
02:42:39
operators on Linux
02:42:42
what we actually do, that is
02:42:45
soybean server and operators but I understood everything no
02:42:48
this is for Linux lovers, but there it is
02:42:52
there really are a lot of restrictions
02:42:55
mechanism that does not allow
02:42:59
Linux does not allow you to work closely with it
02:43:02
resource here and a good topic for the future
02:43:07
by the way thank you thank you Igor and you
02:43:11
Sergei led them for this short
02:43:13
discussions because well, such questions
02:43:17
I think they will appear more and more often
02:43:19
we were accepted last week
02:43:23
additions ax order so much
02:43:26
regulating ki yes there are 2 each
02:43:29
categories additional requirements
02:43:31
prints and so on, that is, in
02:43:33
What's the point of a consistent policy?
02:43:35
politics so with which the state
02:43:38
I'm trying to form such a trusted
02:43:41
Wednesday referring to threats that are not usually
02:43:44
includes the threat model of any private even
02:43:47
large enterprise to China's brow country
02:43:50
so foreign and so on and so on
02:43:53
so this is a good topic because they
02:43:57
policy will increase the team
02:44:00
talk 7 who some basic
02:44:03
means offered include good
02:44:10
thanks, let's go
02:44:12
We give questions to Igor Kardashian and
02:44:15
accordingly you can
02:44:17
negotiations to clarify some issues
02:44:20
They let me contact you by phone sometimes
02:44:22
offers a couple
02:44:23
so what else do we have for me?
02:44:27
it seems we are already intense so good
02:44:29
we can work on them little by little
02:44:33
Do you think we will work very well
02:44:40
let's then here are some final ones
02:44:42
moments first to your team Sergey
02:44:45
Pavel I have a request, let me do it again
02:44:48
will publish an upsell or mailing addresses
02:44:51
directly to the chat, practice shows that
02:44:54
It’s more convenient for people to make the cube’s mouth
02:44:56
presentations were written, or wait and
02:44:59
Iraqis
02:45:00
I think this will download correctly
02:45:05
after the training ground in your task
02:45:12
respected in peaches, it seems to me that
02:45:15
such a company showed affiliate programs in
02:45:19
their job today that they are working
02:45:21
openly and that they will only be happy and we
02:45:24
baked their task of their antipathies
02:45:27
maybe even something like that I don’t know a few
02:45:30
idealize me too
02:45:36
use that is, there are no such things
02:45:40
Not every supplier
02:45:41
the right team supports me like this
02:45:45
dialogue on strength as we observed
02:45:47
today I too, dear participants
02:45:51
reproduction let's have our tasks
02:45:55
brushes for development
02:45:57
our today's partner or test
02:46:01
twin about me it seems here 2
02:46:05
understood each other well everything that everything
02:46:11
what do they need you to do somehow
02:46:14
better simpler then these are your entwining tasks
02:46:18
the indicator you would like to achieve
02:46:20
ki I enjoyed it today
02:46:25
there was a very living world 5 very correct
02:46:29
it seems to me that the decisions were made because
02:46:33
to make it exactly like this so I
02:46:36
I will use you as an example by the way
02:46:40
led Sergey and your colleagues excellently
02:46:45
we were alive and demonstrated but like this
02:46:47
for three hours of live demonstration of this
02:46:49
conversation is rare
02:46:52
well, thank you very much again
02:46:56
dear participants for such a wonderful
02:46:58
involvement we have harm and minutes
02:47:02
number decreased to less than 200 people and
02:47:06
now we see 180 people
02:47:09
active it seems to me a great result
02:47:12
this means that our task is more
02:47:14
200 conference participants per
02:47:17
these three hours are like this on behalf of our
02:47:20
team I want to say that we would like
02:47:23
so that there are more approaches like this
02:47:25
righteous here are some new topics
02:47:29
you can designate this in the same style
02:47:33
continue Pavel Sergey whatever you wanted
02:47:37
say you're welcome to more of these
02:47:40
some kind of final
02:47:42
In closing words, please let us do the same
02:47:46
I really liked a lot of questions and I
02:47:49
I think that they are all with the continuation of us
02:47:53
very glad to be actively involved
02:47:56
well done participants questions
02:47:59
correct, very competent, interesting
02:48:02
we will try to do everything in our
02:48:04
forces to solve your team problems
02:48:08
We are great once again invite you to
02:48:13
guests to the training ground, guests to the office and where
02:48:16
want to We will be happy to accept the great
02:48:19
thanks for joining
02:48:23
our event, well, I think she
02:48:25
this is not the last one for sure so wait
02:48:30
new releases and crossed our channel and
02:48:33
Colleagues
02:48:35
I also join in, thank you for
02:48:38
listened asked a question this is very
02:48:42
the dialogue mode was always very important
02:48:44
important we are not actually boxed
02:48:49
company that pushes boxed goods
02:48:51
the solution I wanted was simple on this
02:48:53
focus attention at first as if
02:48:55
this moment but they let us in
02:48:58
team that has the corresponding
02:49:01
engineering resources department
02:49:04
we presented the development department
02:49:07
we provide assistance in implementation
02:49:10
designated technologies of the company with
02:49:13
there is an implementation department
02:49:16
which connects that is what we
02:49:18
talked at the beginning at the level of expectation
02:49:21
we also confirm at the end at the level
02:49:24
in reality this is very important because
02:49:27
very often a situation arises when
02:49:29
I want to tell my partner which one for
02:49:32
the customer has some kind of ideology, but
02:49:34
we lack competence just with
02:49:38
we cover the missing ones, this one here
02:49:40
a piece of our very competencies
02:49:42
engineers connect remotely or
02:49:44
solve problems there upon arrival
02:49:47
objects directly perform
02:49:48
commissioning works of ours
02:49:51
CCTV camera systems we do not
02:49:55
we hang we can carry out copyright
02:49:57
supervision during system design to
02:50:01
but along the way there the dog grew
02:50:05
and no matter how divided into many
02:50:07
the various parts did not crumble, that is
02:50:09
so that everyone gets to the finish line there
02:50:10
integrity and safety that is why from
02:50:13
the beginning of time implementation even from the beginning
02:50:16
dialogue before implementation, as if on purpose
02:50:19
dedicated manager specifically for you
02:50:22
freestyle department specialist
02:50:24
will help you interact at the same level
02:50:27
setting tasks and so on at the level
02:50:28
definitions
02:50:29
more optimal technical solution
02:50:31
based on the existing cubes
02:50:34
here or there are indications of the missing ones
02:50:37
to the public such an approach as if we
02:50:40
pursue and accordingly if
02:50:43
additional improvements arise
02:50:44
development company with the company screw pro
02:50:49
we do the same, we don’t take money for
02:50:52
additional development we are aimed at
02:50:56
implementation of what kind
02:50:58
end system that is, we supply
02:51:00
we want hardware and software systems
02:51:02
so that everyone gets the same aesthetic
02:51:05
pleasure from her as when we
02:51:08
we create everything with my own approach
02:51:13
we and the company have the same ones I would
02:51:15
I also wanted a few words, thank you very much for
02:51:19
organization
02:51:20
by gruntek Andrey special to you
02:51:23
thank you it's always a pleasure to be present
02:51:26
at your events actually
02:51:29
we don’t want to participate, it’s even more pleasant
02:51:30
so thank you very much but colleagues in
02:51:34
now the end of the elements 2 songs
02:51:37
[laughter]
02:51:41
Well let's put it on a positive note
02:51:45
you and I will really accomplish a lot
02:51:49
there were a lot of interesting ideas
02:51:52
useful continuations, the main thing is that everything
02:51:56
customers who listen to us today
02:51:58
all partners always synchronize their watches
02:52:01
subsequence
02:52:02
if some spring list yes correct
02:52:06
solutions are very good that you chose
02:52:10
demonstrations because the interface and
02:52:13
this is the hardest thing for me to explain
02:52:16
it seems that this is the main main thing
02:52:20
the benefit is valuable for everyone because
02:52:22
that there were a huge number of hours
02:52:25
saved for our audience for
02:52:28
participants for understanding how it is
02:52:31
looks like this can be used like
02:52:33
the operator or or works with this
02:52:36
admin here's a huge one again
02:52:39
thank you for the pleasant dealings with competent and
02:52:42
let's be interested people
02:52:45
end all the best
02:52:49
we'll process

Description:

Павел Чиликин, директор компании ГК ТвинПро, и Сергей Талызенков, руководитель направления Департамента развития бизнеса компании ISS, провели совместную конференцию, посвященную комплексным автоматизированным системам безопасности. Конференция с прямым включением c испытательного полигона! https://www.zarya-ls.ru/ — Система охранного освещения «Заря» https://www.punktir-c.ru/ — Вибрационное средство обнаружения «Пунктир-С» https://www.trevog.net/ — Аппаратно-программный комплекс «Бастион-2» https://www.trevog.net/ — Система контроля и управления доступом «Elsys» http://www.twinpro.ru/ — наш официальный сайт. +7 495 419-03-04 — Отдел продаж +7 800 250-08-46 — Техническая поддержка https://www.facebook.com/unsupportedbrowser https://www.facebook.com/unsupportedbrowser

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Комплексные автоматизированные системы безопасности эффекты и примеры внедрений. Конференция"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.