Intelligent & Autonomous Security Robots

Despite perimeter fences and other site barriers, intrusion into protected areas is not uncommon. When trespassing is detected in a protected area, the main task of security is to intercept the trespasser and to prevent them from committing any malicious acts. 
 
An effective solution to this challenge is the use of non-lethal weapons, for example, employing long-range, high-power acoustic devices. Some security robots are equipped with a long-range acoustic device for automatically preventing illegal activities without the need for the presence of a security officer in the area of intrusion. 
 
Now, a robotics company bids to make life easier on robot-using security teams, by giving them a brand new ability-enhancing technology
 
A new artificial intelligence technology that gives security guard robots the ability to communicate and deploy jointly at the same patrol site was unveiled by SMP Robotics, a manufacturer of autonomous mobile robots.The new technology provides an organisation additional situational awareness and streamlined guarding on the robot-guarded site. 
 
Swarm technology increases the security guard robot’s abilities to successfully patrol any given area, and enables a security operations center to coordinate the paths of multiple robots when they travel. 
 
“We listened to our customers and made updates and improvements to the technology to add this feature, and we are excited it is coming to fruition,” said Leo Ryzhenko, CEO, SMP Robotics. 
“This new technology harnesses the power of our robotic security solution with new artificial intelligence, making the robot an even greater asset to a security team.” 
 
The companies are working together closely to expand a comprehensive test track of the swarm technology to deploy in the coming months, according to roboticstomorrow.com. 
 
According to the company website, these robots can be deployed at various sites that need around-the-clock security, and swarming technology would benefit their guarding abilities.
 
These sites include:
 
1. Electrical power plants and solar farms
2. Oil and gas facilities, refineries, and chemical plants
3. Physical security of critical infrastructure
4. Mining site security systems
5. Construction and building site security
6. Warehouses and parking lots
7. Empty-property security
Also, this technology has several key features, including:
1. Swarm Intelligence for the reliable group patrolling of large areas
2. Obstacle Avoidance and anti-collision system
3. Self-Diagnostic Systems
4. Panic button and two-way audio intercom
5. Remote robot monitoring systems 24/7
6. Fully autonomous patrolling
7. Deep Learning for human recognition in the cameras’ observation range
8. Intelligent Security: recognition of staff members by uniforms
9. Cloud Data integration
 
I-HLS:
 
You Might Also Read: 
 
Toyota Is Making Humanoid Workers:
 
Autonomous Robots Will Deliver Your Lunch:
 
UK Thinks Robots And AI Will Lift Economic Growth:
 
 
 
 
 
 
« Iranian Hackers Have Infiltrated US Infrastructure
Chinese Hacker Groups Shift Focus To India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.