Gorilla Technology unveils Security Convergence platform to bridge physical and digital security gap

Gorilla Technology, provider of video intelligence and Internet of Things (IoT) technology, launched on Tuesday its Security Convergence platform, a comprehensive amalgam of Gorilla’s core AI-based video big data analytics, cyber and network security solutions.

The platform leverages machine learning, facial recognition, network intelligence, AI-powered edge computing and big data video analytics to tap network traffic and multiple data streams — mobile, CCTV, IP, geo and more — to improve overall physical and cyber security postures, enabling law enforcement and businesses to better detect and proactively predict suspicious activities before they occur.

The Gorilla Security Convergence platform encompasses five fully-integrated solution modules that analyze, in a manner never before possible, disparate data sources, including terabytes of unstructured data from live video streams, network packets, semi-structured data (open source intelligence) and structured data such as external databases.

These components include Network Surveillance to include network data collection and analysis; CyberSecurity to detect, identify and respond to network threat; Open Source Intelligence (OSINT) to visualize network insights; Electronic Security: IVAR (Intelligent Video Analytics Recorder), iPlatform (viewing alerts and live streams), FVS (Fast Video Search), and BAP (Biometric Authentication Provider); and Threat Intelligence Big Data (TIBD) for integration and management.

The Security Convergence platform conducts real-time searches and tracking of people, vehicles and devices or other objects, and can even be remotely administered. It facilitates watch list creation to specify both unusual activities that indicate criminal intent and individuals known to pose a risk, thereby reducing manual effort and limiting human error. Advanced intrusion detection capabilities identify suspects quickly, and upon event occurrence, will alert designated personnel with push notifications to keep security and relevant management aware of situations occurring.

Many cybercrimes incorporate a physical component, whether from a site visitor, data center repair or even ATM maintenance. Once they have physical access to connected network devices, they can install or download drivers and other malicious code, introducing a vulnerability that can be later exploited.

Due to these factors, cameras ranging from webcams in data centers to the KPN and ATMs must be investigated — which most IT professionals do not fully understand – in context to digital evidence related to cybercrimes.

“Cyber security is often focused on conventional threats, but new Advanced Persistent Threats and malware attacks are becoming unconventional, taking advantage of every new attack surface such as in the physical domain,” said Dr. Spincer Koh, CEO and co-founder of Gorilla Technology. “Monitoring this environment is becoming increasingly complex as ever-larger quantities of video and IoT sensor-related data need to be processed, analyzed and managed in context to digital forensic evidence. However, this data often becomes siloed limiting its analytic potential and value.”

The Security Convergence platform conducts real-time searches and tracking of people, vehicles and devices or other objects, and can even be remotely administered. It facilitates watch list creation to specify both unusual activities that indicate criminal intent and individuals known to pose a risk, thereby reducing manual effort and limiting human error. Advanced intrusion detection capabilities identify suspects quickly, and upon event occurrence, will alert designated personnel with push notifications to keep security and relevant management aware of situations occurring.

“Our goal is to bridge the gap between conventional and IT security. For example, our platform’s robust facial recognition solution, using advanced AI machine learning, geolocation and other solutions, was able to foil a cross-national $60 million bank heist in just three days. It was not only able to reveal the identities of both criminals, but it was also able to clear the unfortunate owner of the IP address spoofed during the heist. This is only one of many real-world scenarios that our platform can play a fundamental role in resolving an investigation successfully and quickly,” added Koh.


IoT Innovator Newsletter

Get the latest updates and industry news in your inbox! Enter your email address and name below to be the first to know.

Name