Big Data
Showing results for 
Search instead for 
Do you mean 

Analytics for Human Information: Putting the puzzle together for effective risk assessment

JoeLeung ‎03-27-2014 01:43 PM - edited ‎02-19-2015 02:41 PM

There is a fine line between triggering a false alarm and advertising a real threat.  The split-second decision could have drastic consequences and costly repercussions.  As the pressure to deliver fast and appropriate responses mounts, security operators need to have real-time comprehensive intelligence to more accurately assess a myriad of existing and emerging threats efficiently.  To do that, workflows may need to be streamlined, and diverse data sources may be involved which could push traditional surveillance tools to their limits.



For example, when a person is attempting to enter a secure area, a series of actions may be necessary for effective risk assessment:


  1. Facial recognition tool analyzes the image captured by security cameras and verifies it against a staff database.
  2. If the person is verified as a staff member, entry is granted. If not, video footage of the person loitering around the property perimeter may indicate a potential threat.
  3. The image can be used to check against other databases to ascertain identity and uncover potential criminal records.
  4. If a criminal record is confirmed, the threat level goes up but not to the point where the person should be denied entry—it may still be a legitimate visit.
  5. The image and identity can be used to check and see if there are other threatening indicators expressed in social media and communications (e.g. email)
  6. If valid indicators are detected, threat level may reach a threshold by which entry is denied and other security responses may be triggered.

The risk assessment puzzle

Each step outlined above addresses a piece of the risk puzzle. While the process can stop at any point, it is obvious that with each additional step, the accuracy of risk assessment goes up and probability of inappropriate response goes down.


To get the complete picture, it is crucial to monitor a multitude of data sources (video, database, social media, email, etc.) and analyze these various types of data to provide holistic situational awareness for making better decisions—faster. HP Surveillance can help you do just that


Visit our website to learn more about HP Surveillance, and join us in Las Vegas at ISC West, April 2-4.



About the Author


Joe has over 13 years of experience in technology marketing and is currently focused on the analytics solution portfolio. Prior to this role, he was responsible for product marketing of the enterprise application data management solution.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all