INTRODUCTION

Using an intrusion detection system for perimeters protection in a premises ensures that real-time breach alerts can be generated and the threat can be neutralised quickly and efficiently

  1. Securing large establishments such as sensitive military sites, government, and critical infrastructure installations requires more than simple CCTV surveillance.
  2. Multiple sentries are required to monitor the large number of cameras making it easy to miss breaches
  3. Any breach requires the users to sift through hours of footage to identify the event
  4. Analysis can only be done post-facto

CCTV monitoring is outdated

  1. Securing large establishments requires more than simple CCTV surveillance
  2. Multiple sentries are required to monitor cameras 24×7
  3. Any breach requires users to sift through hours of footage for identification
  4. Any analysis can only be done post-facto

Features

  1. Artificial Intelligence based Human Activity Tracking System with >95% human detection accuracy
  2. Alarms for Unauthorised Fence Crossing, Line Crossing, Zone Entry, Suspicious behaviour, weapon detection etc
  3. Left Object/Removed Object Detection
  4. Camera Tamper Detection
  5. Works with all kinds of cameras including Thermal Vision/IR cameras

HOW IT WORKS?

  1. Modular Architecture. Ability to use existing CCTVs and infrastructure and work in a standalone or integrated fashion
  2. Can be integrated with other 3rd party systems like Command and Control Systems
  3. Completely local operation; No internet required.
  4. Video Analytics Server is deployed at the location and automatically starts processing the video feeds
  5. User configurable audio and video alerts for action to be taken