Video security goes mobile

Issue 7 2021 Surveillance

A shipment is damaged or your customer complains about missing parts? Your employee is threatened or observes an acute threat situation? Your property has been damaged or vandalised? Now video images can help, even without permanently installed video cameras.

Geutebruck now integrates smartphones as image sources into professional video management systems. The new app for Android smartphones sends the video streams recorded with the integrated camera live via Wi-Fi or LTE network to your G-Core video management system – optionally including audio.

For logistics applications, it automatically recognises bar, QR or other scan codes in the image and combines the scan data with the video footage. The app also allows the triggering of events and adding of comments, which can then be used as a search criterion. Damage to property, e.g. due to vandalism, is thus documented quickly and comprehensively. In the case of an acute emergency, an alarm can be triggered to be displayed live in a central monitoring station including the associated smartphone video (and audio) stream.

Search, display and image retrieval are just as fast and convenient as with permanently installed cameras. All relevant images are immediately and clearly displayed via the event data such as comments or scan codes. Using the tamper-proof and court-certified GBF format, the sequences can be securely exported with the associated metadata to document the incident in the long-term and preserve evidence. Existing systems can be flexibly expanded, smartphones and standard security cameras can be combined as required.

Special attention is paid to data protection and data security. The app functions exclusively as an image and data source and does not provide access to recorded images. Registering the smartphones used on the server ensures that only authorised devices function as image sources. Additionally, the app manages its own users – only they can operate the app to initiate video and data recording. All data is protected in the video management system in a GDPR-compliant manner and stored securely from unauthorised access, even if a registered smartphone is lost. With the help of the activatable pixelation of faces directly on the smartphone, the privacy of randomly filmed persons is protected.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
Large-scale AI boosts manufacturing efficiency
Hikvision South Africa Surveillance Industrial (Industry) AI & Data Analytics
Video systems, once used mainly for security, are rapidly becoming one of the most valuable sources of operational data in factories and industrial parks, accelerating smart manufacturing process.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.