classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Crisis management with a wall
April 2017, CCTV, Surveillance & Remote Monitoring, Integrated Solutions

What happens when a security crisis hits an organisation? Is the right information immediately available to the right people to coordinate a quick and accurate response? Cutting-edge technology provides security teams with the tools they need to effectively collaborate, coordinate and manage a security crisis in real time.

The Immix Crisis Wall is a new addition to the Immix CC (Immix Command Centre), a platform that allows for seamless collaboration between disparate groups responding to a security event or crisis. It allows security professionals to share an information wall that includes live video, mapping, event information and more, from a simple web interface.

The Immix Crisis Wall

Any invited user: Authorised Immix users simply send an e-mail invitation to anyone they want to join their wall. The invitee simply clicks on a web link and provides their name, no cumbersome user or account setup required. This allows the Crisis Wall to be shared with first responders and other security professionals outside of the organisation who need to collaborate on the response.

Large integration library: Leverage the vast integration library to connect a wide variety of different cameras systems.

Multicast video streams: Immix connects once to a camera system and then multicasts this to everyone accessing the Crisis Wall.

Audit the crisis: Everything the users saw, said and did is recorded in the Immix multimedia audit trail for forensic review, post event.

Any event: An event wall can be created for scheduled events where users want to easily collaborate across organisations or groups.

No software to install or manage: Any users can access the Crisis Wall via a web browser, eliminating the need for IT to maintain and support remote software.

Features of the Crisis Wall

User and presenter: Different users can be promoted to presenter, providing them the control of cameras, along with the layout of the wall being shared with everyone.

Chat: Users can chat back and forth as they coordinate response to the event.

File drop: Want to share the evacuation plans with everyone? The Immix Crisis Wall allows users to drop and share any file, helping to coordinate and simplify the response to the event.

Configure the layout: The layout of the Crisis Wall can be changed at any time, and up to 25 individual tiles can be configured per wall. Individual tiles can be resized, moved or the content of the tile can be changed from video, to a map, the alarm queue, alarm clips, or an operator’s real-time audit trail.

For more information contact VantageMDT, Jayne Nel, +27 (0)72 948 2017, jayne@vantagemdt.co.za, www.vantagemdt.co.za.


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.
  • Your face tells a story
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)
    Facial recognition has advanced to the point where it can be rolled out over large areas and accuracy is no longer a hit-and-miss affair.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.