Unified video, intrusion and access control

1 January 2013 Access Control & Identity Management

American Dynamics, part of Tyco Security Products, has announced the latest version of its revolutionary network video management system comprised of the VideoEdge NVR and victor unifying client. This NVMS provides the very best in embedded analytics, mapping, and bandwidth management, and is now unified with Software House CCURE 9000 access control and a host of other applications.

The re-architected VideoEdge NVR is available in a variety of form factors (rack-mount, desktop, software-only); the rack-mount server features up to 36 TB of raw storage, while the software-only version allows you to use your preferred hardware vendor, providing flexibility and savings. The new NVR has an intuitive administrative interface and easy-to-use setup wizard that helps reduce installation and set up time to minutes vs. hours.

VideoEdge includes embedded analytics that lets security personnel quickly search through hours of recorded video, or flag suspicious behaviours and movements in real-time. Activities such object detection, linger, exit and enter direction, object removed or abandoned and shelf sweep can be analysed in detail, helping to solve security events and issues quickly.

Additionally, VideoEdge utilises dynamic bandwidth management to ensure high-quality images can be viewed without negatively impacting network bandwidth, whether transmitted over a LAN, WAN, wireless or public 3G connection.

“Since releasing VideoEdge and victor nearly two years ago, we have listened intently to customers and partners so that we could bring to market what we feel is the most intuitive, most powerful NVMS on the market,” said Steve Carney, director of product management for American Dynamics. “For us, the clear objective is to unify our customers’ security world so everyone can enjoy the benefits formerly reserved for those with security operations centres. Our NVMS, powered by victor and VideoEdge, unifies IP and analog video, intrusion, real-time location tracking, access control, and other applications such as visitor management, business continuity, and more.”

A perfect example of this unified approach is object association, which allows customers to link up to five devices together to get an holistic view of an incident. For example, an alarm at a card reader can automatically call up the video feed from the associated cameras at that door, and trigger icons on a map of their facility to go into alarm – all through one unified interface.

For more information contact Tyco Security Products, +27 (0)82 566 5274, [email protected], www.tycoacvs.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...