image description

What features does the Geutebruck G-Core Video Monitoring service offer?

The Geutebruck G-Core integration is an advanced system-to-system integration. Devices are added and configured on the GCore server, Immix is then configured to connect to the GCore server as opposed to connecting devices directly to Immix. This integration includes an alarm receiver service to handle all the alarm requests going into Immix. Features include: GetConfig […]

» Read More
Posted By: JD Security
Filed Under

What features does the Avigilon Control Center Video Monitoring service offer?

The Avigilon Control Center (ACC) integration is an advanced system-to-system integration and includes all the major features of a VMS integration. It supports getconfig making on-boarding of a new system simple & easy. Its supports advanced Avigilon ACC analytics through Avigilon cameras and Rialtos decoders (formally VideoIQ). Avigilon requires a licence to enable the Video […]

» Read More
Posted By: JD Security
Filed Under

What features does the Genetec Security Center Video Monitoring service offer?

Genetec is a system-to-system integration rather than a simple device integration and as such, requires more time and skill to set up. Genetec has a wide variety of custom settings that can affect the performance of this integration. Set up may also require the authority and access to modify the currently configured settings within the […]

» Read More
Posted By: JD Security
Filed Under

What video device manufacturers does your Video Monitoring service support?

Our IMMIX ISO certified video monitoring platform can monitor an extensive range of cameras, DVRs, NVRs and VMSs including: AXIS Camera Station Genetec Security Center (5.2, 5.5, 5.6, 5.7 & 5.9) Milestone Systems Avigilon ACC (V4/V5/V6/V7) Vivotek NVRs Mobotix Onvif Profile S devices PACOM SmartIP IDIS Exacq 2N Aiphone ACTi Adpro VCG & Fastrace 2 […]

» Read More
Posted By: JD Security
Filed Under

How does Video Monitoring work?

Our interactive video monitoring platform, Immix from Sureview Systems, is an open & scalable system that offers integrations with over 170 manufacturers and supports thousands of manufacturer VMSs, NVRs, DVRs, Encoders & Cameras. When we integrate connect your video surveillance system with our Video Monitoring platform we can provide: Live, Pre & Post Alarm imaging […]

» Read More
Posted By: JD Security
Filed Under

What is Tecom Forcefield Enterprise VM?

Tecom Forcefield Enterprise VM is an enterprise licence for Forcefield that allows for the networking of up to 128 Challenger panels. Forcefield Enterprise is installed straight on server hardware using VMware ESXi and simplifies disaster recovery configurations for large IT and security organisatons, using multiple Challenger systems. Call us on 1300 556 334 or email […]

» Read More
Posted By: JD Security
Filed Under

What does AXIS Zipstream technology do?

AXIS Zipstream technology preserves all the important forensic detail you need, while lowering bandwidth and storage requirements by an average of 50% or more. Unlike most compression technology, Zipstream doesn’t just limit bitrate. Instead, three kinds of intelligent algorithms ensure that relevant forensic information is identified, recorded and sent in full resolution and at full […]

» Read More
Posted By: JD Security
Filed Under

How reliable is the facial recognition process?

With appropriate setup, NoahFace Access can correctly identify individuals over 99% of the time. And if someone is not recognised automatically, they can manually identify themselves. You can choose whether this requires a passcode (sent to their phone), your own unique identifier (eg: an employee number, member number, etc), or both.

» Read More
Posted By: JD Security
Filed Under

What happens to my alarm monitoring service if there’s a power cut?

Thanks to advances in technology, our alarm monitoring systems won’t fail if there’s a power cut. Unlike phone lines, 4G wireless monitoring systems continue to transmit when there’s a power outage. In the past, opportunistic thieves would use power cuts as an opportunity to gain unlawful access to a building. The use of 4G overcomes […]

» Read More
Posted By: JD Security
Filed Under
Return to Top ▲Return to Top ▲