image description

What video device manufacturers does your Video Monitoring service support?

Our IMMIX ISO certified video monitoring platform can monitor an extensive range of cameras, DVRs, NVRs and VMSs including: AXIS Camera Station AXIS Guardian Genetec Security Center (5.2, 5.5, 5.6, 5.7 & 5.9) Milestone Systems Avigilon ACC (V4/V5/V6/V7) Vivotek NVRs Mobotix Onvif Profile S devices PACOM SmartIP IDIS Exacq 2N Aiphone ACTi Adpro VCG & […]

» Read More
Posted By:
Filed Under

How does Video Monitoring work?

Our interactive video monitoring platform, Immix from Sureview Systems, is an open & scalable system that offers integrations with over 170 manufacturers and supports thousands of manufacturer VMSs, NVRs, DVRs, Encoders & Cameras. When we integrate connect your video surveillance system with our Video Monitoring platform we can provide: Live, Pre & Post Alarm imaging […]

» Read More

What is Tecom Forcefield Enterprise VM?

Tecom Forcefield Enterprise VM is an enterprise licence for Forcefield that allows for the networking of up to 128 Challenger panels. Forcefield Enterprise is installed straight on server hardware using VMware ESXi and simplifies disaster recovery configurations for large IT and security organisatons, using multiple Challenger systems. Call us on 1300 556 334 or email […]

» Read More
Posted By:
Filed Under

What does AXIS Zipstream technology do?

AXIS Zipstream technology preserves all the important forensic detail you need, while lowering bandwidth and storage requirements by an average of 50% or more. Unlike most compression technology, Zipstream doesn’t just limit bitrate. Instead, three kinds of intelligent algorithms ensure that relevant forensic information is identified, recorded and sent in full resolution and at full […]

» Read More

Are there any privacy issues?

  Like all Access Control Systems, NoahFace Access allows you to record user details (eg: their name, unique identifier, and a profile picture) as well as an event log of all access attempts. In recording such information, you need to be aware of and adhere to relevant privacy laws. Privacy laws are different in each […]

» Read More
Posted By:
Filed Under

Is the data encrypted?

  All communication between the iPads and the NoahFace Cloud server is encrypted using TLS/SSL. When sensitive user related data (eg: passcodes and biometrics) is managed locally on each iPad, it is encrypted and secured using IOS keychain services.  

» Read More
Posted By:
Filed Under

Where is the data stored?

  The configuration and user data is generally captured and stored on the NoahFace Cloud server, and is replicated to and cached on each iPad to enable high performance and offline operation. For single iPad deployments, you can choose to only store this data on the iPad. Since events and biometrics are captured locally, they […]

» Read More
Posted By:
Filed Under

Is facial recognition more secure than access cards?

  ‍Access cards can be (and often are): 1.Lent to friends or visitors, 2.”Borrowed” from desks, 3.Permanently lost or stolen 4.Easily and cheaply duplicated. In short, access cards don’t tell you who entered – only which card was used. Facial recognition overcomes all of these security issues, so we would suggest that it provides you […]

» Read More
Posted By:
Filed Under
Return to Top ▲Return to Top ▲