Integration categories

Development Acceleration Program

  • Audio detection: Sound Event Detection (SED) is the task of recognizing the sound events and their respective temporal start and end time in a recording. Sound events in real life do not always occur in isolation, but tend to considerably overlap with each other. Recognizing such overlapping sound events is referred as polyphonic SED.

  • Barcode and QR scanning: Barcode scanning consists of a light source, a lens and a light sensor for translating optical impulses into electrical signals.

  • Biometrics: Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

  • Command & Control: Command and Control is the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures employed by a commander in planning, directing, coordinating, and controlling forces and operations in the accomplishment of the mission.

  • Computer Aided Dispatch: Computer-aided dispatch (CAD), also called computer-assisted dispatch, is a method of dispatching police vehicles, fire trucks, ambulances, and so on, assisted by computer. CAD systems consist of several modules that provide services at multiple levels in a dispatch center and in the field of public safety. These services include call input, call dispatching, call status maintenance, event notes, field unit status and tracking, and call resolution and disposition.

  • Displays and Video Walls: A video wall is a type of entity that represents a large screen, typically used to display multiple video streams simultaneously. The screen can be a single monitor or multiple monitors joint together to form a single large screen.

  • Drone Dispatch: A system that allows emergency operators to dispatch drones from a unified dashboard to gather information on an emergency situation and pass on the information to human responders who can arrive later, better informed, and prepared.

  • Elevator destination dispatch: Elevator destination dispatch is an optimization technique used for multi-elevator installations, in which groups passengers heading to the same destinations use the same elevators, thereby reducing waiting and travel times. Comparatively, the traditional approach is where all passengers wishing to ascend or descend enter any available lift and then request their destination.

  • Evacuation management:

  • Evidence management:

  • Facial Recognition: A facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces, typically employed to authenticate users through ID verification services, works by pinpointing and measuring facial features from a given image.

  • Guard Tour: A system for logging the rounds of employees in a variety of situations such as security guards patrolling property, technicians monitoring climate-controlled environments, and correctional officers checking prisoner living areas.

  • Gunshot detection: Gunshot detection systems are used by law enforcement to detect, respond to, and investigate gunfire.

  • Identity Management:

  • Integrated Access Control System: Access control systems that manage access to physical assets such as doors and group of doors and the processes, policies and technologies that manage that access.

  • Intelligent Keys: Intelligent key systems, consisting of electronic cylinders and keys, provide controlled access, accountability, physical security, and system management - many of the same benefits as a traditional electronic access control system, yet with an installation that is more efficient and cost-effective

  • Intrusion Detection: An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system.

  • IoT: The industrial internet of things (IIoT) refers to interconnected sensors, instruments, and other devices networked together with computers' industrial applications, including manufacturing and energy management.

  • Key and Asset Management: Key management is the process of securing, tracking, and distributing physical keys and other assets.

  • Maintenance and Health monitoring: Integrations that track the health status of systems and provide information needed to verify performance and guide maintenance operations.

  • Parking Access Revenue Control System: Parking Access Revenue Control System (PARCS) is a system that works by preventing unauthorized vehicles from entering/exiting a lot through the use of license plate information associated to each vehicle entering a lot.

  • Parking Management: Parking management is the action of setting strategies, goals and actions to optimize the effectiveness of a parking lot. It includes parking payment and permit management. Parking payment is how payment is made for parking in a specific location, whether that be on-street or off-street. This includes paying through an mobile application, using paystations, and any other one-off payment methods. Permit management is used to ensure proper permits are being used in various parking applications, whether it be on-street or off-street (in lots).

  • Perimeter Protection:

  • Traffic Monitoring: Traffic management is the organisation, arrangement, guidance and control of both stationary and moving traffic, including pedestrians, bicyclists and all types of vehicles. Its aim is to provide for the safe, orderly and efficient movement of persons and goods, and to protect and, where possible, enhance the quality of the local environment on and adjacent to traffic facilities.

  • Transaction monitoring: Transaction Monitoring involves identifying suspicious transactions and viewing the corresponding video and other evidence related to each transaction to figure out if any further investigation is needed.

  • Video Analytics: Video analytics is the software technology used to analyze video for specific information about its content. Examples of video analytics include counting the number of people crossing a line, detection of unattended objects, or the direction of people walking or running.

  • Visualization and monitoring: Visualization and monitoring refers to PSIM-like integrations like solutions utilized by monitoring stations outside of the end user's environment to monitor cameras and alarms without the using the Security Center UI.

  • Workflow management: Workflow management includes integrations enabling automation and synchronization of data coming from/to workflow/tasks/communication systems (for example: Jira, Slack, internal workflow solutions).

  • Workforce management: Workforce management includes integrations enabling automation and synchronization of data coming from/to HR and related systems (for example, Workday).