You're in control wherever you are. Set up, configure, manage and control individual devices or whole sites. View, track and configure events as they occur or adjust device parameters based on smart analysis of previously recorded incidences. As long as you have internet access, the cloud-based control center is always with you.
Be it just one device, one site or thousands – it's just as easy to be in control anywhere in the world.
Artificial intelligence analyzes all events before triggering alarms and the False Alarm Assistant stops false alarms from reoccurring.
Easily manage multiple sites with separate parameters and schedules no matter how far from you or apart they are.
Keep using your current monitoring system as we easily integrate with industry-leading alarm and video management platforms.
Before sending an alarm, all received images are analyzed by our proprietary machine learning algorithms. An alarm is sent only when the artificial intelligence determines that an image contains an actual intruder or threat as specified by alarm conditions.
Remotely arm and disarm single devices or whole sites through the cloud center or mobile app.
Define an alarm trigger area and leave auto-detection off for the rest of the view.
Group devices by locations or by whole sites and manage the groups as a unit.
The comprehensive system dashboard keeps you up to date. Quickly view and manage all important parameters and use the statistics to improve system performance.
Set siren durations, trigger them manually, enable auto-sirens and assign devices that trigger sirens while leaving others sending silent alarms.
Configure the system to differentiate between people, cars, vans, trucks, motorbikes etc. and non threatening activations.
Machine learning algorithms analyse all received images and identifies a real threat. In case of multiple false alarms with similar parameters, artificial intelligence automatically adjusts the Detector’s settings to compensate for the false readings.
No more false alarms or security breaches due to forgotten access codes, lost remotes or keycards. Arm and disarm devices or a whole site with a simple and secure app. Authorize new users to access the system in minutes. Revoke access to users, who are no longer authorized the moment it happens.