videoNEXT, SightLogix Announce Collaboration
videoNEXT, a developer of security management solutions, recently announced in a collaborative effort with SightLogix Inc, that the two companies have completed the implementation of a video surveillance system for a high-security military installation.
SightLogix, the client's integrator and videoNEXT developed an perimeter surveillance system with a unique camera layout that provided full coverage of both the perimeter and the pedestrian area of this high security military site located in a remote, wooded environment. SightLogix's cameras offer embedded outdoor analytics and object detection. videoNEXT's Security Knowledge Manager (SKM) handles the video management and tactical display. SKM ingests the analytic metadata from the SightLogix cameras and automates the tracking of separate color and thermal imagers to follow the objects that have been detected by the cameras.
"In the past, video analytics for these types of projects have been proven ineffective," said David Marra, chief technology officer at videoNEXT. "However, with the power of SightLogix's outdoor analytic capabilities, we are able to automate camera positioning and object tracking with never before achieved accuracy and efficiency, providing an innovative and reliable video surveillance, force multiplier to this sensitive military post."
"This high profile location presented many challenges from low lighting requirements and a dual perimeter fence to its significant budget constraints and the high consequence level if the system failed," said Larry Barfield, vice president of Government Programs for SightLogix. "Our team was able to install, test and conduct training on the system within just weeks and do it within the client's budget. The new, highly reliable surveillance solution enables the facility to effectively and efficiently detect and respond to perimeter breaches."
videoNEXT's SKM is an open, standards-based software solution that works with almost any IP, digital or analog camera, runs on any Intel or compatible server and uses an organization's existing security and data infrastructure.