U.S. Correctional Facilities Use NICE Systems IP Video Technology

NICE Systems has received follow-on orders from a large-scale U.S. corrections operation for its NiceVision IP-capable video surveillance solution. NICE received the NiceVision orders for four additional sites of a large-scale U.S. corrections operation.

Including these sites, NICE security solutions will now be deployed in a total of 56 of the operation’s corrections sites around the country. The state-of-the-art NICE video surveillance solutions, which will replace competitive products, are equipped to capture video from IP and megapixel cameras, a key feature for the corrections operation as it begins its migration to IP video surveillance.

Among the world’s largest prison systems, managing an inmate population in the hundreds of thousands, the large-scale corrections operation has been a NICE customer for close to a decade, with more than 10,000 video surveillance cameras currently recorded and managed using NICE technology.

The operation’s primary mission is to keep the outside population safe by securely confining inmates inside the prisons’ walls. NICE’s security solutions assist in this endeavor by enabling real-time monitoring, event detection and video recording of virtually every area that needs to be secured -- from outside prison yards to inside cafeterias.

With more modern IP cameras becoming part of its video surveillance mix, the large-scale corrections operation has decided to invest in NiceVision NVRs to better manage its IP migration. Two of the sites covered by the new orders will utilize NiceVision NVR solutions to leverage existing infrastructures while migrating to IP. The customer will benefit from the ability of NiceVision NVR to seamlessly manage analog and IP cameras on a single platform.

Powered by advanced analytics, NICE’s intelligent solutions also provide real-time insight and proactively alert to security situations. Integration between NiceVision and alarming systems, such as perimeter fence alarms, means corrections security operators get visual alerts and automatic video verification when virtual perimeters are breached. Integration with intercom and door control systems enable automatic visual verification when prisoners are escorted or transferred through gated areas.

“Very few operations face greater security risks or have more stringent security requirements than correctional facilities,” said Chris Wooten, president of the Security Division Americas of NICE. “NICE is especially honored that this large-scale corrections operation, a customer with whom we’ve had a long-standing relationship, continues to entrust its security needs to NICE.”

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3