NICE Interoperable With DVTel’s Latitude NVMS

NICE Systems Ltd. recently announced that it is continuing to advance its Open Situation Management initiative for multi-sensor security deployments. As part of the initiative, NICE Situator will be interoperable with the latest version of DVTel's Latitude NVMS video management system.

NICE Situator already has more than 150 gateways to different security and safety systems, including video surveillance, communication devices, access control, intrusion sensors, fire and safety, geo-location, building management, web feeds, and data bases.

Combined with DVTel's Latitude NVMS, NICE Situator can further enable organizations to employ a broad number of video surveillance technologies as a single, tightly integrated situational awareness solution. Events and behaviors that can be communicated between NICE Situator and DVTel's Latitude NVMS include viewing of live and recorded video, enhanced with metadata; integrated geographical information system (GIS) and video solution (geographical orientation-related events); video-related alarms to trigger a NICE Situator response; and zone management, among others.

The combined DVTel Latitude NVMS and NICE Situator solution is installed at high-end government security facilities and sporting/gaming events.

"We are excited about cooperating with NICE on an interoperable, open solution," said Eli Gorovici, president and CEO of DVTel. "The combination of our capabilities enables security focused organizations to benefit from DVTel's cutting-edge IP video management and video analytic solutions, along with NICE Situator's innovative capabilities for correlating data from diverse security, safety and operational systems. This is a great example of how DVTel's rich and flexible API set supports our mission work in various situations with many 3rd party solutions."

"The cooperation between NICE and DVTel reflects our commitment to the market to continue to ensure the interoperability of NICE Situator with leading security, safety and management solutions," said Israel Livnat, president, NICE Security Group. "By actively promoting the adoption of standards industry-wide NICE enables security organizations and system integrators to choose the components of a security solution that best meet their safety and security goals."

Featured

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.