Proximex Delivers Surveillint Essentials

Proximex, part of the Security Products business unit of Tyco, announces the introduction of Surveillint Essentials, an entry-level physical security information management (PSIM) solution for those seeking the latest technology in an easy-to-use, quick-to-implement format.

Ideal for users looking for an introductory, yet true PSIM offering, Surveillint Essentials is designed for small- to mid-size environments with existing video, intrusion, access control and fire systems. Through an integration module configuration wizard, users can easily configure and deploy integrations with other security, safety and video surveillance systems. A simple install package allows the installation of the product within minutes.

“We recognize that customers are seeking ways to improve their situational awareness and response time by consolidating multiple systems, yet they may not be ready to invest in the full PSIM enterprise solution,” said Chatura Liyanage, group product manager for Proximex.  “Surveillint Essentials is the bridge to start on that journey with a low cost, easy to deploy, easy to use package that allows them to leverage their existing security technology.”

Built on the Proximex Surveillint Enterprise Product, Surveillint Essentials can be upgraded to the full enterprise PSIM solution when needed without having to completely reconfigure the system, so that your existing investments are not wasted.

With Surveillint Essentials, sites enjoy improved operational efficiency with a solution that combines key security systems into a single operator console.  The intuitive user interface enables operators to visualize various resources including sensor and alarm locations, access live and recorded video and execute sensor commands directly from hierarchical maps.

Surveillint Essentials also provides comprehensive video management capabilities, allowing users to view live and recorded video from multiple systems through a single interface, take video snapshots, generate video incident report packages, and configure video guard tours.

Incident assessment and response is improved with Surveillint Essentials because operators only see the relevant details from multiple sensors when an alarm is sounded. From there, they can hone in on the important factors such as alarm details and contextual information while recording operator notes and producing incident reports.

Surveillint Essentials will also be a valuable addition to integrators to offer a higher value proposition to their customers.  With a solution that is easy to configure and deploy, and with out-of-the-box integrations available to the leading security systems, Surveillint Essentials complements integrators’ existing line cards while providing them with

new product revenue opportunities. It also provides integrators and others with the flexibility to develop their own unique solutions based on the Surveillint open integration platform.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3