Integrated Voice Calling Gives Synergy Users Comms Control

Synectics’ Synergy 3 command and control platform is now integrated with Swyx unified communications software, enabling security/surveillance operators to make and receive calls as part of rapid response protocols.

The SwyxWare integration effectively makes Synergy 3 a universal communications portal for the host organization. With Synergy functioning as a single, unified platform and one audio device (such as a telephone or headset), operators can communicate with users of any other SIP / VOIP connected device on the network, including the legacy telephony systems, along with SIP conformant PA systems and Help Points.

Synergy 3 already offers integrated surveillance video, data and alarm management. The addition of integrated voice calling is a natural progression – one that Synectics’ Product and Technology Director, David Aindow, feels will particularly benefit transport, high security, critical infrastructure, oil & gas and other public space settings where rapid response to issues, threats or accidents is critical.

David said, “Synectics’ product development ethos has always focused on open architecture – on embracing third party integrations that offer real, practical benefit to our customers. SwyxWare makes a perfect example of this by offering us connectivity to SIP / VOIP enabled audio systems.

“In the event of an imminent threat or actual incident, control room operators can utilize the voice client in Synergy 3 to alert staff, response teams and also external agencies such as the emergency services. The integration also enables automated situational reports in response to calls (for example from a repair team fixing a machinery malfunction) to be fed back through the system and logged as part of audit trail data.

“Many of our customers operate in mission critical conditions where the speed of response can be the difference between a minor incident and a major safety or security breach. The ability to blend situational awareness with audio functionality is an asset and helps customers achieve response efficiencies.”

The SwyxWare integration complements Synergy 3’s emergency and operational response workflows which automatically guide control room operatives through correct protocols on detection of specific threat or incident scenarios.

In addition to manually initiated voice calls, the system can be pre-programmed to generate automated calls if specific alarms or alerts are triggered. For example, the solution could be set-up to immediately call police in the event of a perimeter breach or if ‘left items’ are detected such as abandoned cases at a train station or airport.

Mark Russell, director of operations UK & Ireland at Swyx commented, “We are delighted that Synectics has decided to integrate SwyxWare into its Synergy command and control platform. Unlike other unified communications solutions that are fixed or proprietary, Swyx is based on an open platform structure that enables businesses like Synectics to offer their customers added value by reflecting and accommodating distinct communications needs – in this case, needs specific to protecting secure and often hazardous environments.”

At present, the Synergy/SwyxWare integration is focused on communication between ‘traditional’ comms devices such as mobiles, landlines, laptops and tablets, but as

Swyx is compatible with any IP based application, this technology base may include devices such as IP cameras, public address and door entry systems.

Featured

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3