pivot3 logo

Pivot3 Delivers Real Time Access and Control to Mission-Critical Video Surveillance Environments

Major update offers security teams higher video stream density as well as reduced cost per desktop and video stream resulting in lower TCO and improved situational awareness.

Pivot3, a leading provider of intelligent infrastructure solutions, today announced the Virtual Security Operations Center (Virtual SOC), designed to address the need for security teams to access client workstations running video surveillance and other related systems in multiple locations without using expensive, dedicated client workstation hardware. With the Pivot3 Virtual SOC, security teams can now get fully functional security workstation capabilities – including video surveillance, access control, PSIM, and other security-related systems – on more devices, more securely and more cost effectively than desktop workstations.

Mission-critical security environments require remote and immediate access to video and other security data coming from cameras and devices at multiple locations to improve incident response times and situational awareness. Until now, however, these type of security operations centers have relied on dedicated, expensive physical workstations to process video streams and integrated security data, which require extremely high levels of compute power and exposes data to potential unauthorized access. Furthermore, physical workstations lack critical fail-over and high availability capabilities and are cumbersome to manage and administer.

The Pivot3 Virtual SOC delivers fully functional client workstation capability to any device including low-cost thin/zero clients, remote client PCs and laptops, video walls and mobile devices. Replacing expensive graphics-enabled workstations with flexible, secure thin- and zero-clients reduces upfront capital equipment costs and on-going maintenance and management expenses. Video data is stored and secured in the Virtual SOC’s central storage system while only a secure, encrypted desktop image is streamed to the remote device, ensuring that all sensitive information remains protected and secured at the central host site. This also enables the security team to share video with outside agencies and organizations in a more immediate, secure and bandwidth-efficient fashion. The Pivot3 Virtual SOC works with any video management software, regardless of brand.

“Security teams must have the ability to access video and related systems securely on any device, including mobile clients, to facilitate a faster and more intelligent response to an incident,” said Brandon Reich, Vice President, Security and IoT, Pivot3. “The Pivot3 Virtual SOC delivers virtualized video workstation capability that provides better security, faster remediation and a rich mobile experience for enhanced situational awareness, and provides compelling economics since it eliminates the need for expensive, dedicated workstations.”

Organizations with distributed locations such as university, corporate, and medical campus environments, airports, safe cities, casinos, entertainment complexes, and correctional facilities all benefit from high-performance, virtual security workstations to provide real-time insight in the event of an incident. A security manager or agency can leverage the Pivot3 Virtual SOC to deliver real-time, fully functional security systems to any mobile device in use by distributed security personnel, reducing their risk through better situational awareness and faster response.

“Within mission-critical security environments, organizations require a scalable and easy-to-manage solution that maintains the integrity of mission-critical video and data,” said Todd Brown, President, Affinitech, Inc. “The Pivot3 Virtual SOC exceeds all expectations by delivering a cost-effective replacement for physical workstations, improving ROI while increasing operator visibility.”

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3