Geutebruck

G SIM

G SIM

• Geutebruck announces G-SIM for security information generated by medium- to large-networked, video security systems.

• Complete flexibility for any number of networked workstations.

• Intuitive operation using individually-designed, site-plan-based, operator interfaces.

• Ideal overview thanks to the seamlessly-integrated, video wall solutions.

• Complete video stream management for live and recorded video.

• Efficient alarm management with site plans, video and all other relevant information.

• Comprehensive support for delegation for hand-over of event or alarm processing, the allocation of tasks and for switching internal system communication between users.

• Perfect data protection as a result of the flexible administration of user rights and the complete audit trail.

https://www.geutebrueck.com/index.php?PageId=13443&Culture=en_EN


    Featured

    New Products

    • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

      Connect ONE®

      Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    • AC Nio

      AC Nio

      Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

    • Camden CV-7600 High Security Card Readers

      Camden CV-7600 High Security Card Readers

      Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.