Services


2_1

Fast evolution of information technologies, especially for the last decade, gives a big boost to development video processing and video storage systems. The modern video management system (VMS) is not the only "advanced and multifunctional DVR" but an entire software and hardware platform with built-in software development kit (SDK) to control, administrate and proccess videodata. And it doesn't depend on at what physical location cameras, videoserver, storage system, security workstation are installed.

Implementation of "open platform" concept allows to expand base functionality of VMS provided by its vendor by integration with solutions of other vendors. The most demanded ones are videoanalytics solutions that allows to automize day-to-day procedures performed by security personnel such as:

  • Searching videoclip in video archive in according to certain criteria, e.g. object size, colour, movement paterns, etc.
  • Recognition of human faces, creating visitors datebase, searching videoclips with specific person, etc.
  • Recognition of car license plates, marks, signs and ads.
  • To control perimeter and zone intrusions, panic and disorder situations and many other things.

Another direction of videoanalytics is to use it as business and marketing tools: visitors counter, queue control, heat maps, etc.

In heterogeneous data networks typical for multi-sites companies the multi-cast technology to transfer videodata is actual. Multi-casting allows to bring down channel bandwidth requirements and to increase quality of transmitted video content.

Besides the above-mentioned techologies there are a lot of other significant technological solutions and aspects that are extremely important for modern video surveillance systems. This is competent installation of network attached storage (NAS); storage area network (SAN); virtualization technologies; correct choise of network acrhitecture and active network equipment and so on. Сomprehensive solutions of such objectives is our mission.

2_4 Security concept of any object is based on 3 principles:

  1. Hardware & software solutions
  2. "Human factor" (personnel)
  3. Organizational activities (set of rules and procedures to coordinate first two ingredients)

It's important to realize that even the most advanced and sophisticated security system cannot operate in stand-alone mode without interaction with human in one way or another. Otherwise effectiveness of such "stand-alone" system will go to zero in the end.

When we're talking about appropriate software & hardware solutions we mean continuous and closer integration of related security subsystems such as video surveillance, access control, intrusion detection, fire alarm, alert system, HVAC and so on.

"Open platform" concept comes now just in right time and allows multiple systems heterogeneous in its origin to be connected and act as an entire unit under unified control. It's way to increase system performance and quality of management as well as to reduce total cost ownership (TCO). VMS Open Platform makes it possible to create integrated security system of any complexity ranging from SOHO to multinational company.
2_5

Implementation of actual and advanced security solutions requires for the appropriate well-developed IT and engineering infrastructure.

Like building a house starts from steady and solid foundation the availability of basic IT and engineering infrastructure (SCS, power supply, cable trays, etc.) is indispensable for deployment of higher-level systems such as LAN, security systems, cable TV, multimedia content processing and delivery and others. For example, despite SCS history is several decades old and its technologies are worked out almost exactly - professional skills of contractor to design and install SCS stay important as it were before.

2_4

The situation may appear when specific project demands for specific approaches to achieving the objectives defined. Traditional methods are either not working or not cost-effective.

In this case it's possible to develop and implement tailored solutions for particular customer needs, for example, whether to write program code to generate statistic reports based on data taken from cameras (e.g. "heat maps") or to upgrade hardware to meet special customer requirements or to deliver and deploy specific solution not directly related to contractor expertise as a part of a single project and so on.

2[1]

In certain cases it's modernization of existing security, IT or engineering systems is more cost-effective.

The modernization is preceded with technical audit intended to analyse existing solutions; to identify system "bottle necks" and weakness; to make recommendations on how to modernize it or, possibly, to make full replacement of existing solutions.

When it is about new projects the initial stage is to formulate technical specification together with customer and prepare project documentation after feasibility study. It's important and required phases of work. Neglect of these phases leads to financial loss, failure to meet deadlines upto full abort of the project.

serv1

The lifecycle of solution includes not only stages of generating technical requirements, designing, delivery and deployment but stage of technical support and services. In certain cases this stage can be minimized and provided by customer himself (e.g. support of SCS). In other situations qualified contractor's personnel is required.

The fundamental difference between technical support and maintenance and fulfilment of contractor's obligations under standard vendor's warranty is clear and agreed criteria of service delivery: SLA - Service Levels Agreement. It's pre-defined time frames to accept customer's service request: ATSLA - Accept Time to SLA; time limits for contractor's specialist to come to customer's site: RTSLA - Response Time to SLA; time period assigned to complete customer's request: FTSLA - Fixing Time to SLA; reqular preventive works and several other.

Having SLA contract allows customer to minimize financial, institutional and image risks related to temporary non-operability or breakdown of different security systems, IT or engineering infrastructure.