Brivo Systems unveils its latest Brivo OnAirSM version 10.11 at ASIS 2013
Brivo Systems unveils its latest Brivo OnAirSM version 10.11 at ASIS 2013

Brivo Systems LLC, leader in cloud applications for security management, recently announced the company’s release of Brivo OnAirSM version 10.11, featuring an updated User Interface (UI). Brivo OnAir is the new brand name for the former Brivo ACS WebService cloud-based access control management solution. With the introduction of this updated interface, Brivo further extends its leadership in the cloud-based access control and video surveillance space by offering a more visually rich and responsive experience for its customers. The Brivo OnAir interface is streamlined and designed for usability, reducing the learning curve and simplifying both system deployment and day-to-day security management. For the redesign project, Brivo engaged a team of user experience (UX) experts. The team conducted hundreds of hours of interviews with current and prospective users to determine how they worked. They incorporated this information into profiles of user “personas” in order to bring focus to ensuring that the resulting interface responded to the needs of Brivo’s users. This first phase of the interface re-design incorporates the key findings from this process and sets the stage for additional enhancements to follow. “This is an exciting day for Brivo, our channel partners and end-users,” said John Szczygiel, Executive Vice President. “The Brivo OnAir name better captures the essence of our cloud-based solution. The revamped UI directly reflects feedback from our users and further demonstrates our commitment to continuous improvement. What's more, this major upgrade is delivered automatically and without charge to all of our users. That’s cloud computing, that’s Brivo OnAir.” Among the features the Brivo OnAir version 10.11 offers: A rich user experience that maximises video and access control management. A new top-level video tab provides immediate access to recorded and live Online Video Recorder (OVR) video. Simplified search capability provides a comprehensive view of access and video motion events on a timeline display; events are visually represented and prioritised using color coding, intuitive icons and other visual cues. The system landing page is optimised to provide shortcuts for everyday operations:  create a new user, find a user or a card, change passwords and search video all on this page—saving time navigating through multiple screens.

Add to Compare

Browse Access Control Softwares

Access control software - Expert commentary

Smart Offices: How is mobile ID changing the way we access the office?
Smart Offices: How is mobile ID changing the way we access the office?

If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organisations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s only been sped up by the pandemic. It’s true that many businesses are still very much focused on remote working, although many are now starting to implement new-and-improved strategies that are better suited to protect the workforce moving forward. Mobile ID systems As the next normal becomes clearer, businesses will be reviewing procedures such as access control, occupancy monitoring, reducing touch points and tracking visitors. Mobile ID systems are ideally suited to this task. But what are the key reasons for considering such a setup in 2021? But why is this new technology so well-suited to future-proof your physical access system, and why is it becoming so popular? Eradicating outdated legacy credentials Have you seen just how vulnerable outdated Proximity card technology can be? Low-frequency 125kHz cards can be cloned in a matter of seconds with the use of cheap, readily available tools. Despite their weaknesses, they are still used by a huge majority of businesses – big and small. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential Replacing such a system with a mobile-enabled system is one of the best ways to increase security ten-fold. Thanks to a cloud-based infrastructure, mobile ID offers best-in-class security and cryptography. All smartphones include two industry-standard features that make them perfect for operating a secure, contactless credential. Bluetooth Smart and NFC (Near Field Communication) make them the best product to operate such a credential via a secure app. If you’re looking for best-in-class security in 2021, mobile access is most definitely the way forward. Removing touch points across the business Reducing touch points and the adoption of touchless facilities has become a key priority for businesses in the wake of COVID-19. Even as businesses start to return to the office and operate a home/office split, it will be imperative that unnecessary contact is kept to an absolute minimum between staff. The traditional issuance of identification and access control credentials can pose problems in this regard. Facility and security managers who are responsible for onboarding and processing ID have done the process face to face. Mobile access makes it possible to carry this process out without people coming into direct content. First, the security manager has access to a secure portal, allowing them to create, manage and edit credentials anywhere. They can upload and remotely transfer mobile ID and access control credentials directly to users’ smartphones over the air. Via the secure app, users can view and see their credentials and immediately begin using it for ID and access control by simply placing their smartphone over card readers. Enabling a more flexible way of working The way in which we work has changed for good. Even as people more people return to the office in 2021, a majority of businesses will be operating a home/office split indefinitely. This once again reinforces the need for a smarter, more adaptable onboarding system. Implementing mobile ID is the perfect way of doing this: over-the-air delivery of credentials and security data is now a given, helping businesses create the perfect balance between the home and the office. No longer do people have to come into the office for the onboarding process. Increasing convenience and user experience More often businesses are realising the value mobile ID can have for enhancing the work experience as well as security Ok, so mobile ID is the perfect way of increasing security and adapting workplaces to a post-COVID way of working. And we’ve not even touched on the most obvious advantage yet: Convenience. How many times have you forgotten your ID card? We’re sure it’s more times than you forget your smartphone. These powerful processors have become intertwined with the way we carry out tasks on a daily basis. They’re so vital that people will soon notice if they’ve forgotten it. From an employee’s perspective, mobile ID and access control is simple, convenient and extremely user-friendly. More and more businesses are realising the value mobile ID can have for enhancing the work experience as well as security. From the employer’s perspective, mobile ID means it’s easier for administrators to manage access and credentials. Future-proofing access control now will ensure that in the longer term, mobile ID is well worth the investment. The annual expenditure of printing ID cards and purchasing credentials can be vast, while reissuance costs can also quickly add up for larger organisations. These issues are a thing of the past for businesses using mobile ID. Mobile ID perfect tool for 2021 and beyond Until mobile ID, new and improved credentials’ main focus was on increasing security. Mobile ID not only delivers that, but it also provides a more convenient way of accessing the office in a way that’s perfectly suited to returning to the office in 2021. If there was ever a time to upgrade, now is the time. Summing up, mobile access is changing the way we access the office by: Eliminating weak links in security systems such as outdated legacy card technologies Eradicating the need for touch points across multiple areas of the workplace Enabling a smarter, more flexible approach to onboarding Increasing convenience – for both employers and employees.

We have the technology to make society safer – how long can we justify not using it?
We have the technology to make society safer – how long can we justify not using it?

While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras  Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable.   Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.  

Unlocking human-like perception in sensor-based technology deployments
Unlocking human-like perception in sensor-based technology deployments

Like most industries, the fields of security, access and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation. In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have access to accurate data generated by best-of-class solutions irrespective of the sensor modality. And, they need to be able to easily deploy such solutions, at the lowest capex and opex, with the knowledge that they can be integrated with preferred VMSs and PSIMs, be highly reliable, have low install and maintenance overheads and be well supported. With these needs in mind, camera and computer vision technology providers, solutions providers and systems integrators are forging ahead and have created exemplary ecosystems with established partnerships helping to accelerate adoption. At the heart of this are AI and applications of Convolutional neural networks (CNN), an architecture often used in computer vision deep learning algorithms, which are accomplishing tasks that were extremely difficult with traditional software. But what about 3D sensing technologies and perception? The security, safety and access market have an additional crucial need: they must mitigate risk and make investments that deliver for the long-term. This means that if a systems integrator invests in a 3D sensing data perception platform today, it will support their choice of sensors, perception strategies, applications and use cases over time without having to constantly reinvest in alternative computer hardware and perception software each time they adopt new technology or systems. This begs the question - if the security industry knows what it needs, why is it yet to fully embrace 3D sensing modalities? Perception strategy Intelligent perception strategies are yet to evolve which sees designers lock everything down at the design phase Well, one problem facing security, safety and access solutions providers, systems integrators and end-users when deploying first-generation 3D sensing-based solutions is the current approach. Today, intelligent perception strategies have yet to evolve beyond the status quo which sees designers lock everything down at the design phase, including the choice of the sensor(s), off-the-shelf computer hardware and any vendor-specific or 3rd party perception software algorithms and deep learning or artificial intelligence. This approach not only builds in constraints for future use-cases and developments, it hampers the level of perception developed by the machine. Indeed, the data used to develop or train the perception algorithms for security, access and safety use cases at design time is typically captured for a narrow and specific set of scenarios or contexts and are subsequently developed or trained in the lab. Technology gaps As those in this industry know too well, siloed solutions and technology gaps typically block the creation of productive ecosystems and partnerships while lack of commercial whole products can delay market adoption of new innovation. Perception systems architectures today do not support the real-time adaptation of software and computing engines in the field. They remain the same as those selected during the design phase and are fixed for the entire development and the deployment stage. Crucially, this means that the system cannot deal with the unknowns of contextually varying real-time situations where contexts are changing (e.g being able to reflex to security situations they haven’t been trained for) and where the autonomous system’s perception strategies need to dynamically adjust accordingly. Ultimately, traditional strategies have non-scalable and non-adaptable competing computing architectures that were not designed to process the next generation of algorithms, deep learning and artificial intelligence required for 3D sensor mixed workloads. What this means for industries seeking to develop or deploy perception systems, like security, access and safety, is that the available computing architectures are generic and designed for either graphic rendering or data processing. Solutions providers, therefore, have little choice but to promote these architectures heavily into the market. Consequently, the resulting computing techniques are defined by the computing providers and not by the software developers working on behalf of the customer deploying the security solution. Context…. we don’t know what we don’t know Perception platform must have the ability to adjust to changes in context, thereby improving the performance post-deployment To be useful and useable in the security context and others, a perception platform must have the ability to adjust to changes in context, can self-optimise and crucially, can self-learn, thereby improving the performance post-deployment. The combinations of potential contextual changes in a real-life environment, such as an airport or military base, are innumerable, non-deterministic, real-time, often analogue and unpredictable. The moment sensors, edge computing hardware and perception software are deployed in the field, myriad variables such as weather, terrain as well as sensor mounting location and orientation all represent a context shift where the perception systems’ solution is no longer optimal. For example, it might be that a particular sensor system is deployed in an outdoor scenario with heavy foliage. Because the algorithm development or training was completed in the lab, the moving foliage, bushes or low trees and branches are classified as humans or some other false-positive result. Typically, heavy software customisation and onsite support then ensue, requiring on-site support by solutions vendors where each and every sensor configuration needs to be hand-cranked to deliver something that is acceptable to the end customer. A new approach for effective perception strategies Cron AI is building senseEDGE, which represents a significant evolution in the development of sensing to information strategy.  It is a 3D sensing perception and computer vision platform built from the ground up to address and remove the traditional deployment and performance bottlenecks we’ve just described. senseEDGE is aware of the user application reaction plan indication to trigger an alarm or turning on a CCTV camera The entire edge platform is built around a real-time scalable and adaptable computing architecture that’s flexible enough for algorithms and software to scale and adapt to different workloads and contexts. What’s more, it has real-time contextual awareness, which means that the entire edge platform is, at any time, aware of the external context, the sensor and sensor architecture and the requirements of the user application. Furthermore, when it produces the object output data, it also aware of the user application reaction plan indication, which could be triggering an alarm or turning on a CCTV camera when a specific action is detected. This approach turns traditional perception strategies on their head: it is software-defined programmable perception and computing architecture, not hardware-defined. It is free from the constraints imposed by traditional CPU or GPU compute dictated by hardware architecture providers and not limited to the perception built defined during design time. And, being fully configurable, it can be moved from one solution to another, providing computation for different modalities of sensors designed for different use cases or environments, and lower risk of adoption and migration for those developing the security solution.  Future perception requirements senseEDGE is also able to scale to future perception requirements, such as algorithms and workloads produced by future sensors as well as computational techniques and neural networks that have yet to be invented. Meanwhile, latency versus throughput is totally software-defined and not limited by providers of computing architecture. Finally, contextually aware, it is fully connected to the real world where the reflexes adapt to even the subtlest changes in context, which makes all the difference in time and accuracy in critical security situations. This is how CronAI sees the future of perception. It means that security and safety innovators can now access and invest with low risk in a useable and scalable perception solution that can truly take advantage of current and future 3D sensor modalities.

Latest Brivo Inc. news

Digital Monitoring Products, Inc. (DMP) unveils cloud-based, stand-alone access control solution, X1 Series
Digital Monitoring Products, Inc. (DMP) unveils cloud-based, stand-alone access control solution, X1 Series

For access-only applications, security companies can now get exactly the features and functionality they need without wasting money on a more complicated system. DMP’s (Digital Monitoring Products, Inc.) new cloud-based X1 Series delivers a solution that’s simple to program, fast to install, easy to use and most importantly, it’s very reasonably priced. Cloud-based X1 Series “If you’re using Brivo, Prodatakey, OpenPath, Feenics or any other access control product, you owe it to your business to give the X1 a closer look,” said Jon Adams, Executive Director of Business Development at Digital Monitoring Products, Inc. (DMP), adding “The X1 is uniquely designed with combined features you can’t find anywhere else.” Network and cellular-based connectivity The cloud-based X1 Series is a stand-alone system that offers network and cellular-based connectivity The cloud-based X1 Series is a stand-alone system that offers network and cellular-based connectivity so that customers’ access control functions are never vulnerable to normal network outages. And, unlike other access offering, the X1’s optional cellular module can be used as the primary or backup for an entire system, so as to ensure constant communication with the Cloud. DMP’s cloud-based X1 Series also provides: Easy scaling from single- to multi-site applications: The X1 Series can support up to 1,000 doors on a system in the Cloud. To add more doors locally without adding multiple X1s, the X1-8 is a cost-effective solution. Even if a system has multiple buildings that are managed from one location, all of the controllers are tied to one cloud-based administrative portal. Secure access control system Even if a system’s X1s are not physically connected, system managers can add users to groups for access permissions that work across an entire system. They can also create and manage any number of custom rules to send notifications or trigger outputs on certain events. A rule can be created to trigger a lockdown across an entire system, for instance, if one access control door is forced open. Add-on module for PoE: A small and inexpensive item for technicians to carry in their trucks and have ready depending on what they encounter in the field. This allows them to easily deploy powered devices in locations without electrical circuitry. Support for OSDP and Wiegand reader protocol: A few other access control products have the OSDP option, but only DMP offers OSDP for any and all readers when your customer needs enhanced security. Cloud-based administrative portal and Virtual Keypad Programming the X1 is only a few simple steps, all through DMP’s cloud-based administrative portal making installations quick and easy. And for customers’ convenience, Virtual Keypad streamlines their ability to remotely monitor and manage their DMP systems based on their security profile. Even if customers have a DMP intrusion system for home security and an X1 Series for their businesses, rather than using two or three separate apps, they can manage their access control and intrusion and even video systems, all with the powerful and intuitive Virtual Keypad app or desktop solution.

Brivo partners with Reliance High-Tech to accelerate growth of cloud-based access control to enterprises across UK and Europe
Brivo partners with Reliance High-Tech to accelerate growth of cloud-based access control to enterprises across UK and Europe

Brivo announces a partnership with Reliance High-Tech, a renowned independent security systems integrator serving the UK and Europe. As cloud-based access control adoption continues to grow across Europe, Reliance High-Tech will add Brivo to their service offering, delivering on their commitment to bring key technology innovation and excellence in customer support to the market. Both companies share a passion for innovation, forward-thinking technology and a record of high standards in customer service and support. With 20 years of experience delivering cloud-based security, Brivo replaces on-premises solutions for single-site, multi-site and enterprise businesses across multiple industries. Cloud-based security There are three key benefits of upgrading to a cloud-based system including the ability to access one’s sites at all times from anywhere, save their security professionals time and money by giving them more efficient tools, and using data to make better informed decisions about security requirements. Adding Brivo to our portfolio allows us to bring best-in-class cloud-based access control options to customers" “The global pandemic has elevated the demand for cloud-based security that is accessible from anywhere, mobile enabled, increases efficiency and is affordable,” says Steve Van Till, CEO at Brivo. “Partners like Reliance High-Tech are helping to drive the adoption of cloud solutions to provide all commercial properties and multifamily residences better solutions to protect people and property.” Cloud-based access control “We’re really excited to partner with Brivo,” said Tom Clarke, Sales & Marketing Director for Reliance High-Tech. “Across our various markets, we’ve seen an opportunity to deliver more agile and robust security solutions also noting that cloud-based access control demand has been accelerated by the pandemic. Adding Brivo to our portfolio allows us to bring best-in-class cloud-based access control options to customers.” “Reliance High-Tech is an important partner to Brivo,” said Jon Polon, Senior Director of Business Development for Brivo. “As the market for cloud-based access control continues to grow internationally, partners like Reliance High-Tech can engage with enterprise businesses to help them realise the benefits of cloud computing.”

Eagle Eye Networks raises series E funding from venture capital firm Accel to expand business around the world
Eagle Eye Networks raises series E funding from venture capital firm Accel to expand business around the world

Eagle Eye Networks, the pioneer in cloud video surveillance, has raised $40 million of Series E funding from venture capital firm Accel to continue its growth and expand its technology leadership. Eagle Eye is leveraging artificial intelligence (AI) on its true cloud platform to dramatically reshape video surveillance and improve safety, security, operations, and customer service for businesses around the world. Video surveillance systems have multiple security features, such as motion detection and standard analytics. However, these systems require either monotonous monitoring or a meticulous manual review after each triggered event to extract useful information. Cloud video surveillance Similarly, business operations analytics are still in early development. “There is a tremendous opportunity to leverage AI and alter the very nature of video surveillance,” said Dean Drako, Founder and CEO of Eagle Eye Networks. “Eagle Eye Networks now has the means and the technology to enable cloud video surveillance to transform how companies manage security and business operations, in the same way self-driving/electric cars are transforming transportation.” Smart cloud video surveillance with privacy and cybersecurity protections will make the world much safer" “Ultimately, smart cloud video surveillance with appropriate privacy and cybersecurity protections will make the world much safer, for example: detecting dangers such as weapons, erratic driving, active robberies, and traffic accidents. Furthermore,” continued Drako, “It will help businesses provide better service by reducing wait lines, ensuring displays are organised and stores clean, and assuring product quality.” Deploying new analytics Sameer Gandhi, Partner at Accel added, “Eagle Eye Networks pioneered the video surveillance industry’s move to the cloud, and AI applications will drive the industry’s next transformation. Eagle Eye is in the pole position to make this happen. Its true cloud technology puts Eagle Eye in a unique position to instantly deploy new analytics breakthroughs. Dean Drako’s track record, proven with Eagle Eye and previously as founder of Barracuda Networks, speaks for itself.” The Eagle Eye Cloud Video Management System (VMS) is a simply smarter cloud video surveillance solution, purpose-built to help businesses improve safety, security, operations, and customer service. Tens of thousands of companies in more than 90 countries around the globe have moved their video surveillance to the cloud with Eagle Eye VMS. Comprehensive central management Customers choose Eagle Eye Cloud VMS for its comprehensive central management, cloud reliability and redundancy Customers, including multi-family residences, smart cities, schools, hospitals, hotels, logistics, restaurants, and retail shops trust Eagle Eye for actionable business intelligence and proactive security. Customers choose Eagle Eye Cloud VMS for its comprehensive central management, cloud reliability and redundancy, cost savings, and its open API video platform that provides a vast number of third-party integrations. Customers appreciate Eagle Eye’s inherent cyber secure design and extensive video encryption to protect their data and privacy. The Eagle Eye Cloud VMS works with thousands of industry cameras and does not require customers to ‘rip and replace’ their existing infrastructure. Eagle Eye Networks, together with its partner Brivo, provide a seamless solution for cloud video surveillance and facility access control. Brivo is a pioneer in cloud facility access control. Cloud video security The Eagle Eye API allows for seamless integration with partners like Brivo and others making Eagle Eye Cloud VMS the only platform robust enough to power the future of video surveillance. Eagle Eye Networks has grown rapidly in EMEA both organically and through the 2017 acquisition of Camera Manager whose founders, Rishi Lodhia and Tijmen Vos launched the first true cloud video security offering in 2004 and continue to drive the company's European growth and innovative product development. The Eagle Eye Networks European headquarters in Amsterdam, provides an attractive mix of elements crucial for success, including innovative technology founders who share Drako’s bold vision, drive and demonstrated leadership. “We were the first to introduce cloud video surveillance to the market and this step is fast tracking our growth in Europe, the Middle East and Africa,” said Rishi Lodhia, Eagle Eye Networks Managing Director for EMEA. Video surveillance industry The adoption of true cloud video surveillance and powerful AI is driving an acceleration of the business globally" “The adoption of true cloud video surveillance and powerful AI is driving an acceleration of the business globally, but especially in EMEA. It gives us the ability to help give businesses the intelligence they need and protect people’s privacy without compromising safety and security.” The company expects to add roles across Europe to support the growth and customer success with the adoption of the cloud and AI powered video surveillance. “In more than two decades in the video surveillance industry, I have heard people talk about revolutionising the market and taking it to the next level, but only Eagle Eye Networks has truly delivered on that promise,” added John E. Mack III, Executive Vice President, Co-Head of Investment Banking at Imperial Capital. “While Eagle Eye Networks’ vision as the first cloud native solution was compelling previously, the changes 2020 brought about through business disruption related to COVID-19 make Eagle Eye’s products and services even more desirable. Eagle Eye’s focus on the customer and commitment to innovation create a foundation that makes its cloud and AI enhanced offerings for video surveillance a focus for security specific executives and the C-suite alike.”

Related white papers

Cloud video and smart cities

Physical access control in higher education

A brief history of access control credentials