Honeywell creates open technology alliance to increase interoperability with third-party video systems
Honeywell creates open technology alliance to increase interoperability with third-party video systems

Honeywell has announced the Honeywell Open Technology Alliance, a group of global security manufacturers that will collaborate to help businesses more easily secure and protect their facilities by increasing interoperability between third-party IP systems. As part of the initiative, Honeywell will work with security manufacturers to integrate their IP cameras and systems with its flagship MAXPRO® VMS video management system, as well as make its own devices more-easily compatible with other vendors' management platforms.  The Honeywell Open Technology Alliance currently includes North America and European based manufacturers such as Milestone Systems, OnSSI, Heitel and IproNet Sistemas S.A. "Because security needs are becoming more complex and unique, we're seeing more companies and organisations today using technology from multiple manufacturers to create the solutions they require," said Don Roberts, Strategic Corporate Accounts, Honeywell Security Group. "The goal of the Honeywell Open Technology Alliance is to give these companies and their integrators more choices when designing their security systems, and to make the process easier."   Currently in use at several major sites, MAXPRO VMS simplifies security by helping personnel control video subsystems dispersed across multiple facilities, and by enabling IP and analogue systems to seamlessly work together. With MAXPRO VMS, security personnel only need to learn a single programme to control the various subsystems, which can include virtual switchers, multiplexers and monitors. MAXPRO VMS - which integrates with several high-profile Honeywell systems such as its Pro-Watch® security management system and Rapid Eye™ and Fusion digital video recorders - displays data to security staff through a customisable graphical user interface. This common user interface gives operators the advantage of a similar look and feel across the disparate video components.In addition to helping manufacturers integrate their products with MAXPRO VMS, Honeywell will offer software development kits (SDKs) to enable its growing portfolio of IP cameras to integrate with other third-party video management systems (VMS). "Honeywell strongly supports open architecture, and now our open technology alliance formalises our processes and commits additional resources to developing strategic relationships that will bring IP solutions to market faster and drive value for our customers," said Scott Harkins, vice president and general manager of Honeywell's Video Systems business.

Add to Compare
Honeywell spotlighted IP security at IFSEC 2008
Honeywell spotlighted IP security at IFSEC 2008

Honeywell focussed on integrated, IP-based security systems at IFSEC 2008.  The company showcased a range of security products and solutions including its new EQUIP™ Series IP camera family, ACUIX™ PTZ dome camera; Active Alert® video analytics suite; FUSION Automatic Number Plate Recognition (ANPR) software; Pro-Watch security management software and SmartPlus® Imprivata® Connector.  In addition, Honeywell promoted its Partner of Choice programme, which is designed to help systems integrators and installer companies leverage increasing public interest in digital and IP-based security.The products and solutions that took centre stage on the Honeywell Security stand this year were:EQUIP Series of IP cameras: Adopting the look of Honeywell's successful analogue camera line, the EQUIP Series is a new family of IP-enabled professional cameras.  The range includes indoor and outdoor pendant models, day/night body cameras and even a vandal resistant mini-dome. Crowning the EQUIP line is the new ACUIX PTZ dome camera, which features quick installation and set-up time.  The model provides superior images, faster response to events and tighter integration with Honeywell DVRs, DVM and intrusion devices.  The ACUIX dome features True Day/Night, 35X zoom lens, Wide Dynamic Range for difficult lighting situations and Electronic Image Stabilisation for improved image quality in unstable mounting situations.Pro-Watch security management software: Aimed at enterprises of all sizes, Pro-Watch management software incorporates access control, alarm monitoring, video badging and CCTV system interfaces.  The solution's wizards, shortcuts, and templates make it easy to install and use.  There are three editions of Pro-Watch - Enterprise, Corporate and Professional - which serve to meet a variety of security needs.SmartPlus Imprivata Connector: Designed for use with Honeywell's Pro-Watch system, the SmartPlus Imprivata uses OneSign™ Physical/Logical to provide a single point of authentication. It closes security gaps that exist when physical access control and IT network authentication systems live in self-contained silos.Active Alert video analytics suite: Designed to increase the efficiency of CCTV systems, the Active Alert suite automatically detects, analyses and classifies the behaviours of individuals and vehicles as they move through a scene, providing real-time alarms and search tools that enhance manned and unmanned video surveillance systems.  Active Alert also enables historic scene activity to be retrieved instantly for analysis.Fusion ANPR software: The Fusion ANPR system logs vehicles and their plate numbers in an application-rich database.  It enables the cost-effective detection, classification and retrieval of vehicle number plates in critical applications and is ideal for security and access control operations in environments including law enforcement, traffic control, car park management and access control, airports, hotels, city centre CCTV, ports of entry and military bases.Partner of Choice Systems Integrator Programme in the spotlightThe new generation of Honeywell products showcased at IFSEC will generate significant new business opportunities for the company's security installers and integrators across Europe.  Honeywell's Partner of Choice Systems Integrator programme is designed to help its installers and integrators leverage public interest in digital and IP security systems through the delivery of comprehensive product and sales training and a wide array of useful sales and marketing tools. "We want to pass along knowledge that will make our customers more successful in selling digital security," said Vineet Nargolwala, General Manager EMEA, Honeywell Systems Group.  "The security landscape is changing; it's moving from analogue to digital - and fast.  We have the solutions and training programmes in place now to enable systems integrators and installers to benefit immediately from the increasing interest."For more information visit www.honeywell.com/security/uk

Add to Compare

CCTV software - Expert commentary

Network operator fraud remains the biggest threat to the revenues of mobile operators
Network operator fraud remains the biggest threat to the revenues of mobile operators

As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.  In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.  Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.  Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”  Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”  “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”    Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.  Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”    A simple but effective fraud  Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes.  A primary risk is SIM Box fraud.  SIM Box fraud  SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal.  The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”  While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.   Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”    Is it illegal?  If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.  For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.”  “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”  Other telecommunications fraud  Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.  While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.  The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”  “The call starts as a dialled telephone call, but the user receives it within an OTT app.  If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”  Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”  According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”.  This is defaulted to “on” when the app is downloaded.  Only the most technologically savvy users would even know it was there.  Combatting the fraud against networks  Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud?  The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”  “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible.  This has led to a mindset where whatever the questions the answer is always more marketing promotions.”  A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.  An opportunity for the future  As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.” 

The automated future of retail and how to secure it
The automated future of retail and how to secure it

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

How AI and security guards work together using video analytics
How AI and security guards work together using video analytics

How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilise. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.

Latest Honeywell news

Honeywell announces the release of Pro-Watch 5.5 software upgrade and Pro-Watch VMS R700 to enhance productivity and situational awareness
Honeywell announces the release of Pro-Watch 5.5 software upgrade and Pro-Watch VMS R700 to enhance productivity and situational awareness

Honeywell has announced that the company is launching the Pro-Watch 5.5, the latest iteration of its Pro-Watch Integrated Security Suite. The Honeywell Pro-Watch Integrated Security Suite is a software platform that is designed for enterprise and critical infrastructure markets, to help protect people and property, optimise productivity, and ensure compliance with industry regulations, all while helping to reduce operational costs. Honeywell Pro-Watch Intelligent Command Pro-Watch 5.5 upgrade enables operators to respond rapidly and effectively to alarms or incidents Honeywell Pro-Watch Intelligent Command, a user interface that allows organisations to construct a security system with total situational awareness, via the seamless integration of video and access control solutions, can now be upgraded to Pro-Watch 5.5. The Pro-Watch 5.5 upgrade enables operators to respond rapidly and effectively to alarms or incidents, by providing actionable intelligence, including a unified alarm view with maps and associated video, which includes the Standard Operating Procedures (SOPs) to be followed, thereby enhancing compliance with advanced reporting, and reducing security risks. Key benefits and features of the Pro-Watch 5.5 include allowing users to: Improve situational awareness: It provides a unified view of alarms and maps, incident workflows, and a space/area builder, in order to create logical zones and group-based, multi-site views. Upgrade integration with cyber security and data privacy: It integrates a new PW7K controller, enhances cyber security with Open Supervised Device Protocol (OSDP) and improves data privacy with selective masking. Enhance compliance: It enhances compliance with advanced reporting and reduces security risks, through an SOP process, and end-to-end TLS 1.2 encryption, and guided alarm/incident response. Increase productivity and system uptime: It improves operator efficiency with intuitive controls for effective incident management and simplifies maintenance with remote bulk camera firmware upgrade, and camera password changes capabilities, which includes specific non-Honeywell cameras. Pro-Watch Video Management System (VMS) R700 Honeywell is also launching the Pro-Watch Video Management System (VMS) R700 Honeywell is also launching the Pro-Watch Video Management System (VMS) R700, the latest iteration of its feature-rich and user-friendly video management software platform. Pro-Watch VMS R700 controls video subsystems, to collect, manage and present video, in a clear and concise manner. Honeywell’s Pro-Watch VMS R700 also intelligently determines the capabilities of each subsystem, across various sites, allowing video management of digital video devices, through a unified configuration and viewer. Key benefits and features of Pro-Watch VMS R700 include allowing users to: Enhance productivity: It allows users to access video footage and respond to alarms, via mobile app – anytime, anywhere. New video core features: It reduces solution cost with advanced GPU video rendering, salvo sequences, 64-bits optimised recording engine and optimised server deployments. Provide emerging technology support: It works with H.265 smart video compression codec, multi-imager and fish-eye cameras. Improve situational awareness: It provides multiple camera views in web clients, new integrations with artificial intelligence (AI) and analytics systems, and geographic information system (GIS) online maps. Integrate with Honeywell Series 70 AI cameras: It integrates natively with current and future Honeywell cameras for edge analytics and annotations, for licence plate recognition, intelligent video analytics and object classifications video analytics. Honeywell Pro-Watch Integrated Security Suite Pro-Watch Video Management System (VMS) R700 is part of the Honeywell Pro-Watch Integrated Security Suite, a software platform, which is specially designed for enterprise and critical infrastructure markets, to help protect people and property, optimise productivity and ensure compliance with industry regulations, all while helping to reduce operational costs. To enhance situational awareness, Honeywell’s Pro-Watch VMS R700 easily integrates with Honeywell Pro-Watch Intelligent Command, a web-based user interface that provides organisations the ability to construct a security system with total situational awareness, in order to better protect people, property and assets.

Soloinsight to showcase their CloudGate VIAM platform at the CREtech New York 2021
Soloinsight to showcase their CloudGate VIAM platform at the CREtech New York 2021

Soloinsight Inc., a workflow automation platform company, will be featured at this year’s CREtech event in New York City. The company’s CEO, Carter Kennedy, will be a panelist for the show’s ‘The Ever-Evolving and Future of Access Control’ session on Wednesday, October 13th at 11 am EST. As a company that was recently awarded the Security Industry Association’s (SIA) new product showcase award in the hosted solutions/managed services category, Soloinsight is no stranger to innovating in the commercial real estate and access control industries. Workflow automation platform Soloinsight has integrated with some of the biggest names in the access control and visitor identity spaces Their product, CloudGate, is a visitor identity and access management (VIAM) platform that delivers unprecedented security and an intuitive guest and host experience at multiple locations via the cloud, on-prem, or hybrid infrastructures. Since the introduction of CloudGate, Soloinsight has integrated with some of the biggest names in the access control and visitor identity spaces, such as Johnson Controls, LenelS2, and Honeywell, to deliver a secure and seamless security workflow automation platform. With a platform that touches nearly every point in visitor and access management — from its mobile concierge technology, self-service kiosks, and turnstile integrations, Soloinsight is poised to be a game-changer in the commercial real estate industry. “We are excited to partner with access control manufacturers and property management companies to alleviate these challenges and advance their access control systems to the next level.” - President and CTO, Farhan Masood.

Alarm Man of NC offers state-of-the-art security solutions in North Carolina
Alarm Man of NC offers state-of-the-art security solutions in North Carolina

Alarm Man is one of the most trusted security solution providers that offer dedicated services in areas of North Carolina and has been the pioneer in the domain since its establishment in 1980. This family-owned and the locally based company offers state-of-the-art security systems to residential and business establishments alike. Hence, be it for fire alarms in Cary and Raleigh, North Carolina or security and surveillance systems, Alarm Man of NC, is the most trusted name in the whole of North Carolina. HD cameras The range of services offered by Alarm Man of NC includes installation, repair, and maintenance of security systems, monitoring devices, HD cameras, and CCTV, fire alarms, and more. Alarm Man is also an authorised dealer of Honeywell, and their technicians and professionals have vast knowledge in the effective handling of all their products. They specialise in carrying out seamless installations without disrupting the schedules of the property owners The system installations done by their professional technicians are done in a manner that they do not take up much space on the walls and are totally in sync with the overall look and feel of the space. Their skilled professionals have the due experience and knowledge to meet all the code requirements while installing the security systems. They specialise in carrying out seamless installations without disrupting the schedules of the property owners. Honeywell's Total Connect Alarm Man of NC looks forward to satisfying its clients by ensuring maximum security to their residential property and businesses so that one can live life carefreely. They also offer medical alert systems part of Honeywell's Total Connect so aging relatives can get quick help in an emergency. The security systems in Raleigh and Cary, North Carolina are designed in a manner that they can create awareness of mishaps just at the right time. Besides, the services provided by this company are just a call away from the clients. One has to dial 919-682-3379 to have a word with them.

Related white papers

Video Surveillance as a service: Why are video management systems migrating to the Cloud?

The borderless control room

Smart and reliable rail and metro operations