exacqVision now integrates with Percolata to form an integrated solution using data from employees, traffic sensors, marketing calendars, historical information, and video from exacqVision’s VMS to create customised computer vision and advance predictive analytics. Retail businesses and malls can benefit from the integration with reliable and actionable data to recalibrate business decisions that increase sales.

Features for physical retail stores

The integration provides powerful features for physical retail stores such as:

  • Walk-in and Walk-by traffic analytics
  • Classify employees vs. shoppers
  • Associate related shoppers into a buyer group
  • Flexible vantage points eliminate the need for additional cameras and expensive new wiring
  • Accurately forecast traffic

The Connected Partner Program is designed for product manufacturers and software developers. This opportunity offers access to all the tools needed to build integrations with Tyco products, including software, hardware, documentation, sample code, dedicated engineering and marketing support. This program is not intended for product resellers and distributors.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...