SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Voyant Photonics unveils Helium LiDAR platform
    • Zimperium uncovers mobile PDF phishing threats
    • Matrix Comsec wins CII 2025 Women in STEM Award
    • VITEC & Actelis: Revolutionising IPTV for RF facilities
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which vertical markets have the greatest growth potential for security?
    • What’s behind (perimeter) door #1?
    • Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft
    • Why open matters in the age of AI
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Marin Hospital enhances security with eCLIQ access control

    Marin Hospital enhances security with eCLIQ access control

    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

March Networks’ Searchlight aids customer service, operations and fraud investigation

11 Apr 2018

March Networks’ Searchlight aids customer service, operations and fraud investigation
Contact company
Contact March Networks Corporation
icon Add as a preferred source Download PDF version

March Networks, provider of intelligent video solutions, introduces the next evolution of its powerful Searchlight software.

Used by leading banks and retail organisations worldwide to extract valuable information on customer service, merchandising, operations, compliance and more, March Networks Searchlight helps businesses improve performance and profitability.

Integrating clear surveillance video, business data and highly-accurate analytics, the software also enables organisations to proactively detect fraud and theft and reduce investigation times by as much as 90%.Multiple image export to email is a practical feature that makes sharing video images quick and easy

Searchlight 4.6 software

With the launch of Searchlight 4.6, customers benefit from new dashboards and reporting capabilities that make it even easier to analyse, compare and share critical information. Key among these new capabilities are:

  • New summary dashboard views and drill-down filtering. Available in Searchlight’s Business Analytics reporting tool, the new dashboards enable users to compare aggregated data and trends from multiple locations more effectively, based on their own key performance indicators (KPIs). Users can filter data by analytic, site or customised grouping across their organisation, and quickly drill-down to a granular level when needed. A retail operations manager, for example, could view people counts from all locations, then drill down to get exact numbers for each of the four entrances at a single site. A district manager could do the same to view the information from his district only. Users can also save their own custom reports and dashboard views for convenience.
  • Automatic email notifications with images. This new feature in Searchlight’s Operations Audit enables organisations to share snapshots (in low or high definition) by email with select users on a set schedule. The reports can include images from all cameras at each site, or from select cameras only, such as all front entrance images. A large March Networks retail customer that is already using this feature to provide district managers with a daily overview of their showroom floors reported a 30% improvement in merchandising compliance within four months.
  • Multiple image export to email. Another Operations Audit addition, this practical feature makes sharing video images quick and easy. Users simply right-click and select the images they want to export, and the software will automatically add them to the user’s email application as attachments.

Automatic data export

Other new Searchlight features include the ability to automatically export business analytics data from all sites, cameras and zones on a set schedule, ensuring that key reports are always ready and easily accessible.

As well, new embedded hyperlinks in the software’s Business Rules Summary email notifications allow users, in particular loss/fraud prevention investigators, to move quickly into the software to view video evidence and the exact exceptions results.Several of the new capabilities we’ve introduced have been inspired by our customers and we look forward to demonstrating them to partners"

“When customers start using Searchlight, two things usually happen fairly quickly. First, they are thrilled with the business insights the software provides, and second, they start brainstorming about new ways to apply that information and who in the organisation could also benefit,” said Douglas Wong, Vertical Software Application Product Manager, March Networks.

“Several of the new capabilities we’ve introduced have been inspired by our customers and we look forward to demonstrating them to partners and prospects.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Digital video surveillance
  • IP video surveillance
  • Network monitoring
  • Video analytics
  • Intrusion detection
  • Retail security
  • Network cameras
  • Security software
  • IP security solutions
  • Integration software
  • Crime prevention
  • Data Security
  • Video surveillance
  • ISC West 2018
  • Related links
  • ISC West 2018
  • March Networks CCTV software
  • Related categories
  • CCTV software
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft

Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft

AVS: New standard for alarm monitoring centres

AVS: New standard for alarm monitoring centres

ICT expands in CEE region with new sales director

ICT expands in CEE region with new sales director

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec