SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Robotics
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Videos

Check out our special report on casino security

Get it now!

Eagle Eye Video API Platform augmented to support advanced system integration

25 Jan 2018

Eagle Eye Video API Platform augmented to support advanced system integration
Contact company
Contact Eagle Eye Networks, Inc.
icon Add as a preferred source Download PDF version

Eagle Eye Networks, Inc. has announced the enhancement of the Eagle Eye Video API Platform to support large scale deployments with advanced integration requirements. The Eagle Eye API Platform delivers a robust set of enterprise wide APIs for customers’ use in easily integrating storage, analytics, indexing, and 3rd party interfaces with both live and recorded surveillance video.

The Eagle Eye Video API Platform can be used for integration, analysis, big data research, or the development of completely new applications. The Eagle Eye Video API Platform was launched in 2014, and since that time hundreds of companies have leveraged the Eagle Eye Video API Platform to create custom solutions without additional subscription or license costs. Eagle Eye already supports unrestricted camera counts and locations, and this latest API enhancement expands support to advanced functionality deployments.

“My app was incredibly easy to build, and Eagle Eye does all of the heavy lifting in terms of interfacing to the cameras and securely transmitting video to the cloud,” stated Alain Eav, President of Rovitracker, Inc. “We already gather data from portable equipment and assets, and by enabling cloud video into our offering, our customers gain an additional set of critical data from their remote worksites.”The API provides users access to the Eagle Eye Cloud Security Camera VMS using the same credentials they use for SSO in their organisations.

Accurate video management

The Eagle Eye Video API Platform enhancements include:

  • Speed enhancements: The API’s overall speed of requests has been dramatically enhanced. Queries involving thousands of cameras have been improved by 10x.
  • Video downloads: The API download functionality includes Eagle Eye’s time-lapse feature so an hour of video downloaded can be reviewed in as quickly 4 minutes. Full video and time lapse video can also be downloaded as a bundle, saving time and operating costs.
  • Analytics: Video analytics metrics such as line crossing, object counting, and intrusion detection can be retrieved and downloaded with all cameras. Raw metrics data is also available. This allows users to keep better track of their performance metrics, improve operations, and conduct their own analyses with the data.
  • Portable timeline management: Eagle Eye’s timeline view can be embedded into 3rd party applications via the API so users can view specific videos without leaving a 3rd party app, which enhances user experience and eliminates the need to log into multiple apps.
  • System performance and network metrics: The API provides graphical representations of data for bridge metrics which can improve operational efficiencies (such as bandwidth used to cloud and individual bandwidth per camera).
  • Managed switches: The API can remotely power cycle individual or all ports of Eagle Eye Managed Switches. This capability reduces costs by eliminating the need to send a technician on-site to reset improperly functioning cameras.
  • Two-factor authentication: The API supports two-factor-authentication per account as an extra layer of security which reconfirms users’ identities and prevents unauthorised access.
  • Security Assertion Markup Language Single Sign On (SAML SSO): The API provides users access to the Eagle Eye Cloud Security Camera VMS using the same credentials they use for SSO in their organisations.
  • Permissions: The API supports ‘per user’ permissions that can be granted, recalled, reviewed, or revoked. Systems administrators area able to assign appropriate permissions per location and per camera so the right people have access to the right cameras at the right time.
  • Sharing: The API supports rapid camera sharing with authorised users, and first responders.

The Eagle Eye Cloud Security Camera VMS is built on the Eagle Eye Video API Platform, and we are committed to providing open API support.Alert integration to big data analytics

The Eagle Eye Video API Platform supports thousands of camera types, both IP and analogue. The platform uses the Eagle Eye Big Data Video Framework, with time-based data structures for indexing, search, retrieval and analysis of the video. It then offers API access to integrate alerts, user interfaces, applications, and analysis ranging from simple searches to Big Data analytics.

“The enhancement of our video API platform enables developers to create and deliver scalable innovations faster with far fewer resources,” said Dean Drako, CEO and founder of Eagle Eye Networks. “The Eagle Eye Cloud Security Camera VMS is built on the Eagle Eye Video API Platform, and we are committed to providing open API support.”

Intelligent security cameras

With the Eagle Eye Video API Platform, existing security cameras can be transformed into intelligent tools for sales, marketing, business operations improvement and planning, social media, and more. Developers, integrators and businesses can search, modify, tag, play, share, and stream the video in their apps with a few lines of code. They can leverage existing cameras, build new video surveillance systems, create video alerting applications, improve traditional integrations of point-of-sale and access control systems, and much more.

Some examples of what developers, resellers and end users have quickly built with the Eagle Eye Video API Platform include:

  • Access control and intrusion platform interfaces
  • Enterprise analytics solutions
  • Point of sale applications
  • Medical facilities integration
  • Video alarm monitoring
  • Franchise operations management
  • Fleet management
  • Virtual doorman services
  • Environmental sensor applications
  • Warehouse and robotics applications

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Video analytics
  • Intrusion detection
  • Identity management
  • Data Security
  • Cloud security
  • Robotics
  • Artificial intelligence (AI)
  • Video surveillance
  • Related links
  • Eagle Eye Networks IP cameras
  • Access Control Software Access control software
  • Related categories
  • CCTV cameras
  • Access control software
  • IP cameras
Related articles
Aetina CoreEdge MXM: AI edge revolution with NVIDIA

Aetina CoreEdge MXM: AI edge revolution with NVIDIA

AI security solutions boost orders for AITX & RAD

AI security solutions boost orders for AITX & RAD

SARA: Transforming security with AI at ISC East 2025

SARA: Transforming security with AI at ISC East 2025

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Robotics
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec