Check out our special report on Artificial Intelligence
Verint Nextiva Virtual Matrix CCTV software with software-based distribution of live and recorded video
Technical Specification
- Make: Verint
- Model code: Nextiva Virtual Matrix
- Software Type: Management Software
Software-based distribution of live and recorded video, audio, and alarms to video walls, analogue monitors, and PCs. Highly scalable with no limit on the number of input/output ports and no signal degradation. May be deployed on both wired and wireless networks. Configurable camera tours and salvos with presets and camera-specific settings. Interfaces with any PTZ keyboard protocol and controls any PTZ dome with conventional commands, such as Pan/Tilt/Zoom, focus/iris, and presets. Fully integrated with the Nextiva portfolio of networked IP video solutions.
Read more| Make | Verint |
|---|---|
| Manufacturer | Verint Systems |
| Category | CCTV>CCTV software |
| Model code | Nextiva Virtual Matrix |
| Software Type | Management Software |
| Additional info | Software-based distribution of live and recorded video, audio, and alarms to video walls, analogue monitors, and PCs. Highly scalable with no limit on the number of input/output ports and no signal degradation. May be deployed on both wired and wireless networks. Configurable camera tours and salvos with presets and camera-specific settings. Interfaces with any PTZ keyboard protocol and controls any PTZ dome with conventional commands, such as Pan/Tilt/Zoom, focus/iris, and presets. Fully integrated with the Nextiva portfolio of networked IP video solutions. |
You might be interested in these products
Related Whitepapers
Analytics-driven workforce optimisation
The benefits of Edge AI + Cloud for security systems
Video technology: making cities safer & improving lives
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
