Alternatives to SeeTrue Autonomous AI Detection

Compare SeeTrue Autonomous AI Detection alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SeeTrue Autonomous AI Detection in 2024. Compare features, ratings, user reviews, pricing, and more from SeeTrue Autonomous AI Detection competitors and alternatives in order to make an informed decision for your business.

  • 1
    Resolver

    Resolver

    Resolver

    Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.
    Compare vs. SeeTrue Autonomous AI Detection View Software
    Visit Website
  • 2
    Kognition

    Kognition

    Kognition

    Kognition delivers AI-powered security technology that ensures an always-on, always-aware force multiplier at a fraction of the cost of traditional security programs. Working within existing systems, we enable organizations to proactively monitor for threats (such as weapon presentation and crowd forming) and alert your security team to the presence of both restricted individuals and VIPs. Kognition reduces IT costs and the need for additional security staff while improving incident response times and driving comprehensive security reporting and visibility for K-12+, commercial real estate, regulated industries, and more.
    Compare vs. SeeTrue Autonomous AI Detection View Software
    Visit Website
  • 3
    SV3

    SV3

    Building Intelligence

    SV3 is a cloud-based, SAFETY-Act-certified software solution that enables secure access for visitors, vehicles and vendors. Whether it be at the lobby or loading dock of a building, warehouse or multi-tenanted environment, SV3's trusted access program ensures safe operations without gaps in your security system.
  • 4
    PAX CHECKPOINT

    PAX CHECKPOINT

    Vanderlande

    The process of moving passengers through an airport needs to be secure, seamless, rapid and deliver a positive experience for all travelers. Vanderlande cooperates closely with airports to provide the core components of the security process through innovative systems and intelligent software solutions. As part of our next generation of scalable solutions, evolutions, Vanderlande offers PAX CHECKPOINT. This combines state-of-the-art automated screening lanes with configurable multiplex screening software to create a fully integrated checkpoint solution. Scalable and flexible, it offers increased throughput and an improved passenger experience while allowing for easy expansion. The PAX Advanced lane is the most cutting-edge automated screening lane (ASL) for the screening of passengers’ hand luggage in airports or other secured areas. PAX MX2 allows passengers to divest and reclaim on both sides of the screening machine, ultimately offering the efficiency of two conventional lanes.
  • 5
    Evolv Express

    Evolv Express

    Evolv Technology

    The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. Visitors want to move quickly through security checkpoints at a seamless pace, knowing they’re well-protected everywhere inside your venue—while your security teams want the assurance that they can reliably pinpoint and stop threats. The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. The new outdoor Evolv Express system has a ruggedized design making it easier to move over rough and sloped surfaces. Customers also have the option to order a retrofit kit for their existing outdoor systems.
  • 6
    Ontic

    Ontic

    Ontic

    Ontic’s Protective Intelligence Platform makes businesses safer by serving intelligence to physical security teams so they can take informed action to protect people, property and reputation. By aggregating data sources and tools, your team can get more relevant intelligence—faster—for early threat detection. Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact. Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence.
  • 7
    PureActiv

    PureActiv

    PureTech Systems

    Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. ​ Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors.
  • 8
    Protecsys 2 Suite

    Protecsys 2 Suite

    Horoquartz

    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification.
  • 9
    AlertEnterprise

    AlertEnterprise

    AlertEnterprise

    AlertEnterprise delivers a unified cyber-physical security convergence platform by linking IT, OT and Physical Security for risk prevention, detection and mitigation. We help you eliminate security silos, to deliver the most complete view of threats and vulnerabilities while enhancing workforce safety, data privacy and experience. As the only SaaS provider to connect physical security, IT, OT and HR systems, we can help you empower your workforce and unlock new levels of business with a zero-trust, cyber-physical platform for identity, access governance and security. P.S. No coding required. If you work in compliance or investigations, trade the logs and manual checks for self-service, built-in checks, defined rules, workflow processes and more. And if you’re a facility owner, pull reporting, view required training and access an automatic audit trail — whenever you need to.
  • 10
    Hakimo

    Hakimo

    Hakimo

    Our remote guarding solution uses AI to monitor surveillance cameras and enables communication through speakers to deter unwanted visitors, providing more effective, lower-cost security than an on-site guard. Unauthorized access is a problem for every enterprise, but it can be tough to cut through the noise. Hakimo clears time-consuming nuisance alarms so that your team can focus on real threats that need action, including tailgating through doors and vehicle gates. Malfunctioning cameras and door hardware could potentially lead to a missed incident. Our software continuously monitors the health of your system hardware to identify any issues so they can be quickly resolved. When time and resources are limited, standing up for your own security operation doesn’t make a lot of sense. Regardless, security should be as effective and efficient as possible. This is where artificial intelligence-powered remote guarding comes in. You've got a business to run, so leave security to the experts.
  • 11
    ZeroEyes

    ZeroEyes

    ZeroEyes

    ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond.
  • 12
    Defendry

    Defendry

    Defendry

    The Defendry Security Suite is a powerful, automated set of components designed to work seamlessly together whether you only need one or two components or the entire suite. The Defendry SeeSay mobile app is the perfect way to get started! It is fast and easy to deploy, and quickly makes everyone part of your security solution. SeeSay empowers anyone with a smartphone to send texts, alerts, and videos of potential threats directly to your security staff. SeeSay can exponentially speed intelligence and communication as a potential threat situation emerges. The smartphone instantly turns into a security camera. Secure direct messaging with security staff. Everyone is part of your security solution. IoTalk gives operations teams the ability to pre-plan every detail of automatic threat response by creating customized, pre-programmed workflows, to speed a well-coordinated response to any type of threat. Defendry can auto-detect hundreds of different kinds of guns and weapons.
  • 13
    Digifort

    Digifort

    Digifort

    Intelligent video monitoring software utilizing the highest levels of available technology and providing best performance to suit any requirement. Complete IP video management platform with advanced alarm management, events, occurrences and automation of environments through a single system, reliable, intuitive with easy configuration and operation. Automated license plate reader solution fully integrated with our video management system, automation alerts, alarms and pre-configured actions, statistical graphs and integration with third party systems. Capture, remote control and recording of Windows based computer screens. Ideal for Call Centers, Headless Server Controls and third party software management. Live Applied intelligence without video monitoring, providing proactive actions for programmed behavioral situations with automatic event and alarm generation in addition to valuable statistical information for business intelligence application.
  • 14
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous events. Seamlessly synthesizing information from access control, video and other sensors, the OnGuard system delivers complete line-of-sight to all aspects of security and facilitates intelligent responses and outcomes. The OnGuard system integrates seamlessly with a wide range of existing business systems. The OnGuard system can bi-directionally exchange cardholder data with many HR platforms and/or ERP systems, coordinate alarm/event data with emergency response systems, and more.
  • 15
    YourSixOS

    YourSixOS

    YourSix

    Say goodbye to outdated, on-premise security systems. YourSixOS offers a modern approach to security with our serverless, direct-to-cloud solution. No more cumbersome hardware, no more outdated software – just secure, simple, and flexible security at your fingertips. For operational intelligence and physical security you can trust, the answer is YourSixOS. Our cloud native platform provides unparalleled scalability, uncompromising data security, and unprecedented visibility into your business. Eliminate the blind spots in your business and leverage your visual intelligence to ensure there’s nothing about your business you can’t see. Visual intelligence is more than just protecting against liabilities like threats to physical property or loss of goods. It’s the power to improve customer experiences, increase productivity, and drive operational improvements. It’s a live feed of every risk attacking your profitability.
  • 16
    Hamilton Security

    Hamilton Security

    Hamilton Apps

    Hamilton Security offers you an efficient and intuitive digital solution for managing your security incidents tracking, so you can stay in control of your website. Upgrade the security of your building by equipping your security team with Hamilton Security. Your round teams and security safety agents benefit from a powerful 100% digital tool that optimizes their management, facilitates their collaboration, and reinforces their vigilance. Send automatic SMS or email notifications to your round teams. Share important information about an incident to support rapid decision-making, and always keep an eye on the progress of ongoing tasks. With real-time management, you stay in control of your business. Your round teams can track the progress of all incidents, from start to finish. Your managers can monitor the resolution of incidents by assigning specific or recurring tasks to their agents. The intelligent dashboard gives you a global view of your team's activity in real-time.
    Starting Price: €99 per site per month
  • 17
    Xeoma

    Xeoma

    Felenasoft

    Xeoma has all state-of-the-art features for high-quality efficient video surveillance! The program has been actively developed since 2011, it works on Windows, Linux / ARM (Raspberry), Mac OS X, iOS and Android. Easy surveillance: simpler than a children's construction set. Auto search and detection of any connected analog, web cameras and IP cameras. See for yourself: build and adapt your video surveillance system in just a few minutes! Understandable and truly user friendly interface makes surveillance enjoyable and pleasant. More than 100 different functions, more than 30 video analytics modules, including those based on artificial intelligence: for example, recognition of license plates, faces, people's emotions, various objects and sounds, counting visitors, tracking eye movements and many others. Xeoma has a perpetually free mode with viewing up to 1000 cameras and recording archives from 4 cameras!
    Starting Price: $9.95, one-time, perpetual
  • 18
    Monas MS

    Monas MS

    TRIKDIS

    Alarm monitoring software Monas MS is designed to display, process, store and react to messages received in the centralized monitoring stations. Additional modules provide advanced features for alarm monitoring and response. All in one – alarm monitoring, management and control of rapid response teams, remote access for technical personnel. We can convert the current monitoring software database to Monas MS software database, keeping all existing records.
  • 19
    Innovative Security Manager

    Innovative Security Manager

    Innovative Business Software

    Innovative Security Manager™ (ISM) is a comprehensive platform that includes everything you need in one complete solution, providing a complete overview of your resources. Improve your security performance and achieve a much more cost-effective organization. Receive and handle any kind of alarm, such as fire alarms, burglar alarms, intrusion alarms, elevator alarms etc. in one single platform. With Innovative Security Manager™, you can receive alarms through a wide range of interfaces such as IP, SMS, ADSL, PSTN and GPRS. Create, schedule and assign tasks to personnel via Android™ app – either manually or automatically. Assign tasks based on various parameters, such as current work shift, time since last task, physical distance to task and time left on work shift.
  • 20
    Echosec Systems

    Echosec Systems

    Echosec Systems Ltd

    Intelligence and security teams are responsible for protecting people, places, data, infrastructure, and other critical assets from harm. The internet is a valuable yet overwhelming source of threat intelligence, helping drive more informed decisions in response to these risks. Echosec Systems gives users a single point of access to a wealth of online data so they can respond faster and more effectively to cyber, cyber-enabled, and physical threats. Our solutions deliver an unparalleled breadth of online sources in a simple user interface, filtering relevant data from millions of surface, deep, and dark web posts in a digestible format. Machine learning threat classifiers, advanced keyword filtering, and geo-location features help users eliminate noise and pinpoint specific, relevant content in real-time. Whether the event is a violent threat, a planned attack, or a data breach—Echosec Systems delivers immediate situational awareness so security and intelligence teams can res
  • 21
    Omnigo

    Omnigo

    Omnigo

    Omnigo is a leading public safety, incident and security management solution. Ideal for law enforcement, education, healthcare and other enterprise markets, Omnigo software ensures safer environments by offering robust tools to manage the entire incident lifecycle. Omnigo's key modules include detection, response, reporting, remediation, and prevention. Our solutions streamline your evidence management process so you can maintain chain of custody and manage property from intake through disposal, on virtually any device. With a team that includes former law enforcement, first responders, and other public safety professionals, we’re uniquely qualified to understand exactly what you need to protect your community.
  • 22
    Qognify

    Qognify

    Qognify

    Qognify helps organizations minimize the impact of incidents with its innovative portfolio of video management software and enterprise incident management solutions. With thousands of deployments in banks, utility companies, airports, seaports, city centers, and transportation agencies, Qognify helps agencies all over the world keep people and assets safe. Qognify places a premium on operational and physical security strategies because safety is priceless. Qognify solutions help organizations capture, analyze, and leverage big data to anticipate, manage, and mitigate security and safety risks, maintain business continuity, and streamline operations. The Qognify offerings provide valuable insights that enable enterprises and security-conscious organizations to take the best action at the right time by correlating structured and unstructured data from multiple sensors and channels, detecting irregular patterns, and recognizing trends.
  • 23
    VIEWSCAPE Core

    VIEWSCAPE Core

    Veracity Solutions

    The fully integrated command and control platform. For users of complex security and BMS environments with multiple integration needs. VIEWSCAPE Core is a sophisticated open-architecture platform upon which bespoke PSIM (Physical Security Information Management) and integrated CCTV systems are created. Developed by Visual Management Systems Limited a UK-based specialist provider of complete, bespoke PSIM and integrated CCTV systems. The VIEWSCAPE Core platform has been deployed in many environments including retail, military and defense, border security, police, cell complexes, prisons, transport, ports, airports, energy, oil & gas, nuclear, utilities, national grid, urban centers, museums and galleries, universities and colleges and hospitals over the past ten years. VIEWSCAPE Core integrates multiple disparate security systems including video surveillance, access control, perimeter intrusion detection, fire and safety, public address, and building management.
  • 24
    Avigilon

    Avigilon

    Avigilon

    Our video, cloud and access control solutions seamlessly integrate across your entire video security system to provide you with the right information at the right time — so you can take decisive action. Powered by advanced AI and video analytics we keep our technology simple and easy to use, letting you focus on what matters most. The majority of operator time is spent looking for suspicious activities, with less than 5% detection rate after the first 20 minutes. Around 10% of operator time is spent verifying security events – something humans are good at, when given enough time. There is little time left for operators to actively collaborate on effective actions that prevent negative outcomes. Our video security, cloud and access control solutions are integrated and powered by AI to provide you with the right information at the right time — so you can take decisive action.
  • 25
    Camlytics

    Camlytics

    Camlytics

    Camlytics combines camera monitoring, surveillance and space analytics solutions. Connect your EXISTING IP camera system and get instant real-time statistics on people counting, vehicle counting, location occupancy, queues, heatmaps and more. Human/vehicle classification is also supported. The most cost-efficient counting & VMS software on the market. No need to buy expensive sensors - Camlytics will work on your IP camera system or even on webcams! Camlytics is a software solution only. Camlytics doesn't store any camera recordings on its servers - your privacy is fully protected. Works with video archives. Provides simple API and webhooks for all real time camera events (Motion detected, Line crossed, Tailgating, etc.) which allows using Camlytics with any 3rd party software. Download and try free now.
  • 26
    Amadeus 8
    Next generation security software platform. With the operator experience in mind, DDS has incorporated the very latest technologies into an intuitive global building security platform based around access control, alarm management and video management. Innovative company with a human face. We innovate in security software development and controllers manufacturing. Our team builds upon our 30 years’ track record of manufacturing excellence to adapt the power of modern security to the facility requirements. The technical team is at your service. A multilingual team is standing by to help whenever you need it. Consult the documentation and open tickets through DDS technical site. Marketing tools. The marketing place to keep up to date, consult the latest news, share case studies and download products documentation. Supreme user experience. Amadeus 8 focuses on users’ expectations to interact intuitively with customized information, through the innovative design, the modern tools
  • 27
    Genetec Security Center
    With the increasing amount of new security technologies and sensors available, an open approach to security is crucial. But over time, integration falls short. APIs and interfaces built for a single purpose reach their limits - and your system stops keeping up with your needs. Security Center is a different type of platform. It's built from the ground up to unify all of your data so that you can manage security policies, monitor events, and run investigations. Its extensive ecosystem lets you expand your system with the technology you need to face emerging threats. And since it’s not focused on one narrow set of tasks, it accommodates new data types seamlessly in one interface. Security Center allows you to monitor events and configure your system in one place. With a single interface to master, your team spends less time in training. And since it was designed to unify your entire security environment, it provides a familiar experience even as your system grows.
  • 28
    Veristream

    Veristream

    Veristream

    Enhance safety and security in all your facilities with Veristream visitor management solutions. A proven industry leader, Veristream combines the latest technology and their extensive security experience to help organizations secure every facility while enhancing the check in experience for guests at the same time. Veristream's top-rated solutions include BreezN visitor management solution for enterprises organizations and iVisitor for multi-tenant.
  • 29
    OCTOPUS PSIM

    OCTOPUS PSIM

    Octopus Systems

    Today’s security officer has to manage numerous security systems from different providers and generate an accurate situational picture from disparate data sources. This makes security management time consuming and expensive, and the lack of integration and cross referencing makes it difficult to make fast and well-informed security decisions. The OCTOPUS PSIM Command & Control Center takes the guesswork out of your security management by unifying your disparate security devices and information systems into one converged platform. Octopus Systems is using a first of its kind USMS (Unified security management system) which is the next generation PSIM system handling both physical and Cyber related incidents. As the only fully Cloud-based PSIM available on the market, the OCTOPUS PSIM Command & Control Center is a complete solution for security, safety and operation centers, offering a unified common operational picture (COP) either on a multiple screen layout or on a laptop or tablet.
  • 30
    iLobby

    iLobby

    iLobby

    Deployed across more than 6,000 sites worldwide, iLobby powers complex work environments by optimizing and automating key facility processes to achieve regulatory compliance, enforce safety protocols, and drive site security requirements. The iLobby platform is supported by robust reporting, turnkey onboarding, and extensive configurability that ensures maximum impact in complex and regulated industries. iLobby optimizes your front desk, and adds an extra level of security, even in highly-regulated facilities such as government, banks, airports, factories, schools, and offices. The platform streamlines the complex process of screening visitors, into one quick and easy checkpoint. Its enterprise-level features make it easy to reach a high level of security and compliance in a matter of seconds. Used by Fortune 500, government, and SMBs.
  • 31
    Cloudvue

    Cloudvue

    Johnson Controls

    Johnson Controls is transforming how spaces and places are perceived and enjoyed. Applying data from both inside buildings and beyond, our customers can now manage operations and security systemically. Introducing the blueprint of the future, OpenBlue is a dynamic new space from Johnson Controls. This is how buildings come alive. Cloudvue is trusted all over the world to simplify surveillance, streamline access control, and provide powerful intelligence that improves security operations and helps with organizational efficiency. Command an entire security system in one interface, on one map, and click on any camera or door worldwide. Easily control cameras, grant access to doors, and set intelligent alerts with centrally managed software and cloud-connected hardware. An unlimited number of cameras and access control points can be added. Custom floor plan views, map views, and powerful dashboards keep data organized as operations scale.
  • 32
    VidSys

    VidSys

    VidSys

    Vidsys is a leading provider of Converged Security & Information Management solutions. Since 2005, we've helped organizations streamline their security operations to reduce risk, manage security evens in real-time and respond to incidents more effectively. Simply put, we make situation management simple. Each organization faces unique challenges when it comes to providing operational security. Vidsys’ converged security & information management solutions go beyond the limitations of traditional PSIM to provide comprehensive enterprise-level security. Our CSIM, Intelligent GSOC & IoT Smart City solutions help organizations make risk management and incident response easier and more effective. Our open architecture software platform integrates data from virtually any security system, sensor, or networked management application. It actively correlates data from disparate security systems to provide actionable business intelligence that empowers stakeholders.
  • 33
    Kiana Secure
    Real-time location services provide situational awareness and assist with safety and security measures in emergency situations. Knowing real-time occupant location and profile is invaluable in decision making. Understanding occupant foot traffic while on premise provides important insights into crime investigations. Remote awareness is also instrumental to effectively managing employees, contractors & maintenance staff. Presence analytics can also aide in meeting compliance standards and in reducing insurance premiums. Kiana Secure revolutionizes existing video surveillance capabilities with Wi-Fi based location awareness. Video surveillance systems don’t provide 100% premise coverage and low light or poor camera resolution is challenging. Kiana’s Image-to-Device association provides valuable insights into situational awareness. Kiana’s forensic analytics tools, which combine images & video data with location analytics, provides rich information in crime investigations.
  • 34
    Arcules

    Arcules

    Arcules

    Arcules is the intuitive, cloud-based platform that unifies and makes sense of the data from your surveillance system for security and beyond. We are device-agnostic with a simple plug-and-play experience that sets up in minutes, saving both time and money while providing the flexibility to adapt as your business grows. Arcules is constantly updated with improvements and security patches as part of our affordable subscription model. Security is an important investment, but you shouldn’t have to buy into a whole new system of hardware and hire a specialist just to use it. Arcules is rapidly growing and baking even more security, simplicity, and flexibility goodness into our product than ever before. Imagine your entire organization at your fingertips from one interface. It’s possible! Remotely access any camera, from any device, at any time. You shouldn’t have to rip and replace to gain the benefits of integrated cloud security. Use your existing IP cameras and network gear.
  • 35
    SMS by KeyTech

    SMS by KeyTech

    Keytech Security Solutions

    A multi-solution platform developed based on intense expert research and the existing security difficulties organizations face on a daily basis. The solution is designed to eradicate outdated procedures, inefficient data retrieval, ongoing inconsistency in procedures, the vulnerabilities of data information, disorganization through cluttered paper documents and the time-consuming. Is a Combined effort of security procedures and managerial standards? Using cutting-edge technology to enhance the standard of security procedures. Create strong communication between administrators and field users. Bridge the gap within communities. Developed based on logic and intelligent algorithm. At SMS by KeyTech Ltd, we believe that security and facility management should be a straightforward and uncomplicated process. It should deliver efficiency, accountability, and consistency. SMS by KeyTech promises to not only revolutionize current security and facility procedures.
  • 36
    Alloy Access

    Alloy Access

    SmartRent

    Alloy Access Cloud-based access control for multi-tenant and commercial buildings. Our cloud-based access control system provides hands-free access solutions to address communities current needs while ensuring scalability for the future. Alloy Access is a frictionless platform that can be utilized to protect communities and assets through the use of control panels, smart access locks and intercoms, with integrations to property management software and customer relationship platforms to keep data in one place. Combining Alloy Access with our other smart home products provides customers the ability to create a truly connected community. Flexible Options with Alloy Access. With Alloy Access, you have the flexibility to choose different access methods for each entry point. Customize how residents, employees and visitors access all perimeter doors, amenity spaces, garages and units. Bluetooth locks & mobile passes. Key fobs - use existing key fobs or cards. Smart locks & custom pin
  • 37
    GuardMetrics

    GuardMetrics

    GuardMetrics

    Security officer tracking software that provides your stakeholders with detailed, branded reports and your supervisors with operations intelligence in real-time. Cut costs by streamlining report writing, storage, and distribution for your security officer agency; while simultaneously eliminating expenses associated with old-fashioned guard-tour wand systems. New client onboarding is executed quickly and easily with an initial 45-minute training session. The GuardMetrics officer management system is an affordable security guard tour system and app that can be used with any mobile smart device. Includes GPS officer tracking, perimeter, and exception alerts, daily activity logs, incident reporting, time and attendance, an operations management calendar, & a neighborhood watch system called the Community Security App™. GuardMetrics can streamline your security operations management.
  • 38
    Protegus

    Protegus

    TRIKDIS

    With PROTEGUS you will always know what is happening at your home or office with real-time notifications and remote control. PROTEGUS platform offers you an easy way to control any existing or new alarm system from a smartphone or using WEB. Get control of your alarm system! Save money and time, no need to change the existing alarm system, only upgrade it. Monitor your security system. Arm or disarm the system remotely. Be informed about each event with push notifications. Take action if an alarm occurs. Control automation devices remotely (open gates, turn on/off heating and etc.) TRIKDIS communicators that work with PROTEGUS app are compatible with any alarm panel. Communicators are directly compatible with Paradox, DSC, Interlogix (Caddx), and Texecom panels by connecting to the panel's serial or data port. They work with any other alarm panel by connecting to alarm control panels landline communicator (TIP RING contacts).
  • 39
    Bold Gemini

    Bold Gemini

    Bold Communications

    Bold supplies Gemini, monitoring software for intruder, fire, holdup alarms, CCTV, audio, asset tracking, access control, telecare and lone worker. Gemini is easy to operate and is used in government, retail, banking, police, military, utilities, sea ports, education and hospitals control rooms as well as leading commercial alarm receiving centers. Gemini software supports BS and EN monitoring control room standards, all industry standard alarm panels and commonly used CCTV systems including - Hikvision, Dahua, Milestone, Axis, Avigilon, Davantis, Xtralis, March, Bosch, DM, Samsung and RSI Videofied. Bold offer the leading European technical team for 24/7 control room support.
    Starting Price: $5000 one-time fee
  • 40
    Alarm.com

    Alarm.com

    Alarm.com

    Get best-in-class security, plus smart home automation the whole family will love. Protect your business with security that keeps you aware and in control – from anywhere. With over a decade of experience and over 6 million active users, Alarm.com continues to be a technology leader. Join the Alarm.com family and become a Service Provider today. Alarm.com uses a tamper-resistant cellular connection, dedicated solely to your security system. Have peace of mind knowing your system will continue to communicate even if the phone or cable line is cut, power is out or the Internet is down. Easily create and disable user codes. Give each user a unique code, then see who has armed or disarmed the system, and when. You can disable codes within minutes from your computer or tablet. With over a decade of experience and over 6 million active users, Alarm.com continues to be a technology leader. Join the Alarm.com family and become a Service Provider today.
  • 41
    CredoID

    CredoID

    Midpoint Security

    CredoID: the open platform access control software. Midpoint Security develops integrated solutions for access control and security projects. CredoID access control software is the cornerstone of these solutions. The core of every solution is our access control software CredoID, which is easily expandable by additional modules for time & attendance, video surveillance, burglar alarm, vehicle and elevator control, ID card design & printing, maps and scripts. CredoID provides an easy way to install security systems of any size. Our open platform solution supports full range of HID EVO Edge, VertX Evo & Aero and Mercury LP EP Series controllers and extension modules, wireless Aperio locks. CredoID also supports integration with DigiFort VMS, alarm panels from ASB security and DigiFort LPR. CredoID software integrates the functions of access control, alarm monitoring and time & attendance in one package.
  • 42
    Athena Security
    Athena sends proactive alerts to the designated officials if an elevated temperature is detected. By integrating with VMS, access control, and office management software companies, Athena centralizes all relevant information. Athena works with reputable name brands to include the best hardware in our system, such as Apple, Dell, Texas Instruments, and more. Our neural networks have been developed from scratch by PhDs in the field of deep learning and computer vision. We designed our hardware using highly accurate thermal cameras to detect temperatures along with the HSRP (blackbody) device for fluctuations in ambient conditions. Athena can be configured as a stand-alone unit, enterprise cloud, or with an enterprise on-premise server. Athena’s enterprise solution is ready to be deployed upon arrival; as a plug and play system it automatically calibrates and configures itself, there is no need for an operator once it’s set up.
  • 43
    EcoStruxure Security Expert

    EcoStruxure Security Expert

    Schneider Electric

    Protect your building occupants and assets with EcoStruxure Security Expert. An integrated, role-based physical access control and intrusion detection solution that unifies your building’s security infrastructure and building management systems. With the need to protect more people and data it is easy to understand why physical access control plays a vital role in the overall security of a building. EcoStruxure Security Expert integrates role-based physical access control and intrusion detection to unify the building security infrastructure and building management systems into an easy to manage, single platform that enables faster, more efficient, and potentially life-saving decision making. Unifies access control and building management solutions reducing complexity and the time spent managing multiple systems. Turns large quantities of information into secure, customizable analysis. Backward compatibility ensures the latest offer will support prior version features and integrations.
  • 44
    Macroscop

    Macroscop

    Macroscop

    Used to locate a person at your facilities by face, such as intruders, access control automation, as well as for marketing purposes. Create a database of photos of faces with statuses, for example, "VIP" and "black list". Receive automatic notifications on the monitor, phone, e-mail about the detection of persons from the control lists in the flow of people. Search for fragments with a detected face in the video archive, search for people in the video archive by photos. Receive information about the gender and age of visitors online. Identify employees or offenders at your facilities. Quickly learn about the visit of VIP clients (persons from the “white” list) or, for example, shoplifters (persons from the “black list”) to the point of sale, service. Take the necessary actions in a timely manner depending on the recorded event. Thus, you will be able to ensure a high level of security for your employees and infrastructure, as well as improve the level of service for VIP clients.¿
  • 45
    DICE Monitoring
    The only truly unified alarm monitoring software solutions and interactive video monitoring software solutions that include video, audio, and advanced video analytic technology. DICE Monitoring is the only truly unified Alarm Monitoring Software Solution, Video Monitoring Software Solution, and Event Management cloud-hosted platform. The Matrix platform provides a user-friendly interface, easy setup, and customize features coupled with the ability to work from any device without downloading software. Additionally, the all-in-one platform delivers a seamless and reliable solution for central monitoring stations, command centers, dispatch centers, call centers, and dispatch centers. Add ons such as Matrix 911, Matrix PERS, Matrix Call Center, Matrix PISM, and Matrix Triage allow our clients to customize our solutions to meet their specific monitoring needs.
  • 46
    ACTAtek Agent
    ACTAtek Agent 2 is primarily used to download the event logs from the remote ACTAtek device in real-time and without any hassle. It saves time and administrative efforts in backing up the data from the ACTAtek to a central computer. ACTAtek Agent2 is a Web-based middleware to help poll out the event log data from remote ACTAtek device back to the backend database in real-time. This will save time and administrative efforts on backup the data from the ACTAtek to the backend database. The backend database which ACTAtek Agent2 support are MS SQL CE/ SQL /MySQL /TEXT&CSV files. This will enable the 3rd party software/application to be easily integrated with ACTAtek device in a minute. Support different databases, MS SQL CE/SQL/MySQL/TEXT&CSV files connection for easy integration with 3rd software/application. Web-Based application, and easy setup/configuration in minutes.
  • 47
    ICO Security

    ICO Security

    ICO Technologies

    ICO Security is the most flexible and scalable solution available. The fully-integrated modules cover all the safety requirements within your organization. Inspection Route, personalized template, inspection requests, notice letter, alerts and notifications. Workflow, task management, approval management, stats and dashboards.
  • 48
    Omnipresence 3D
    Omnipresence 3D (O3D) is an advanced Security Management Software solution. It eliminates many inefficiencies faced by large security organizations, such as excessive reliance on memorization, concentration and judgement calls based on incomplete information; labor-intensive manual reporting and manual compliance oversight. You can adapt it to your organization’s threats, procedures and regulations, so you can manage everyday tasks and rare incidents more easily, better and faster. Omnipresence 3D can improve ten-fold your situational awareness and your ability to manage complex incidents by eliminating up to 90% of the mouse clicks and manual steps experienced in competing solutions. This is achieved through dozens of time-saving features including an Immersive 3D technology protected by 3 patents filed in 46 countries.
  • 49
    Verkada

    Verkada

    Verkada

    Verkada brings the ease of use that consumer security solutions provide, to the levels of scale and protection that businesses and organizations require. By building high-end hardware on an intuitive, cloud-based software platform, modern enterprises are able to run safer, smarter buildings across all of their locations. PoE cameras are online and fully operational in minutes. No NVRs or DVRs. Store up to 365 days of footage locally. Stay ahead of emerging threats with ongoing feature and security updates. Cameras send encrypted thumbnails to the cloud and stream only when actively viewed. Store clips in the cloud indefinitely and easily share archived events with key stakeholders. Bring footage across sites into one dashboard and grant secure access to your entire team. Cameras act as sensors, leveraging the latest in AI and edge computing to uncover actionable insights in real-time. Overcome common challenges associated with physical security management.
  • 50
    FaceVACS

    FaceVACS

    Cognitec Systems

    Based on the world-leading FaceVACS technology, we provide our customers with easy-to-use, scalable and customizable face recognition software, and offer easy integration of our products through open system architecture and professional support. ID issuance agencies can compare new ID photos to existing images and prevent ID fraud or detect clerical errors. In addition, agencies can perform database de-duplication (1:n or n:n) to compare, clean and maintain ID databases with facial images. FaceVACS-DBScan LE helps law enforcement staff to increase the speed and accuracy of criminal investigations, allowing them to act upon match results in the critical time period after a crime has been committed.