SlideShare a Scribd company logo
Everything is Secured... 
w w w . a c t a t e k . c o m 
Email: sales-asean@actatek.com 
Telephone: (65) 6515 4520 
Fax: (65) 6515 4521 
ACTAtek 
ID Video 
The all-in-one solution for 
integrated Access Control & 
Video Surveillance system 
Key Features & Benefits 
Tightly integrates with ACTAtek's award winning ID 
Management Platform. 
Combines benefits of Access Control, Time Atten-dance 
and Video Monitoring in one solution. 
IP Web Based Technology allows surveillance from 
any location in the World with WAN connection. 
Easy upgrade to any existing ACTAtek installation! 
Monitor and view real-time ACTAtek Event Logs 
under the 2-D Map. 
Administrator can pre-set the alerts event e.g. “DOOR IS 
OPEN”. When the pre-set alert event happened, a blink-ing 
red color icon with alert beep sound will display on the 
2-D Map to inform administrators. 
Administrator can easily monitor and view the Event Logs 
,and also playback the recorded Video clips by defining 
the search timing. e.g. +/- 10 secs of Event Logs. 
Administrator also can view and compare the User Photos 
with the Snapshot Photos under ID Video Log. 
MS SQL database technology.
w w w . a c t a t e k . c o m 
Email: sales-asean@actatek.com 
Telephone: (65) 6515 4520 
Fax: (65) 6515 4521 
ACTAtek 
ID Video 
The all-in-one solution for 
integrated Access Control & 
Video Surveillance system 
ACTAtek ID Video is an add-on application of ACTAtek Access 
Manager to seamlessly combine Access Control System (ACTAtek) 
with Video Surveillance Management (IP Camera) in one platform. 
With ACTAtek ID Video, administrators can easily monitor the 
real-time ACTAtek Event Logs under the 2-D Map. Also by searching 
certain timing (+/- 10 secs) of Event Logs, administrators can just 
double click the Event Logs to playback the recorded Video clips 
under ID Video Log to help prevent the tail gating from happening. 
When a user initiates an authentication from any at an ACTAtek unit 
(fingerprint, RFID smartcard or PIN) in the network, the video stream 
from the ACTAtek camera is time-stamped. The result is an applica-tion 
that shows the ACTAtek event log, CMOScamera image and a 
selectable video option to see the authentication event. Searches 
can be performed for specific ACTAtek units, ID logs, individuals, 
specific days, time and so on - all the security information required. 
These features allow Security Directors to review potential 
"tail-gating" where one authentication and door open event results 
in multiple entry. 
System Overview 
ACTAtek ID Video compliments with 
ACTA3 and IP-based Reader 
Video Event Log 2D Map Viewer with 
Real-time Event Logs Viewer of Terminals 
(ACTA3/ IP-based Reader) 
Playback Video clip files linked with 
Event Logs 
ACTA3 
IP-based 
Reader 
The application allows both 24/7 and motion detection operation. With Motion detection the user can limit the space to only 
events local to the ACTAtek units and doors that are monitored. 24/7 is continuous recording mode - suitable for situations 
where all continuous surveillance of the area is required. 
For more info visit ID Video Live Demo Installation & Troubleshooting 
http://www.actatek.com/video

More Related Content

What's hot

BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
Chris Sistrunk
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
Deepakraj Sahu
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
Shah Sheikh
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
Positive Hack Days
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
Chris Sistrunk
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
Ajay Ohri
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
Onward Security
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
Jeffrey Wang , P.Eng
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
PECB
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
GENIANS, INC.
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
Scada security
Scada securityScada security
Scada security
sommerville-videos
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
MarcoAfzali
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
amiable_indian
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
GENIANS, INC.
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
Javier Arrospide
 

What's hot (20)

BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Scada security
Scada securityScada security
Scada security
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 

Viewers also liked

ACTAtek Io box
ACTAtek Io boxACTAtek Io box
ACTAtek Io box
Aurangzeb Mufti
 
Easy recovery621 user guide sp
Easy recovery621 user guide spEasy recovery621 user guide sp
Easy recovery621 user guide sp
Claudio Pinto
 
Sm57 micrófono para instrumentos
Sm57 micrófono para instrumentosSm57 micrófono para instrumentos
Sm57 micrófono para instrumentos
nataly
 
Twitter #samfyc
Twitter #samfycTwitter #samfyc
Twitter #samfyc
Rafael Bravo Toledo
 
Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015
Dirk de Hamer
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-Balance
Nagraj Jain
 
Cogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotageCogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotage
Vanparijs Engineers
 
Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3
Jennifer Irene Guevara
 
01 Renaixement I Reforma
01 Renaixement I Reforma01 Renaixement I Reforma
01 Renaixement I Reformarafelsegui
 
Dermatomes & some relevant stuff
Dermatomes & some relevant stuff Dermatomes & some relevant stuff
Dermatomes & some relevant stuff
Mohammed Khalifa
 
Cuadrillas de trabajo
Cuadrillas de trabajoCuadrillas de trabajo
Cuadrillas de trabajo
equipo3admin2cl
 
Technical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook GameTechnical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook Game
Patrick Huesler
 
DeArGe Mitteilungen 2/2002
DeArGe Mitteilungen 2/2002DeArGe Mitteilungen 2/2002
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programminspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das ProgrammStefanie Kurz
 

Viewers also liked (14)

ACTAtek Io box
ACTAtek Io boxACTAtek Io box
ACTAtek Io box
 
Easy recovery621 user guide sp
Easy recovery621 user guide spEasy recovery621 user guide sp
Easy recovery621 user guide sp
 
Sm57 micrófono para instrumentos
Sm57 micrófono para instrumentosSm57 micrófono para instrumentos
Sm57 micrófono para instrumentos
 
Twitter #samfyc
Twitter #samfycTwitter #samfyc
Twitter #samfyc
 
Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-Balance
 
Cogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotageCogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotage
 
Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3
 
01 Renaixement I Reforma
01 Renaixement I Reforma01 Renaixement I Reforma
01 Renaixement I Reforma
 
Dermatomes & some relevant stuff
Dermatomes & some relevant stuff Dermatomes & some relevant stuff
Dermatomes & some relevant stuff
 
Cuadrillas de trabajo
Cuadrillas de trabajoCuadrillas de trabajo
Cuadrillas de trabajo
 
Technical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook GameTechnical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook Game
 
DeArGe Mitteilungen 2/2002
DeArGe Mitteilungen 2/2002DeArGe Mitteilungen 2/2002
DeArGe Mitteilungen 2/2002
 
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programminspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
 

Similar to ACTAtek ID-VIDEO

ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
Inaxsys Security Systems
 
Ak cess pro server brochure
Ak cess pro server brochureAk cess pro server brochure
Ak cess pro server brochure
Fanky Christian
 
T&Tec Overview
T&Tec OverviewT&Tec Overview
T&Tec Overview
Clemgros
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
team-WIBU
 
Mitsutech Training Manual.ppt
Mitsutech Training Manual.pptMitsutech Training Manual.ppt
Mitsutech Training Manual.ppt
PawachMetharattanara
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
maitretester
 
VIT profile
VIT profileVIT profile
VIT profile
VIT
 
Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo Catalogue
PERCo
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
Zoran Perisic
 
Axis and Intelligent Video
Axis and Intelligent VideoAxis and Intelligent Video
Axis and Intelligent Video
Axis Communications
 
Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Video
cnssources
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
team-WIBU
 
AVTECH products 2018
AVTECH products 2018AVTECH products 2018
AVTECH products 2018
Leonardo Todeschini
 
PRTG
PRTGPRTG
Web Based Cctv
Web Based CctvWeb Based Cctv
Web Based Cctv
satriyowibowo
 
Surveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature HighlightsSurveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature Highlights
Surveon Technology Inc.
 
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
HION IT
 
ZKTeco iClock580 Bangladesh
ZKTeco iClock580 BangladeshZKTeco iClock580 Bangladesh
ZKTeco iClock580 Bangladesh
Trimatrik Multimedia
 
AHD DVR manual-vcon
AHD DVR manual-vconAHD DVR manual-vcon
AHD DVR manual-vcon
patnaglobal
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
Javier Arrospide
 

Similar to ACTAtek ID-VIDEO (20)

ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
 
Ak cess pro server brochure
Ak cess pro server brochureAk cess pro server brochure
Ak cess pro server brochure
 
T&Tec Overview
T&Tec OverviewT&Tec Overview
T&Tec Overview
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
Mitsutech Training Manual.ppt
Mitsutech Training Manual.pptMitsutech Training Manual.ppt
Mitsutech Training Manual.ppt
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
VIT profile
VIT profileVIT profile
VIT profile
 
Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo Catalogue
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
 
Axis and Intelligent Video
Axis and Intelligent VideoAxis and Intelligent Video
Axis and Intelligent Video
 
Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Video
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
AVTECH products 2018
AVTECH products 2018AVTECH products 2018
AVTECH products 2018
 
PRTG
PRTGPRTG
PRTG
 
Web Based Cctv
Web Based CctvWeb Based Cctv
Web Based Cctv
 
Surveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature HighlightsSurveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature Highlights
 
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
 
ZKTeco iClock580 Bangladesh
ZKTeco iClock580 BangladeshZKTeco iClock580 Bangladesh
ZKTeco iClock580 Bangladesh
 
AHD DVR manual-vcon
AHD DVR manual-vconAHD DVR manual-vcon
AHD DVR manual-vcon
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

ACTAtek ID-VIDEO

  • 1. Everything is Secured... w w w . a c t a t e k . c o m Email: sales-asean@actatek.com Telephone: (65) 6515 4520 Fax: (65) 6515 4521 ACTAtek ID Video The all-in-one solution for integrated Access Control & Video Surveillance system Key Features & Benefits Tightly integrates with ACTAtek's award winning ID Management Platform. Combines benefits of Access Control, Time Atten-dance and Video Monitoring in one solution. IP Web Based Technology allows surveillance from any location in the World with WAN connection. Easy upgrade to any existing ACTAtek installation! Monitor and view real-time ACTAtek Event Logs under the 2-D Map. Administrator can pre-set the alerts event e.g. “DOOR IS OPEN”. When the pre-set alert event happened, a blink-ing red color icon with alert beep sound will display on the 2-D Map to inform administrators. Administrator can easily monitor and view the Event Logs ,and also playback the recorded Video clips by defining the search timing. e.g. +/- 10 secs of Event Logs. Administrator also can view and compare the User Photos with the Snapshot Photos under ID Video Log. MS SQL database technology.
  • 2. w w w . a c t a t e k . c o m Email: sales-asean@actatek.com Telephone: (65) 6515 4520 Fax: (65) 6515 4521 ACTAtek ID Video The all-in-one solution for integrated Access Control & Video Surveillance system ACTAtek ID Video is an add-on application of ACTAtek Access Manager to seamlessly combine Access Control System (ACTAtek) with Video Surveillance Management (IP Camera) in one platform. With ACTAtek ID Video, administrators can easily monitor the real-time ACTAtek Event Logs under the 2-D Map. Also by searching certain timing (+/- 10 secs) of Event Logs, administrators can just double click the Event Logs to playback the recorded Video clips under ID Video Log to help prevent the tail gating from happening. When a user initiates an authentication from any at an ACTAtek unit (fingerprint, RFID smartcard or PIN) in the network, the video stream from the ACTAtek camera is time-stamped. The result is an applica-tion that shows the ACTAtek event log, CMOScamera image and a selectable video option to see the authentication event. Searches can be performed for specific ACTAtek units, ID logs, individuals, specific days, time and so on - all the security information required. These features allow Security Directors to review potential "tail-gating" where one authentication and door open event results in multiple entry. System Overview ACTAtek ID Video compliments with ACTA3 and IP-based Reader Video Event Log 2D Map Viewer with Real-time Event Logs Viewer of Terminals (ACTA3/ IP-based Reader) Playback Video clip files linked with Event Logs ACTA3 IP-based Reader The application allows both 24/7 and motion detection operation. With Motion detection the user can limit the space to only events local to the ACTAtek units and doors that are monitored. 24/7 is continuous recording mode - suitable for situations where all continuous surveillance of the area is required. For more info visit ID Video Live Demo Installation & Troubleshooting http://www.actatek.com/video