SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Everything is Secured... 
w w w . a c t a t e k . c o m 
Email: sales-asean@actatek.com 
Telephone: (65) 6515 4520 
Fax: (65) 6515 4521 
ACTAtek 
ID Video 
The all-in-one solution for 
integrated Access Control & 
Video Surveillance system 
Key Features & Benefits 
Tightly integrates with ACTAtek's award winning ID 
Management Platform. 
Combines benefits of Access Control, Time Atten-dance 
and Video Monitoring in one solution. 
IP Web Based Technology allows surveillance from 
any location in the World with WAN connection. 
Easy upgrade to any existing ACTAtek installation! 
Monitor and view real-time ACTAtek Event Logs 
under the 2-D Map. 
Administrator can pre-set the alerts event e.g. “DOOR IS 
OPEN”. When the pre-set alert event happened, a blink-ing 
red color icon with alert beep sound will display on the 
2-D Map to inform administrators. 
Administrator can easily monitor and view the Event Logs 
,and also playback the recorded Video clips by defining 
the search timing. e.g. +/- 10 secs of Event Logs. 
Administrator also can view and compare the User Photos 
with the Snapshot Photos under ID Video Log. 
MS SQL database technology.
w w w . a c t a t e k . c o m 
Email: sales-asean@actatek.com 
Telephone: (65) 6515 4520 
Fax: (65) 6515 4521 
ACTAtek 
ID Video 
The all-in-one solution for 
integrated Access Control & 
Video Surveillance system 
ACTAtek ID Video is an add-on application of ACTAtek Access 
Manager to seamlessly combine Access Control System (ACTAtek) 
with Video Surveillance Management (IP Camera) in one platform. 
With ACTAtek ID Video, administrators can easily monitor the 
real-time ACTAtek Event Logs under the 2-D Map. Also by searching 
certain timing (+/- 10 secs) of Event Logs, administrators can just 
double click the Event Logs to playback the recorded Video clips 
under ID Video Log to help prevent the tail gating from happening. 
When a user initiates an authentication from any at an ACTAtek unit 
(fingerprint, RFID smartcard or PIN) in the network, the video stream 
from the ACTAtek camera is time-stamped. The result is an applica-tion 
that shows the ACTAtek event log, CMOScamera image and a 
selectable video option to see the authentication event. Searches 
can be performed for specific ACTAtek units, ID logs, individuals, 
specific days, time and so on - all the security information required. 
These features allow Security Directors to review potential 
"tail-gating" where one authentication and door open event results 
in multiple entry. 
System Overview 
ACTAtek ID Video compliments with 
ACTA3 and IP-based Reader 
Video Event Log 2D Map Viewer with 
Real-time Event Logs Viewer of Terminals 
(ACTA3/ IP-based Reader) 
Playback Video clip files linked with 
Event Logs 
ACTA3 
IP-based 
Reader 
The application allows both 24/7 and motion detection operation. With Motion detection the user can limit the space to only 
events local to the ACTAtek units and doors that are monitored. 24/7 is continuous recording mode - suitable for situations 
where all continuous surveillance of the area is required. 
For more info visit ID Video Live Demo Installation & Troubleshooting 
http://www.actatek.com/video

Contenu connexe

Tendances

BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityDeepakraj Sahu
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber SecurityOWASP EEE
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomPositive Hack Days
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation processAjay Ohri
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 

Tendances (20)

BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
The Stuxnet Worm creation process
The Stuxnet Worm creation processThe Stuxnet Worm creation process
The Stuxnet Worm creation process
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Scada security
Scada securityScada security
Scada security
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 

En vedette

Easy recovery621 user guide sp
Easy recovery621 user guide spEasy recovery621 user guide sp
Easy recovery621 user guide spClaudio Pinto
 
Sm57 micrófono para instrumentos
Sm57 micrófono para instrumentosSm57 micrófono para instrumentos
Sm57 micrófono para instrumentosnataly
 
Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015Dirk de Hamer
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceNagraj Jain
 
Cogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotageCogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotageVanparijs Engineers
 
Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3Jennifer Irene Guevara
 
01 Renaixement I Reforma
01 Renaixement I Reforma01 Renaixement I Reforma
01 Renaixement I Reformarafelsegui
 
Dermatomes & some relevant stuff
Dermatomes & some relevant stuff Dermatomes & some relevant stuff
Dermatomes & some relevant stuff Mohammed Khalifa
 
Technical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook GameTechnical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook GamePatrick Huesler
 
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programminspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das ProgrammStefanie Kurz
 

En vedette (14)

ACTAtek Io box
ACTAtek Io boxACTAtek Io box
ACTAtek Io box
 
Easy recovery621 user guide sp
Easy recovery621 user guide spEasy recovery621 user guide sp
Easy recovery621 user guide sp
 
Sm57 micrófono para instrumentos
Sm57 micrófono para instrumentosSm57 micrófono para instrumentos
Sm57 micrófono para instrumentos
 
Twitter #samfyc
Twitter #samfycTwitter #samfyc
Twitter #samfyc
 
Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015Dirk de Hamer Resume 2015
Dirk de Hamer Resume 2015
 
Relationship 3 Holistic-Balance
Relationship 3 Holistic-BalanceRelationship 3 Holistic-Balance
Relationship 3 Holistic-Balance
 
Cogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotageCogénération & fonctionnement en ilotage
Cogénération & fonctionnement en ilotage
 
Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3Marketing in Japan: Section 1 Part 1 of 3
Marketing in Japan: Section 1 Part 1 of 3
 
01 Renaixement I Reforma
01 Renaixement I Reforma01 Renaixement I Reforma
01 Renaixement I Reforma
 
Dermatomes & some relevant stuff
Dermatomes & some relevant stuff Dermatomes & some relevant stuff
Dermatomes & some relevant stuff
 
Cuadrillas de trabajo
Cuadrillas de trabajoCuadrillas de trabajo
Cuadrillas de trabajo
 
Technical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook GameTechnical Challenges of Developing a Facebook Game
Technical Challenges of Developing a Facebook Game
 
DeArGe Mitteilungen 2/2002
DeArGe Mitteilungen 2/2002DeArGe Mitteilungen 2/2002
DeArGe Mitteilungen 2/2002
 
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programminspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
inspirato Konferenz ZUKUNFT APOTHEKE 2013 - Das Programm
 

Similaire à All-in-One Access Control and Video Surveillance Solution from ACTAtek

Ak cess pro server brochure
Ak cess pro server brochureAk cess pro server brochure
Ak cess pro server brochureFanky Christian
 
T&Tec Overview
T&Tec OverviewT&Tec Overview
T&Tec OverviewClemgros
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentationmaitretester
 
VIT profile
VIT profileVIT profile
VIT profileVIT
 
Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CataloguePERCo
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVladaZoran Perisic
 
Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Videocnssources
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
Surveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature HighlightsSurveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature HighlightsSurveon Technology Inc.
 
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼HION IT
 
AHD DVR manual-vcon
AHD DVR manual-vconAHD DVR manual-vcon
AHD DVR manual-vconpatnaglobal
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 

Similaire à All-in-One Access Control and Video Surveillance Solution from ACTAtek (20)

ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
 
Ak cess pro server brochure
Ak cess pro server brochureAk cess pro server brochure
Ak cess pro server brochure
 
T&Tec Overview
T&Tec OverviewT&Tec Overview
T&Tec Overview
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
Mitsutech Training Manual.ppt
Mitsutech Training Manual.pptMitsutech Training Manual.ppt
Mitsutech Training Manual.ppt
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
VIT profile
VIT profileVIT profile
VIT profile
 
Turnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo CatalogueTurnstiles & Access Control Systems. PERCo Catalogue
Turnstiles & Access Control Systems. PERCo Catalogue
 
Opis softera i ModulaENVlada
Opis softera i ModulaENVladaOpis softera i ModulaENVlada
Opis softera i ModulaENVlada
 
Axis and Intelligent Video
Axis and Intelligent VideoAxis and Intelligent Video
Axis and Intelligent Video
 
Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Video
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
AVTECH products 2018
AVTECH products 2018AVTECH products 2018
AVTECH products 2018
 
PRTG
PRTGPRTG
PRTG
 
Web Based Cctv
Web Based CctvWeb Based Cctv
Web Based Cctv
 
Surveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature HighlightsSurveon Video Management Solutions - Feature Highlights
Surveon Video Management Solutions - Feature Highlights
 
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
시크 SICK Lector63x 2D DPM스캐너 고정식바코드스캐너 산업용바코드리더 이미지스캐너 매뉴얼
 
ZKTeco iClock580 Bangladesh
ZKTeco iClock580 BangladeshZKTeco iClock580 Bangladesh
ZKTeco iClock580 Bangladesh
 
AHD DVR manual-vcon
AHD DVR manual-vconAHD DVR manual-vcon
AHD DVR manual-vcon
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

All-in-One Access Control and Video Surveillance Solution from ACTAtek

  • 1. Everything is Secured... w w w . a c t a t e k . c o m Email: sales-asean@actatek.com Telephone: (65) 6515 4520 Fax: (65) 6515 4521 ACTAtek ID Video The all-in-one solution for integrated Access Control & Video Surveillance system Key Features & Benefits Tightly integrates with ACTAtek's award winning ID Management Platform. Combines benefits of Access Control, Time Atten-dance and Video Monitoring in one solution. IP Web Based Technology allows surveillance from any location in the World with WAN connection. Easy upgrade to any existing ACTAtek installation! Monitor and view real-time ACTAtek Event Logs under the 2-D Map. Administrator can pre-set the alerts event e.g. “DOOR IS OPEN”. When the pre-set alert event happened, a blink-ing red color icon with alert beep sound will display on the 2-D Map to inform administrators. Administrator can easily monitor and view the Event Logs ,and also playback the recorded Video clips by defining the search timing. e.g. +/- 10 secs of Event Logs. Administrator also can view and compare the User Photos with the Snapshot Photos under ID Video Log. MS SQL database technology.
  • 2. w w w . a c t a t e k . c o m Email: sales-asean@actatek.com Telephone: (65) 6515 4520 Fax: (65) 6515 4521 ACTAtek ID Video The all-in-one solution for integrated Access Control & Video Surveillance system ACTAtek ID Video is an add-on application of ACTAtek Access Manager to seamlessly combine Access Control System (ACTAtek) with Video Surveillance Management (IP Camera) in one platform. With ACTAtek ID Video, administrators can easily monitor the real-time ACTAtek Event Logs under the 2-D Map. Also by searching certain timing (+/- 10 secs) of Event Logs, administrators can just double click the Event Logs to playback the recorded Video clips under ID Video Log to help prevent the tail gating from happening. When a user initiates an authentication from any at an ACTAtek unit (fingerprint, RFID smartcard or PIN) in the network, the video stream from the ACTAtek camera is time-stamped. The result is an applica-tion that shows the ACTAtek event log, CMOScamera image and a selectable video option to see the authentication event. Searches can be performed for specific ACTAtek units, ID logs, individuals, specific days, time and so on - all the security information required. These features allow Security Directors to review potential "tail-gating" where one authentication and door open event results in multiple entry. System Overview ACTAtek ID Video compliments with ACTA3 and IP-based Reader Video Event Log 2D Map Viewer with Real-time Event Logs Viewer of Terminals (ACTA3/ IP-based Reader) Playback Video clip files linked with Event Logs ACTA3 IP-based Reader The application allows both 24/7 and motion detection operation. With Motion detection the user can limit the space to only events local to the ACTAtek units and doors that are monitored. 24/7 is continuous recording mode - suitable for situations where all continuous surveillance of the area is required. For more info visit ID Video Live Demo Installation & Troubleshooting http://www.actatek.com/video