Real-Time Unusual Behavior and Threat Detection
From Intelex Vision Ltd
iSentry Processing Server
iSentry Deep Learning Server
iSentry Plugin for XProtect
iSentry Deep Learning Server v1.0.8
iSentry Plugin for XProtect v1.0.8
MS SQL Server 2016 or higher
From Milestone Systems
Professional Plus 2019 R1 or higher.
Expert 2019 R1 or higher.
Corporate 2019 R1 or higher.
iSentry - Real-Time Unusual Behavior and Threat DetectioniSentry is an AI powered Video Analytics platform designed to analyse from a few to thousands of CCTV cameras in real-time and give that information to controllers immediately in the form of video alerts that are enriched through multiple data points to block out the noise of live video.
This provides the ability to identify potential threats to security, operational challenges and opportunities, health and safety violations and regulatory compliance and can provide actionable insights all in one place.
ISentry has 3 core core capabilities 1) Unusual Behaviour detection and analysis, 2) Threat Detection & Extraction and 3) Customisable security, safety & compliance detection.
- Real-Time Unusual Behavior Detection. Vastly reduces the amount of video an operator needs to monitor through unsupervised artificial intelligence.
- Threat Detection and Extraction. Allows to detect and identify moving threats at far distances or fast moving over a narrow area.
- Specific compliance monitoring such as mask wearing, occupancy control and social distancing
- Rules engine plays the role of an operator, insofar as it can autonomously decide if an alert should be forwarded as an alarm, or dismissed.
- Efficient Scaling. The system is designed specifically to be efficient, and to be largely hardware agnostic.
IndustriesAirports City Surveillance Construction Critical Infrastructure Education Finance & Insurance Healthcare Manufacturing Public Transport Seaports Traffic Monitoring Utilities
TechnologiesAccess Control Systems Analytics Building Systems Environmental Detection Facial Recognition Fire and Smoke Detection Human Detection / Tracking Identity Management Intrusion Systems Motion Detection Object Detection / Tracking Operator Software Perimeter Protection Systems Situational Awareness Smart Client Plug-ins Tailgating Tripwire
Area of practice1,000+ cameras in one system 100+ sensors in one system Access Control Central Monitoring Detection / Deterrence Intrusion / Alarm Monitoring Surveillance Video verification
ChallengesControl access to restricted areas Gather evidence for criminal investigations Prevent multiple people from entering a door on a single access badge Prevent vandalism Provide evidence against injury lawsuits Provide situational awareness to response teams React to confrontations before they escalate Reduce employee theft / shrinkage Reduce property damage Reduce workplace accidents Respond to medical emergencies as quickly as possible
How to install
This is where you can find additional documentation
|Installation and Configuration||pdf Download (4.68 MB)|
|Operator Guide||pdf Download (2.03 MB)|
|iSentry - Milestone architecture||pdf Download (142.86 KB)|
|TREX Technical Integration and Operational Guidelines||pdf Download (1.47 MB)|
Has proven compatibility with the following Milestone versions:
XProtectExpress+2019 R3, 10/08 2019
XProtectCorporate2019 R3, 10/08 2019
XProtectExpert2019 R3, 10/08 2019
XProtectProfessional+2019 R3, 10/08 2019
Is also expected to work with:
XProtectExpress+2019 R1, 02/05 2019 and later
XProtectCorporate2019 R1, 02/05 2019 and later
XProtectExpert2019 R1, 02/05 2019 and later
XProtectProfessional+2019 R1, 02/05 2019 and later
Your location is: United States
- British Indian Ocean Territory
- Burkina Faso
- Cape Verde
- Central African Republic
- Congo, the Democratic Republic of the
- Cote d´Ivoire
- Equatorial Guinea
- Saint Helena, Ascension and Tristan Da Cunha
- Sao Tome and Principe
- Sierra Leone
- South Africa
- Western Sahara
- Hong Kong
- Palestinian Territory, Occupied
- Saudi Arabia
- United Arab Emirates
- Aland Islands
- Bosnia and Herzegovina
- Czech Republic
- Faroe Islands
- Isle Of Man
- Netherlands Antilles
- San Marino
- Svalbard And Jan Mayen
- United Kingdom
- United States
Language versions available
Prevent multiple people from entering a door on a single access badge
So-called “piggybacking,” where two people use one access code to enter a building, is a common issue with secure buildings. Anti-passback access control, mobile credentials, facial recognition, and other technologies can help prevent this.
Provide evidence against injury lawsuits
Legal teams need good systems in place to find evidence and share it with the right people. For example, they may need to review video footage that shows the moment a worker receives an injury – and what that worker was doing at that time. This critical evidence can be the proof that legal teams need to prove fault in the case of an injury lawsuit.
React to confrontations before they escalate
It’s important to identify potential confrontations quickly, so you can difuse or disable them. Whether it’s a fight outside the bar or an angry customer at a bank – technology is available to identify these situations and react quickly and appropriately.
Provided by PureTech Systems, Inc.
Analytics, Critical Infrastructure, Provide situational awareness to response teams, Artificial Intelligence, Perimeter Protection Systems, Tailgating
Provided by viisights
Analytics, Artificial intelligence, City Surveillance, Critical Infrastructure, Artificial Intelligence