Vi håller fortfarande på att lära oss ditt språk
Vi arbetar hårt för att göra alla sidor på milestonesys.com tillgängliga på så många språk som möjligt, men processen tar tid. Även om alla våra funktioner finns på flera språk. Vissa sidor, som denna, är inte tillgängliga på ditt lokala språk ännu.
Tack för visad förståelse.
C2P -Access Control Integrations
The ConvergenceTP (C2P) framework makes the Smart Client the head-end for monitoring access events.
Från ConvergenceTP
-
C2P Access Control Proxy
-
C2P Base
Från Milestone Systems
-
Milestone XProtect
-
Milestone XProtect
-
Milestone XProtect
C2P -Access Control Integrations - The ConvergenceTP (C2P) framework makes the Smart Client the head-end for monitoring access events.
The ConvergenceTP (C2P) integration framework makes the Milestone’s XProtect® Smart Client the head-end for monitoring Access Control.As with all C2P integrations the Access Control metadata received is presented and stored time synchronized with all cameras connected to the Milestone XProtect system.
The C2P integration framework provides XProtect users with a variety of powerful tools for both real-time analytics and alert pop-ups for specific Access Control events as well a powerful suite of forensic search, auditing and data mining tools for the stored Access Control events.
Key features
- All Access Control metadata is stored time-synchronized with all cameras attached to the XProtect system.
- All metadata is searchable via a powerful suite of text search tools with all search results linked to the video of the event stored by Milestone.
- The C2P Access Control integration provides real-time onscreen visual confirmation of specific user defined Access Control activity.
- The real-time rules engine tools include user defined Alert pop-up forms that allow the user to add notes to the access control event in real-time.
- Users can define onscreen Standard Operating procedures (SOP) that come up in the Smart Client when the defined event occurs.
How to install
Documentation
This is where you can find additional documentation
C2P Access Control User Guide | pdf Download (795,04 KB) |
C2P Access Control integration with Milestone Brochure | pdf Download (795,04 KB) |
Specification
Has proven compatibility with the following Milestone versions:
-
XProtectExpress2018 R3, 10-02 2018
-
XProtectProfessional2018 R3, 10-02 2018
-
XProtectExpress+2018 R3, 10-02 2018
-
XProtectCorporate2018 R3, 10-02 2018
-
XProtectExpert2018 R3, 10-02 2018
-
XProtectProfessional+2018 R3, 10-02 2018
Is also expected to work with:
-
XProtectExpress2016, 12-15 2015 och senare
-
XProtectProfessional2016, 12-15 2015 och senare
-
XProtectExpress+2017 R2, 06-08 2017 och senare
-
XProtectCorporate2016, 12-15 2015 och senare
-
XProtectExpert2016, 12-15 2015 och senare
-
XProtectProfessional+2017 R2, 06-08 2017 och senare
Country availability
Your location is: Förenta Staterna
-
ASIA-PACÍFICO
- Förenade Arabemiraten
- Japan
- Jordanien
- Saudiarabien
-
EUROPE
- Belgien
- Danmark
- Finland
- Frankrike
- Färöarna
- Grekland
- Irland
- Island
- Israel
- Italien
- Malta
- Monaco
- Nederländerna
- Norge
- Polen
- Portugal
- Schweiz
- Spanien
- Storbritannien
- Sverige
- Tyskland
- Österrike
-
NORTH AMERICA
- Bermuda
- Costa Rica
- Dominikanska Republiken
- Förenta Staterna
- Grönland
- Kanada
- Mexico
-
OCEANIA
- Amerikanska Samoa
- Australien
- Franska Polynesien
- Guam
- Kiribati
- Nya Zeeland
- Puerto Rico
-
SOUTH AMERICA
- Anguilla
- Antigua och Barbuda
- Argentina
- Aruba
- Bahamas
- Barbados
- Belize
- Bolivia
- Bonaire, Sint Eustatius och Saba
- Brasilien
- Caymanöarna
- Chile
- Colombia
- Curaçao
- Dominica
- Ecuador
- El Salvador
- Falklandsöarna
- Grenada
- Guatemala
- Guyana
- Haiti
- Honduras
- Jamaica
- Jungfruöarna, Brittiska
- Jungfruöarna, USA
- Martinique
- Montserrat
- Nicaragua
- Panama
- Paraguay
- Peru
- Surinam
- Trinidad och Tobago
- Uruguay
- Venezuela
Language versions available
Similar pages

Tillhandahålls av IronYun, Inc.
Airports, Critical Infrastructure, Education, Healthcare, Retail, Traffic Monitoring

Tillhandahålls av Brivo Systems LLC
Multi site, Software as a Service (Saas), Control access to restricted areas

Tillhandahålls av Forlan GmbH
Active threat, Analytics, Critical Infrastructure, Seaports, Provide situational awareness to response teams, Perimeter Protection Systems

Tillhandahålls av Irisity
Detection / Deterrence, Investigation, Analytics, Cloud Services, On premise

Tillhandahålls av StarWind Software Inc.
Airports, Healthcare, Information Technology, Manufacturing, Seaports, Traffic Monitoring

Tillhandahålls av Wasabi Technologies
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (Saas), Cloud, Storage, Cloud Services

Tillhandahålls av Tiger Technology
Storage, Airports, City Surveillance, Finance & Insurance, Information Technology, Cloud

Tillhandahålls av Forlan GmbH
Analytics, Anonymization / Redaction, Artificial intelligence, Artificial Intelligence, LPR/ANPR, Object Detection / Tracking

Tillhandahålls av 2N Telekomunikace
Door hardware, Intercoms, Multi site, Control access to restricted areas, Provide situational awareness to response teams, Mobile identity / credentials

Tillhandahålls av SenSen
1,000+ cameras in one system, Active threat, Provide situational awareness to response teams, Artificial Intelligence, Human Detection / Tracking, Incident Management

Tillhandahålls av Advancis Software & Services GmbH
Emergency management, Incident management, Information Technology, PSIM / Command and Control, Custom Development, System Integration

Tillhandahålls av Axis Communications
Forensic analysis, Up to 1,000 cameras in one system, Vertical focus, Critical Infrastructure, Public Transport, Smart Client Plug-ins

Tillhandahålls av Dallmeier electronic GmbH & Co.KG
Analytics, Cameras, Airports, City Surveillance, Critical Infrastructure, Manufacturing

Tillhandahålls av ACIC s.a.
Analytics, City Surveillance, Critical Infrastructure, Artificial Intelligence, Object Detection / Tracking, Custom Development

Tillhandahålls av 2N Telekomunikace
Door hardware, Intercoms, Security, Control access to restricted areas