Pelco™ by Schneider Electric™ and HuXinHuTong (Megaeyes) Co. Ltd. are announcing the integration of Pelco network cameras, including Sarix Mega-Performance Cameras (IX, IM, ID series cameras), Spectra IP High Definition cameras, and multi-channel Network Encoders with the full range of HuXinHuTong (Megaeyes) Video Management Platform.

“We are very excited about the new level of interoperability achieved between Megaeyes VMS and Pelco edge devices,” says Dave deLisser, director of integration business development, Pelco by Schneider Electric. “This successful collaboration demonstrates both companies’ commitment to openness. By working together we are able to provide our joint customers with the flexibility and solutions they are asking for.”

“Now the products from both companies have finished initial integration,” says XiangJiao, cooperation department manager of HuXinHuTong. “In the future, the two parties will leverage their own advantages and strengthen cooperation in the network video surveillance field to provide customers with better overall solutions for network video surveillance while enhancing the competitiveness of our projects.”

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...