Axxon software will be presented from the 19th to the 22nd of September at the ASIS 2011 conference in Orlando (Florida, USA).

The video surveillance system Axxon Smart PRO will be on display at the stands of AxxonSoft technological partners IP camera producers CNB (booth 1331) and Arecont Vision (booth 3611). Booth visitors will have the chance to see for themselves how Axxon Smart PRO interacts with IP cameras. They will also learn about unique features of Axxon Smart PRO and experience extended video archive search capabilities with the Forensic Search module.

Axxon Smart PRO is a professional video surveillance system for small and midsize deployments and was the first to contain a number of innovative AxxonSoft developments. One of the key novelties is the smart archive search technology - Forensic Search which lets the user quickly find relevant footage of events in the archive. Therefore, video detection tools do not need to be preset as all search criteria are specified directly when the search entry is given via the user interface. The search is performed using metadata i.e. the parameters of objects moving in the frame which are calculated in real time and stored in the archive along with the video.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...