C3fusion supports the management and resolution of incidents by guiding operators through predetermined policies called workflows. Here’s how it works:
- Incoming Events (Alarms) are routed from the Server to the Operator’s Alarm List in the Command and Control center of the Client Workstation. These Events can be shown in context by corresponding symbols and assets on a map interface.
- Once an operator (user) takes ownership of a triggered event, CaseMaker generates a case workflow document that includes the associated cameras within the vicinity of the triggered event. Both live view and recent archived video of the triggered event can be viewed and archived within the workflow document.
- The workflow document within CaseMaker includes step-by-step instructions in conjunction with the policies and procedures of the secured facility, including notes, snapshots, and a chat feature for communication between operators. C3fusion can initiate site lockdowns, emergency communications and other security tasks automatically.
- Once an incident is resolved, all of the related information is saved as a case in the server database. Stored Case data can be searched, reviewed and printed using the C3fusion Case Explorer program.
Here are a few cutting-edge 3rd party solutions that are even more powerful when part of a C3fusion command and control environment.
Cyber Extruder – Aureus 3D Facial Recognition Software
CyberExtruder quickly and accurately models a complete human using a holistic 3D approach, mitigating errors in face matching due to subject pose (the angle of the person’s face relative to the camera) and expression (the person’s innate ability to deform their face). Aureus 3DV is the only software available which performs 3D facial recognition matching while using conventional video as an input. Aureus 3DV does this by reconstructing a subject’s facial image, in a 3D format, and factors in varied poses and facial expressions, compensates for poor lighting – and even partial images.
Enhance monitoring using 3D Facial Recognition
C3fusion can monitor gated entries using Aureus 3D facial recognition to ensure only authorized personnel have access to the area and to report when “black listed” individuals are attempting to gain access. Upon identification of the black listed individual, an alarm is sounded, a site shutdown can be executed, and the appropriate personnel can be notified via email, text, phone, PA, and other types of media. Personnel in the Systems Operation Center are automatically presented with a map of the potential breach as well as live views of all associated cameras in the facility. The operator is presented with a snapshot of the “black listed” individual as well as the gallery image used to identify the candidate. Controls for locking gates, executing site lockdowns and other types of responses can also be displayed.
Another interesting use of C2fusion and the Aureus 3D facial recognition is rather than using it to identify “black-listed” individuals, it can be used to identify “white-listed” and send an alert when a non-identifiable person is on the property. This would make sense in a highly secure area where only certain employees are allowed and their 3d images are registered within the Aureus software. If someone who is NOT registered gets picked up by the camera, an alarm can alert the monitoring team who can be prompted to send someone to investigate.
HGH InfraRed Systems – SPYNEL 360º Thermal Imaging Systems
The SPYNEL 360º thermal imaging systems take wide-area surveillance to the next level. It gives early intrusion alert to any type of target. Equipped with CYCLOPE advanced motion detection software, it provides unprecedented real-time security against conventional and asymmetrical threats.
Perimeter Threat Monitoring with Thermal Radar
The outer proximity of a facility is secured using Spynel thermal radar. C3fusion is notified when someone, or something, is approaching the secured area. GPS location and vector of the approaching target is provided. C3fusion displays the location of the target on a geo-coordinated map and automatically directs a PTZ camera to the fence sector to identify the threat. Upon identification, the system can also automatically dispatch an unmanned ground vehicle as a first responder to confirm and identify the breach activity. Live personnel can also be automatically dispatched.
SENSTAR – FlexZone Perimeter Detection System
Senstar’s fence-mounted FlexZone sensor detects and locates any attempt to cut, climb or otherwise break through a fence. It accurately locates intrusions even when there are multiple simultaneous intrusions and in the presence of background environmental noise. FlexZone can detect and locate perimeter intrusions over a distance of up to 600 meters (1,968 feet) per sensor processor, and within 3 meters (or 10 feet) of accuracy.
Perimeter Breach Monitoring
C3fusion can monitor the fence perimeter using the Senstar FlexZone perimeter detection system, and notify the operator when the fence is being breached and provide live view of the cameras within the vicinity of the breach. An unmanned ground vehicle can also provide eyes-on situational awareness via its camera and sensor packages
Unmanned Ground Vehicles (UGVs) for Surveillance
Unlike aerial drones or underwater robotics, Unmanned Ground Vehicles (UGVs) operate on land and navigate without a human driver. UGVs maneuver on most types of terrain for surveillance and maintenance patrols. When it comes to security, UGVs can be equipped to assist and extend human capabilities to perform what is normally deemed dirty, dull and dangerous, leaving manpower to focus on the greater security risks facing society today.
UGVs Can Integrate with C3fusion
Typically, unmanned ground vehicles have multiple sensors within its’ mechanism. The sensors include GPS location, multiple high definition cameras as well as PTZ cameras, temperature, infra-red detectors, chemical detectors, etc. The UGVs can automatically patrol a perimeter area and feed its’ sensor information back to C3fusion.
C3fusion can display the UGV’s location on a geo-referenced map and create an event for any sensor which is out of limits. In addition, C3fusion can monitor other sensors within its network and when an event occurs, dispatch the UGV to that location to provide correlating data for the event.
C3fusion brings it all together. Contact us today to get started.