
Security in Correctional Facilities from Geutebrück
In correctional facilities, security is the top priority. For this reason, they must be designed that the main goal of the facility, the rehabilitation of the inmates, is not overlooked. A reliable and powerful video security solution, fully integrated with other security systems, it is essential. Our internally developed video analysis for outdoor security, moreover, is particularly suitable for the classic „sterile zone“. Allowing you to rely on the security systems.
Simple and Reliable
High level of availability and intuitive controls for your security
Recognize and Respond
You detect critical situations quickly and can take measures to de-escalate the situation
Document and Provide Evidence
You can analyze events comprehensively and optimize your security
Perimeter Protection
The greatest risk – and the one that draws the most media attention – is the potential escape of prisoners. The most effective protection is early detection of every attempt, and every attempt to provide help from the outside. The G-Tect/VMX video analysis system, developed by us and certified by independent third parties, uses user-defined alarm zones and alarm criteria to detect even the smallest movements. At the same time, it can reliably distinguish between human activity and animals or the effects of weather. The system can also detect objects, such as contraband or tools, that are thrown over a wall or fence or that are handed from one window to the next along the outer edge. Critical situations are detected immediately. The personnel can intervene preventively.
The advantages at a glance
Security, Self-Defined
Monitor sensitive areas precisely with the help of intelligent alarm zones that you define yourself.
Security Made Simple.
The system settings are so easy to define that you can configure and adapt them yourself.
Enhanced Security.
By connecting third-party systems, such as perimeter detection, you can increase your security level.


Number Plate Detection and Access Control
Strict entrance and exit control are a necessity in prisons. You can optimize this process and reduce your staff‘s workload using our automatic number plate recognition system. Because the special camera, analysis software, and lighting work together in perfect harmony, you are able to reliably detect vehicle number plates. With the Vehicle Access Manager, you can define in advance when a vehicle is expected or allowed to leave. Barriers and gates are then controlled automatically. An unauthorized attempt to enter or exit instantly generates an alarm in the control room.
The Advantages at a Glance
Complete Control
Vehicle movements are recorded and documented using number plates and vehicle data.
Efficient Access Control
Central processing of access permissions makes an efficient process possible.
Verifiable Processes
All entrances and exits and lengths of stays are clearly presented in clear reports.
Cell Observation
Depending on the legal and regional requirements, suicidal or violent prisoners must be supervised intensively and individually observed, for example. But the right to privacy must be respected in these situations as well. To this end, our solutions offer extensive options: Individual private areas can be flexibly defined, for example, where the camera image would show the sanitary facilities. Also, moving objects or persons can be pixelated in the image. If necessary, these areas can be made visible again, either using a simple password or requiring passwords from two separate individuals. Critical situations can thus not only be detected and defused, they can also be documented as evidence for legal proceedings.
The advantages at a glance
Monitoring Within Limits
Maintain the privacy of inmates who must be monitored individually.
Comprehensive Documentation
Easily analyze the events at a later date, if necessary removing the privacy zones.
Detailed Logging
Document all operating procedures using tamper-proof and gapless logging.


Information & Alarm Management
Safety-relevant areas can be monitored and recording using the corresponding appropriate resolution. Of course, bandwidth-saving tools are available. Live images can be displayed in real-time together with recordings. The analysis of the causes of an event and the assessment of the effect of measures taken can thus take place in parallel. The intuitive security management system G-SIM provides efficient help. Since experience alone is not enough in stressful situations, G-SIM also actively provides support with predefined alarm processing steps. Whether alarms, virtual tours or routine information: The representation is uniform and is complemented by maps and information windows. And for a comprehensive picture of the situation, third-party systems such as access control or locking systems and fire or burglar alarm systems can be integrated via the interface. Unusual behavior and dangerous situations can be analyzed precisely in the control center and escalating measures can be taken immediately.
The Advantages at a Glance
An Overview of All Areas
At all times, you have a complete picture of the situation and can immediately initiate targeted measures when an incident occurs.
Remain Calm When an Alarm Occurs
The alarm is presented in a clear and understandable manner and the processing plans provide you with effective support, allowing you to remain calm and concentrated.
Analysis for Prevention
You also work preventively, comprehensively analyzing causes with useful tools.
Documented Security at the Entrance
The entrance is an extremely critical area, representing the interface to the outside world. The performance of security procedures, such as X-ray scanning, can be recorded using video documentation and documented as evidence for use in legal proceedings.
The Advantages at a Glance
Easy Integration
Easily connect the access control, X-ray scanner, and video management. All images are thus ordered immediately.
Clear Playback
All camera images are displayed synchronously. This allows you to maintain an overview when searching.
Fast Search Operations
With the help of additional recorded data, you can find the relevant images immediately, using for example the time and date or the visitor badge number.


Redundancy & Data Protection
A security system must be reliable. Redundancy in hardware and fail-over software solutions offer comprehensive reliability. Errors trigger predefined reporting and alarm procedures immediately. Integrated camera position authentication (CPA) ensures all cameras remain in their correct positions, recording intended areas. Data protection is ensured via a comprehensive user rights management system. The audit function documents every operator's action, ensuring liability issues after incidents are documented reliably.
The Advantages at a Glance
Availability According to Needs
Use our redundancy and fail-over solutions to create your desired level of availability. System status can be checked using a web tool, and technicians are automatically informed of defects.
User Rights According to Needs
Define access rights for each user or group centrally, efficiently, and flexibly. Prioritize control of moveable cameras based on user status.
Monitoring According to Needs
Monitor and review user actions with the audit function. Analyze all system processes with tamper-proof, seamless logging.