Manufacturing in a safe and secure environment

Creating a safe, secure and productive environment requires protection against a wide range of risks, whether the manufacturing process is automated fully, partially or not at all.
Using our video AI based analysis, you can detect hazardous conditions or, safety and security threats quickly and reliably. Through immediate alarm or alert notifications, corrective actions can be initiated with everything and fully documented. Interfaces with other operational and security subsystems, for instance the process data or, the access control system, provide additional operational advantages and security. With graphical site maps, you always have a complete overview of all events and can process alarms and alerts centrally.
We help you select the right technology based solutions to perfectly meet your needs.
Site Security
Reliable detection
Intelligent video analysis detects anomalies that are a threat to safety and/or security automatically.
Fast alarms
Alarm image display alongside live streams of the current situation provides relevant information quickly. With the support of the integrated response plans, you can concentrate on taking the proper actions.
Individual integration
Graphical maps provide a comprehensive overview, including information from third-party systems. You can define yourself what is displayed and how it is shown
Plant Perimeter Protection
The first step of an intruder into your object is taken across your property boundaries. Secure them with a combination of suitable outdoor cameras and the certified video analysis system G-Tect/VMX. Use of thermal imaging cameras like the G-Cam/PTHC is ideal. They provide reliable detection even without additional lighting, over greater distances. Additional movable overview cameras that monitor the alarm zone immediately provide you with valuable information, allowing you to assess the situation and take further measures. Using interfaces you can also easily integrate third-party systems such as fence detection systems for two-detector dependency.
The advantages at a glance
Security, self-defined
Monitor sensitive areas precisely with the help of intelligent alarm zones that you define yourself.
Security made simple
The system settings are so easy to define that you can configure and adapt them yourself.
Enhanced security
By connecting third-party systems, such as perimeter detection, you can increase your security level.


Operational efficiency from detailed information management
If the system reports an alarm or alert, according to the procedures you predefined, you are informed immediately. For a quick assessment of situation, information, recordings and live video images are displayed together. Whether in the control center on-site or over a network, you maintain an overview and can act accordingly! The G-SIM security management software supports your security and operational personnel with graphic maps for a clear picture of the situation. Individually definable action plans, which are processed step-by-step, help keep the situation manageable. Connected third-party systems are fully integrated into the display as well.
The advantages at a glance
An overview of all areas
At all times, you have a complete picture of the situation and can immediately initiate targeted measures when an incident occurs.
Remain calm when an alarm oc curs
The alarm is presented in a clear and understandable manner and the processing plans provide you with effective support, allowing you to remain calm and concentrated.
Analysis for prevention
You also work preventively, comprehensively analyzing causes with useful tools.
Control Manufacturing Plant Access with License Plate Recognition
Reliable entrance and exit control with automatic number plate recognition protects you from unauthorized vehicles on your property. Because our special camera, analysis software and lighting work together in perfect harmony, you are able to reliably detect vehicle number plates.
With the Vehicle Access Manager, you can define in advance when a vehicle is expected or allowed to leave. Barriers and gates are then controlled automatically. An unauthorized attempt to enter or exit instantly generates an message for the desired recipient, for instance at the gate.
The advantages at a glance
Complete control
Vehicle movements are recorded and documented using number plates and vehicle data.
Efficient access control
Central processing of access permissions makes an efficient process possible.
Verifiable processes
All entrances and exits and length of stays are clearly presented in clear reports.


Documented Security at every Entrance
Just like in vehicle access, employee entrances must be monitored and documented so that no unauthorized personnel gain access to your facility. In areas where security is critical, a turnstile with video verification of badge use is a best practice. Additional personal inspection may also be necessary, using metal detectors and X-ray scanners.
The fact that this process has been carried out carefully and conscientiously while still respecting all personal rights can be recorded using video documentation and logged as evidence for use in legal proceedings.
The advantages at a glance
Easy integration
Easily connect the access control, X-ray scanner and the video management. All images are thus ordered immediately.
Clear playback
All camera images are displayed synchronously. This allows you to maintain an overview when searching.
Fast search operations
With the help of additional recorded data, you can find the relevant images immediately, using for example the time and date or the visitor badge number.
Image Documentation and High-Speed Search
Many security incidents are unfortunately discovered after the fact. For clarification in terms of legal liability and to prevent similar incidents in the future, complete documentation of all operations in the image is extremely helpful. Cause analysis and preservation of evidence are performed efficiently and conveniently right on the Video Management System or from your workstation. When performing a search operation, in addition to the time and date you can use other information, even from third-party systems, that was saved with the images. For example, you can search for a recorded number plate or the name or ID number of a person who was recorded using the access control system. Searching for movement in certain areas of the image can also be performed quickly and easily and can be extremely helpful.
The advantages at a glance
Fast search operations
Find the images you are looking for with just a few clicks of the mouse. You can find out what happened when, find movement in defined areas of the image or find pictures of the vehicle with the desired number plate.
Easy preservation of evidence
Once found, you can export the images in the desired format – as photos in a PDF with additional comments or a whole image file. They can also be encrypted and password-protected for a complete, secure chain of evidence
Efficient prevention
Analyze the processes before and during an incident to define preventive measures. The fluid, synchronous image playback from multiple cameras also, with fast-forward or rewind functionality, is extremely helpful in this situation.


Reliability, Redundancy and, Data Protection with Audit
A security system must be absolutely reliable. Redundancy in hardware and fail-over solutions in software offer comprehensive reliability. When errors do occur, reporting procedures provide information immediately. The integrated scene validation for sabotage protection ensures that
all cameras remain in their correct positions, recording the intended areas. Data protection is ensured through a comprehensive user rights management system, including two-person password functionality. Comprehensive options for privacy zones also support personal data
protection. The integrated audit function documents every operator action, allowing you to have a complete overview of the work of the security personnel.
The advantages at a glance
Availability according to needs
Use our offer of redundancy in hardware and fail-over solutions on the software side to create your individual desired level of availability. Check the status of the system easily using the web tool. Automatically keep informed by the service technician regarding defects.
User rights according to needs
Easily and centrally define the access rights for each user, each user group or each workstation – individually, flexibly and efficiently. You can even set up priorities for the control of moveable cameras depending on the user or status.
Monitoring according to needs
Monitor and review the work of all users using the integrated audit function. Sift and analyze all system and operational processes using the tamperproof, seamless, system-internal logging.