SALTO and Wavestore to deliver video, data and access control management solution

SP&T Staff
Wednesday June 13, 2018
Written by
SALTO and Wavestore have established a technology partnership that allows operators to visually verify the identity of anyone attempting to gain access to a site or sensitive areas of a building.

The integration of the two companies’ software platforms means users of SALTO Access Control can now view event-driven video captured by cameras connected to the Linux-based and open platform Wavestore Video Management Software (VMS).

“Interaction between access control and video surveillance systems has been possible for some time,” said Enrico Bizzaro, head of integrations for Wavestore. “However, with the Wavestore VMS able to quickly process large amounts of metadata, we are now able to provide operators with a powerful tool to instantly display detailed information on who, when and where staff and visitors entered or moved around a building.”

The integration enables operators to visually verify in real-time all access control activity via the Wavestore Graphical User Interface (GUI).

A virtual spot monitor can be set up to display video captured by cameras associated with the door where an event is occurring. Colour-coded text is generated to enable operators to more quickly identify the type of event, e.g., green for access granted and red when access is denied, while the operator also has access to data such as the name, job title, ID number and image of the person attempting to gain access.

Operators are also alerted if a door is forced open and are able to see who is trying to break-in and where the door is located on a map of the building.

The combined SALTO and Wavestore solution means just one operator screen is needed to manage events captured by analogue, high definition or 360° cameras and the access control system, as well as other integrated third-party technologies.

Wavestore’s rules engine enables metadata pushed by the SALTO server to be configured to generate various actions when someone presents their access token to the reader, such as trigger a PTZ camera pre-set or a recorded audio message on an integrated speaker.

The recorded metadata can be filtered to allow operators to search for specific events, including by time, door and camera location, first name, surname, ID number of a person or any other database credentials.

Add comment


Security code
Refresh

We are using cookies to give you the best experience on our website. By continuing to use the site, you agree to the use of cookies. To find out more, read our Privacy Policy.