Attention List

Automatically detect the person who is listed in attention database so that the employees could pay extra attention to that person.

Explore Solutions

See the combinations of products required for this application.

Attention List Solution

Similar Applications

Digital Signage

Show predefined digital content on the public monitors with customized layout, based on predefined schedule or event rules.

Access Control

High-accuracy face identification can be used for an additional layer of security to the ID card. Upon identity mismatch, the system denies access and sends a video notification.

Incident Management

Manage all customer, visitor, employee and equipment related incidents with automated detection and handling.

Identity Fraud Investigation

Verify the suspicious use of access credentials by using the video management system.

Intercom Service

Interact with other individuals by local voice-based communication system.

Unauthorized Access Detection

Detect the intrusion attempts using video analytics and notify the security personnel.

Blacklisted Vehicle Detection

Detect the blacklisted vehicle by ALPR technology and automatically take actions.

Theft Detection

Detect stolen valuables or equipment instantly with the missing object detection technology.

Surveillance System Tampering Detection

Detect any attempts to tamper with surveillance system equipment and alert instantly.

Tailing Detection

Detect tailing at the entrance of restricted area by comparing the detected heat count with number of presented access credentials.

Sweethearting

Alert when exceptional discounts are given to prevent losses from sweethearting.

Cashier Open without Transaction

Alert when the cashier is open without any POS transaction and validate the situation using video evidence.

Void Transaction

Get notified and investigate void transactions with the help of video evidence.

Resolve Purchase Disputes

Whenever there is a purchase dispute, such as product issue or wrong change, the related video evidence can be retrieved for investigation.

Alarm Verification

Verify the alarms instantly using video evidence to avoid wrong and costly decisions.

Obstruction Detection

Alert when an object, such as shopping cart, is blocking the path for vehicles or people.

Suspect Post Search

Find the suspect automatically from the video recordings using face recognition technology.

Discreet Monitoring

Monitor people using discreet or disguised surveillance cameras without being noticed.

Safety Assurance

Ensure safety of people using video surveillance system.

Scam Detection

Detect a dishonest scheme or fraud by using video surveillance system.

Important Evidence Protection

Ensure the protection of important video evidence by applying redundancy systems.

Lost Item Search

Search for the lost items in claimed place and time using video surveillance system.

Large Facility Monitoring

Monitor a large facility using a video management system with hundreds of video channels.

Access Notification to VMS

Be notified about access control events on the screen of the video management system for convenient reference purposes.

Crime Reporting with Evidence

Collect and provide evidence of the crimes to the law enforcement or insurance company.

Video Evidence Push to NVR by Mobile Phone

Use the built-in camera of the mobile phone to stream the video evidence of the incident to NVR.

Shooter Alert

Be instantly notified about the shooting in the area to apply safety measures immediately.

Related Markets

Related Technologies

Face Recognition

Recognizes and identifies faces of people looking at the cameras.