Utility

ACTi's end-to-end utility solutions are designed to prevent trespassing, vandalism and ensure the safety of employees. The solutions consist of application-driven cameras, analytics, and the integration with access control, alarm or various critical systems.

As utilities are important infrastructures that connect to numerous people's lives. The major security related challenges are usually vandalism, terrorism and explosion.

Utilities are important infrastructures that connect to numerous people's lives. The major security related challenges are usually vandalism, terrorism and explosion. To prevent trespassing and ensure the safety of employees, ACTi's end-to-end utilities surveillance solution consists of IP cameras, video management system, video analytics, access control, alarm system, malfunction monitoring and much more.

All Management Types
Business Intelligence
Operation Management
Security Management

Digital Signage

Show predefined digital content on the public monitors with customized layout, based on predefined schedule or event rules.

Incident Management

Manage all customer, visitor, employee and equipment related incidents with automated detection and handling.

Intercom Service

Interact with other individuals by local voice-based communication system.

Identity Fraud Investigation

Verify the suspicious use of access credentials by using the video management system.

Parking Lot Access Control for Permitted Vehicles

Manage the non-payment parking lot access to ensure that only approved vehicles could park there by using the ALPR based gate control.

System Reliability Assurance

Be instantly notified about the network or device failures for timely response to minimize the downtime.

Access Control

High-accuracy face identification can be used for an additional layer of security to the ID card. Upon identity mismatch, the system denies access and sends a video notification.

Unauthorized Access Detection

Detect the intrusion attempts using video analytics and notify the security personnel.

Surveillance System Tampering Detection

Detect any attempts to tamper with surveillance system equipment and alert instantly.

Tailing Detection

Detect tailing at the entrance of restricted area by comparing the detected heat count with number of presented access credentials.

Alarm Verification

Verify the alarms instantly using video evidence to avoid wrong and costly decisions.

On-the-Go Surveillance

Monitor the views from surveillance cameras using a mobile device while walking around the premises, in order to respond to incidents instantly.

Real-time Suspect Tracking

Track the suspect seamlessly by switching between video channels using transparent video overlay buttons in video management system.

Large Perimeter Surveillance

Detect any intrusion in the large perimeter area.

Safety Assurance

Ensure safety of people using video surveillance system.

Important Evidence Protection

Ensure the protection of important video evidence by applying redundancy systems.

Large Facility Monitoring

Monitor a large facility using a video management system with hundreds of video channels.

Crime Reporting with Evidence

Collect and provide evidence of the crimes to the law enforcement or insurance company.

Video Evidence Push to NVR by Mobile Phone

Use the built-in camera of the mobile phone to stream the video evidence of the incident to NVR.

Aerial Surveillance

Monitor the area, respond to incidents and track objects using surveillance drones.