Wavestore’s Events & Metadata Engine provides you with the ability to configure real-time cause & effect actions based on any number or type of events detected by the devices and sub-systems deployed across your security solution. It also provides powerful post-event metadata search. Specific events can be paired with cameras to add visual verification to the event information received by Wavestore’s VMS, adding functionality to help you achieve maximum advantage from your integrated security solution and deliver exactly what you require for individual projects.
Wavestore’s ability to interact with third-party devices, systems and software such as access control, sensors, Intruder Detection, ANPR and video analytics means event-based metadata can be used to trigger a wide range of actions. To name but a few, these include turning on lights when an intruder is detected, generating an alarm when a door is forced open or sending an alert by email to an administrator if a hard drive becomes faulty.
- Integrates with camera on-board analytics, sub-systems, and more
- Create real-time cause & effect actions based on events or post-event metadata search
- Associate specific cameras with events and metadata
- Perform actions from disparate devices and sub-systems, e.g. turn on a light when motion detected
- No separate events management hardware required, everything is self-contained within the Wavestore server/NVR/HVR
Wavestore’s Events & Metadata Engine also adds a further intelligence to metadata being received. It can, for example, be configured to generate alerts if an Electronic Point of Sale system (EPoS) records transactions above a certain value or if there us a refund event. In fact, the list of cause & effect actions that can be configured is virtually unlimited.
Operator awareness of events
Simple language text alerts of any events can be monitored in real time via Wavestore’s WaveView Client Software’s live event display. Operators are able to view the video associated with each event by simply clicking on the respective text. Mission critical events can be colour coded on the live event display, with different events highlighted by different distinguishing colours.
A ‘virtual spot monitor’ can be set to switch the camera feed(s) for a specific event, such as a ‘door held open’ to give the operator immediate situational overview. This can also be set to display on a video wall within a control room.
In addition to monitoring and reacting to the live streams of video of events occurring in real-time, operators also have the opportunity to capitalise on the Events & Metadata Engine’s lightening-fast search feature to retrieve and forensically review previously recorded events.
Events can be searched using a wide range of criteria which include the name of specific cameras, access control readers, intruder detectors, etc, or by a third-party device’s functionality, such as a camera’s built-in motion detection, and time.
The performance of the Event Engine is particularly impressive on busy sites where there may be a large number of pre-specified events occurring within a short space of time. Taking full advantage of recorded metadata, operators are able to carry out forensic searches which allow them to quickly home in on what they are looking for. This could be, for example, only events in which a red or white vehicle is in a camera’s field of view or when a particular named person has accessed the front door.
No additional hardware required
All of this happens on the same the server which is running the Wavestore VMS and there is no need to incur the capital or running costs of additional hardware in order to benefit from the full functionality of the Events Engine.
Unlimited potential to add value to your security solution
In addition to the mainstream integrations achieved by working closely with technology partners, Wavestore is able to help customers with even the most bespoke project requirements. This means our Events & Metadata Engine is able to potentially support virtually any device or sub-system, including the following and many more.
- Access Control
- Intruder Detection
- Video Analytics
- Facial Recognition
- Face Detection
- People Counting
- Intelligent Motion Detection
- Object Appear/Disappear
- Heat Mapping
- Noise Detection
- Camera Tampering
- Direction Alert
- Perimeter Intrusion Detection (PIDs) and Sensors
- Parking solutions
- Intelligent lighting solutions
- I/O devices
- PoS and other text output systems;
- Cash Counting
- Tills / Cash Registers