Issue link: https://resources.genetec.com/i/1293079
How it works With the RSA Surveillance module, Security Center connects to the radar or laser detection sensors over your facility's security network. The RSA system syncs events and alarms in real time with Security Center, allowing your operators to instantly view all activity and threats. Potential threats are handled directly in the alarm management task or maps of the facility. By automatically synchronizing RSA intrusion areas, this introduces a new layer of information and command and control capabilities on Security Center maps. Your security personnel can now visually monitor activity and view live or recorded videos associated with each target. They can acknowledge intrusion alarms on a map and use reporting tasks for focused investigations. RSA Surveillance's geo-locating capabilities enable your operators to accurately track targets, providing them with greater visibility, hence the ability to confidently take corrective action. The RSA Surveillance devices can be easily added to your Genetec security system using the Security Center configuration interface. You can automatically import multiple intrusion zones from the devices and add them to the maps. Once imported, radar detection zones become another layer on the Security Center dynamic maps and can be armed and disarmed on schedule. All intrusion data is stored and made available to you through the dedicated investigation task. Your operator can search per intrusion event (applying one or multiple filters) and replay the target trail on the map, side by side with the camera view. A Monitor RSA Surveillance events in real time with dedicated icons to indicate the type of intrusion B View live video associated with RSA Surveillance devices to display speed, direction, and altitude of intrusion C Track moving targets on the map with target's path automatically fused when detected by multiple RSA Surveillance devices A B C D E F Intrusion task D Arm, disarm, or set restricted zones to maintenance mode E Create buffer zone to pre-qualify potential threats before they enter into restricted zones F Assign threat level of potential intrusion to friend, foe or undefined with color coded icons