Your security system needs to work when and how you want it to, without unnecessary hassles. If you have an outdoor
storage area you want to protect, you probably do want to be alerted if someone approaches that zone. Yet, when it's time
for your employees or contractors to access the storage area, you don't want to be bothered by nuisance alarms — and you
shouldn't be!
Customize which targets warrant an operator response
You don't need your security teams being called out to investigate intrusions by curious squirrels, stray dogs, or
employees or contractors going about their work. Within a unified solution, you can customize which targets warrant an
operator response, and which can be ignored.
Optimize your system to identify friendly activity from true threats
A patented algorithm in RSA called Fusion can help your operators understand if movement detected by the system is
something you need to pay attention to, or if it's just noise, and automate workflows to trigger a response that is
appropriate to the level of threat.
Fusion, along with automated workflows to triage potential threats, can reduce nuisance alarms by up to 80 percent. That
ensures suspicious people moving near your perimeter will be carefully monitored — and the local squirrels can gather
nuts in peace.
If suspicious activity or potential threats are revealed, a vulnerability assessment is a next step, so you can identify and fix
weak points. Within Genetec Security Center, tools like heat maps can help your team identify potential vulnerabilities. If
a drone flies over your fence every evening at 8 p.m., for example, your operator needs to know so they can determine
whether the drone is flown by someone with potentially hostile intentions or just a kid with a new toy.
3. Leverage your existing technology to do more
Restricted area surveillance is an important feature but it's only one component. Within a unified dashboard, RSA plays a
pivotal role in helping operators interpret data from multiple connected systems, such as radar, lidar, access control, and
video analytics.
To get the most out of your investment in security hardware, choose a software solution that:
Brings standalone intrusion detection systems together under one visualization pane
Creates one or many zone overlays from your various intrusion detection technologies such as radar, lidar, laser,
video analytics, and perimeter intrusion detection systems
Merges data coming from different sensors of different technologies to track a target in motion
Moving from intrusion detection to surveillance is a change in mindset, but there's no doubt that it's better to know
something is going wrong before disaster strikes.
How secure is your data center?
Try the Genetec RSA Maturity assessment tool to help you evaluate the effectiveness of your data center security.