Company was concerned about visitors and required that all visitors sign their sign-in book. Next to the book was a sheet of paper which said that by signing book, the visitor accepted policies such as wearing safety glasses, not smoking, no photographs, must be self-insured. The problem was that nothing on the sign-in book itself referenced the policy sheet so the whole procedure would have had no legal enforceability. We identified solutions to close this small loophole, which could mean the difference of millions of dollars in liability.
The line of iCVR and iCST camera and encoders offered by Perimeter Protective Systems has been deployed in a variety of environments and for a wide range of customers. Deployments often range from preventing theft and vandalism through proactive surveillance in commercial markets, enhancing critical infrastructure protection with the most accurate video analytics solution, simplifying multi-site deployments by eliminating the need for external storage servers and dedicated high capacity networks, and extending wireless deployments by eliminating the need to backhaul video to central storage. Typical deployments cover a variety of end-users and tackle the most difficult video surveillance challenges.
Click on any solution below to learn more.