PROSPECT PROTECTION

PROSPECT PROTECTION
PROSPECT PROTECTION
  • Home
  • About Us
    • Our Core Values
    • Accreditation & Partners
  • Our Services
    • Security Outsourcing
    • Front Desk Ambassadors
    • Training & Development
    • Consulting
    • Equipment
    • Technology And Systems
  • Our Courses
  • Careers
    • Why Prospect?
    • Positions Available
  • Contact Us
    • Contact Us
    • Terms Of Use
  • More
    • Home
    • About Us
      • Our Core Values
      • Accreditation & Partners
    • Our Services
      • Security Outsourcing
      • Front Desk Ambassadors
      • Training & Development
      • Consulting
      • Equipment
      • Technology And Systems
    • Our Courses
    • Careers
      • Why Prospect?
      • Positions Available
    • Contact Us
      • Contact Us
      • Terms Of Use
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • About Us
    • Our Core Values
    • Accreditation & Partners
  • Our Services
    • Security Outsourcing
    • Front Desk Ambassadors
    • Training & Development
    • Consulting
    • Equipment
    • Technology And Systems
  • Our Courses
  • Careers
    • Why Prospect?
    • Positions Available
  • Contact Us
    • Contact Us
    • Terms Of Use

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

TECHNOLOGY AND SYSTEMS

There is no doubt that security is at the forefront of many clients’ minds, across multiple industries. Finding the best security technology, one that is going to solve all of an organization's security issues, is always a challenge. How does the organization keep up with the latest security technology, and better understand it's security technology needs, without incurring high cost and without compromising on addressing the threats, vulnerabilities and risks?


We partner with industry leading producers of intelligent VMS, PSIM software and information security technology manufacturers, and keep a constant finger on the pulse of the newest emerging players. With over 30 years of collective industry experience, the Prospect team has knowledge of many security technologies, and the capability to help clients select and implement the right product to meet their organization's needs.


Various technologies can address the threats or vulnerabilities that are unique to your organization, and they can be integrated into your current security equipment and system. These technologies can truly provide your organization with more situational awareness than ever before.

VIDEO ANALYTIC TOOLS

FACIAL RECOGNITION

  • Able to integrate with video analytics for heat detection
  • Blacklisted / Wanted person faces detection
  • Reliable system operation in case of :

  1. head turning
  2. addition/lack of moustaches, beards, glasses
  3. change of hairdo
  4. age changes
  5. varied surveillance conditions (brightness, contrast, illumination, background)

LICENSE PLATE RECOGNITION

  • Configure automatic scenarios when a match is found. For instance, notify the operator if the recognized number is blacklisted.
  • ANPR runs on the server side or on supported LPR / ANPR cameras
  • Positive / negative list support.

SMOKE AND FIRE DETECTION

Able to operate in areas where other types of sensors are ineffective, for example in open spaces. It provides early detection of fire hotspots which leads to a significant reduction in damage.

OBJECT IDENTIFICATION

A neural network accurately detects specific types of objects, e.g. humans or vehicles. This technology can filter out false alarms in complex scenes with a large amount of non-relevant details. You can apply any conventional video analytics (loitering, line crossing, etc.) to the detected objects.

BEHAVIOUR ANALYTICS

  • Behaviour Analytics recognizes situations of risk early on by detecting specific human postures: for example, a cashier’s raised arms, or a person crouching by an ATM
  • Based on Behaviour Analytics, the Active Shooter tool detects a potential gunman in real time
  • Swift alerts to first responders minimize the risks for individuals, groups and facilities

AGE AND GENDER GUESSTIMATION

The facial recognition tool guesstimates the age and gender of visitors. The saved data may be used for customer analysis, digital signage targeting, and other marketing purposes.

TECHNOLOGY AND SYSTEMS

ACCESS CONTROL

  • Our Access Control Aggregation Platform unify vehicular and walk-in access controls into a single platform, thus allowing security operators to intuitively manage every location’s physical access policies anytime, and anywhere on the web. This vendor agnostic approach allows our product to integrate with existing barriers, doors, gates, turnstiles and other access points, turning it into contactless access.
  • As an enterprise-grade system, we build to scale and integrate with other endpoint devices such as analytics security camera and sensors to make it an end-to-end solution.

VEHICLE & VISITOR MANAGEMENT KIOSK

  • Provides an additional optional solution to minimize social interaction for the front line staff.
  • Our self-registration kiosk can be integrated with NRIC, passport, WP, Safe Entry scanners and cameras with analytics tools.

REMOTE SPEAKERPHONES

  • To minimize the social interaction, remote speakerphones can be place at all main access points.
  • Auto messages can be recorded and played back when a programmed security scope or matrix is detected.

MONITORING TOOLS FOR BUILDING ANALYTICS

These tools leverage data analytics that can help companies to achieve greater effectiveness and efficiency.

  • Integration of building function monitoring
  • Tracking of outcome based contracts
  • KPI management
  • Activation of appropriate actions for issues / alerts
  • Use of AI / Machine learning for predictive analysis

ONLINE COMPREHENSIVE REPORTS

  • Able to build custom reports based on POS transaction data, visitor count, queue length, age and gender guesstimation, and data generated by other Retail Pack tools.
  • The web interface enables clients’ to obtain reports from any store within organization’s retail chain via the Internet.

VIDEO WALL MANAGEMENT

  • Effective management of video walls and layouts at large distributed sites
  • Send any available layout to any client computer within the system
  • Draw operator’s attention to an event captured by one of the cameras in the layout
  • Show an event to all operators by sending the relevant layout to a video wall
  • Designate any client computer with sufficient monitors as video wall
  • Manage it from any remote client connected to any server within our domain
  • Incredibility useful for monitoring hubs

NEURAL NETWORK FILTER

  • When applied to the object tracker, the neural network filter accurately detects specific types of moving objects eg : humans in vehicles. The technology can filter out false alarms in busy scenes, where multiple moving onjects might interfere with the results
  • High detection accuracy in busy scenes

CROSS-SYSTEM CLIENT

Cross-System Client is useful at geographically distributed sites or multiple-location chains, such as retail stores or gas stations.

  • Connect a single client workstation to multiple surveillance servers on different domains
  • All settings and cameras associated with these servers are consolidated in a single convenient view
  • Operators can access multiple independent surveillance systems simultaneously
  • More options for security systems management 

TAG & TRACK

Follow an object of interest, zone by zone


TAG & TRACK LITE

  • All cameras are linked to a site map
  • Operator selects a moving object to track
  • If the object leaves the field of view of one camera, our software predicts where it will appear next
  • The 'destination' camera is highlighted in the current layout
  • Tag & Track Lite also works in Immersion and Archive mode

TAG & TRACK PRO

  • Get the 'big picture' of everything happening at a site with fixed cameras
  • Obtain detailed imagery of the objects moving around it with PTZ cameras
  • A PTZ camera automatically tracks objects across multiple fixed cameras
  • Both sets of images can be recorded, which is important for event investigation

EMBEDDED VIDEO ANALYTICS TOOLS

  • Object tracking (motion direction)
  • Abandoned object detection
  • Detection of specified number of objects (crowd)
  • Perimeter intrusion detection (line, multiline)
  • Zonal appearance / disappearance detection
  • Zonal entry / exit detection
  • Social distancing detection
  • Heat detection
  • People counter detector
  • Smoke and fire detection
  • Facial recognition
  • Age and gender guesstimation
  • License plate recognition
  • Behaviour Analytics 

SMART SEARCH (FORENSICS SEARCH)

  • Ability to analyze live video and generate a stream of metadata
  • For contact tracing purpose, our smart search in video archives enable finding of archived video that matches custom criteria
  • To retrieve recorded footage of an event of interest, within seconds the system displays thumbnails of relevant video episodes
  • Save a search query for later use on any camera.

TIME COMPRESSOR

Time Compressor captures objects in motion at different times and displays them in a condensed visual synopsis. The tool is a viable alternative to the painstaking process of scrolling through hours of footage.

INTERACTIVE 3-D MAP

  • The interactive 3D map superimposes camera locations on a site map and displays camera views in the same window
  • Handy viewing mode allows operators to instantly pinpoint where a selected camera is located on the map and identify the corresponding location of interest

FISHEYE DEWARP

  • Image dewarping is performed on the graphics card of the client computer, without any additional burden on the CPU
  • Several "normal" flat images with different frame aspect ratios are obtained for display on the client screen
  • It supports standard fisheye-lens cameras as well as ImmerVision panomorphic lenses.

POS SUPERVISION

  • Able to receives data from cash registers and links it to video feeds. The receipt text is superimposed on the video or displayed in a separate pane
  • Able to use receipt data to retrieve POS transaction videos from the recorded footage.

QUEUE MANAGEMENT

The tool detects the number of people in queueing areas. Knowing actual customer numbers empowers clients to manage human resources in both the short and long-term.

VISITOR COUNTER

This tool counts customers entering or exiting the store or a specific area. The information collected may be used, along with sales data, to estimate clients’ sales conversion rate and/or for market research.

OTHER SYSTEMS :

  • VISUAL GUARD TOUR PATROLS
  • DIGITAL ATTENDANCE WITH FACIAL RECOGNITION
  • INCIDENT MANAGEMENT & EMERGENCY MASS ALERTS


Copyright © 2020 Prospect Protection

All Rights Reserved

  • Home
  • Our Core Values
  • Accreditation & Partners
  • Security Outsourcing
  • Front Desk Ambassadors
  • Training & Development
  • Consulting
  • Equipment
  • Technology And Systems
  • Why Prospect?
  • Positions Available
  • Contact Us
  • Terms Of Use