ICS Command Center Specialty Monitoring
ICS Monitoring LLC and Smart Solutions (National)
-Security/Access/Fire/Elevator/Call Box/Pool Alarms/Area of Refuge
-Mass Notification/ICS911 Alert/Guard Tours/Door Concierge
-Smart Devices-Heat, Wireless Water Detection Sensor, Temperature, Humidity, Vape, Sound, Gun Detection, Traffic Counters, Occupancy, Wireless AC Current Meters
-Video/Guard Tours, Incident Based Tours/Live Events/Door Concierge
ICS Video Monitoring
Reactive video monitoring solutions are solutions that are focused on improving a reaction from a third party. These solutions might not prevent a crime from taking place, but they will make sure that the reaction to the event is appropriate.
Great examples of these solutions are video verification based solutions where operators get a video of what is taking place based on a traditional alarm event, which allows the operator to provide greater information regarding what is happening to the police department. As a result, they can take that information and make sure to use the proper amount of force (i.e extra officers, canine units, helicopters).
Proactive video monitoring solutions are solutions that are focused on preventing criminal acts from taking place prior to a third party getting involved.
Outdoor video monitoring solutions with video analytics and voice down technology can be a very successful way to get an unwanted guest off of a site prior to a criminal act taking place. If done correctly, this solution can effectively protect sites with outdoor inventory in addition to any other type of site needing protection.
ICS Monitoring LLC and Smart Solutions (National)
-Security/Access/Fire/Elevator/Call Box/Pool Alarms/Area of Refuge
-Mass Notification/ICS911 Alert/Guard Tours/Door Concierge
-Smart Devices-Heat, Wireless Water Detection Sensor, Temperature, Humidity, Vape, Sound, Gun Detection, Traffic Counters, Occupancy, Wireless AC Current Meters
-Video/Guard Tours, Incident Based Tours/Live Events/Door Concierge
ICS Video Monitoring
Reactive video monitoring solutions are solutions that are focused on improving a reaction from a third party. These solutions might not prevent a crime from taking place, but they will make sure that the reaction to the event is appropriate.
Great examples of these solutions are video verification based solutions where operators get a video of what is taking place based on a traditional alarm event, which allows the operator to provide greater information regarding what is happening to the police department. As a result, they can take that information and make sure to use the proper amount of force (i.e extra officers, canine units, helicopters).
Proactive video monitoring solutions are solutions that are focused on preventing criminal acts from taking place prior to a third party getting involved.
Outdoor video monitoring solutions with video analytics and voice down technology can be a very successful way to get an unwanted guest off of a site prior to a criminal act taking place. If done correctly, this solution can effectively protect sites with outdoor inventory in addition to any other type of site needing protection.
Video Services
Gate ManagementGate management is one of the fastest growing services in ICS’s guard augmentation/replacement services portfolio. While security guards can be an effective way to protect a site, they aren’t without their limitations and can be pretty expensive. Through ICS’s gate management services ICS can replace or assist physical security guards at a site.
The most common gate management service provided is ICS’s guard augmentation service, which is when ICS manages a gate in lieu of the security guards during specific times of the day, but not for the whole day. This typically occurs when ICS manages a gate during the evening hours when gate traffic is slower than usual or when a guard goes to the restroom or does a patrol of the site. |
Video VerficationEither yourself or our 24/7 UL Central Station is away's watching.Video verification is a tremendous tool that allows the Acadian operator to ensure law enforcement is given all the information possible to make sure the proper resources (i.e. multiple units, canine units and helicopter) are dispatched to a location while also eliminating false alarms and false alarm fees. Video verification may not prevent a crime like vandalism or theft of outdoor property from taking place, but it will get the law enforcement officers to the scene faster to reduce the amount of damage that can be done and to increase the chances of apprehension of the criminals. In fact, a video verification alarm will typically receive a priority one response as a crime is in progress.
|
Guard PatrolsGuard patrols are most effective when a voice down is played in conjunction with them. While usually only done for commercial properties, this shows the customer that the guard patrols are taking place and also lets those around the site know that it is being monitored remotely. This is typically done around the standard opening and closing times of the business. -- Acadian currently does hundreds of guard patrols each day across the country.r)
|
VIDEO SURVEILLANCE SOLUTIONS
CAMERA TECHNOLOGY
Value Added ServicesALUE ADDED SERVICES
Live Video Monitoring
Mobile Video Monitoring
Solar Video Monitoring
Remote Concierge
Gate & Access Control
Crane Climbing Detection
We Watch Your Cameras
CAMERA TECHNOLOGY
Value Added ServicesALUE ADDED SERVICES
Video Analytics ICS monitors a number of different analytics from various video manufacturers. While ICS also monitors motion-based video triggers, it limits this to interior environments where the setting is controlled and the camera is focused on a limited area. At this time 90% of all cameras that ICS monitors are external cameras using video analytics.
ICS is capable of monitoring traditional video analytics which are activated by pixel modification formulas as well as non-traditional video analytics which are activated by artificial intelligence formulas. Every video analytic company is different in how they set up their formulas to generate a video activation and reduce false alarms, but for the most part they all use some of the same basic analytic rules, albeit with a different name.
PERSON/VEHICLE DETECTIONThis is a rule designed to pick up a person or vehicle when they have entered into a specific region where their presence is not allowed. This is the most popular rule that Acadian monitors at this time. Sensitivity adjustments for size and amount of time within area is a basic feature of this type of rule.
GROUP GATHERING
This is a rule designed to notify the video center when a group of people, with a number of people determined by the customer, are gathering in an area where they should not be. This is a very popular rule that ICS monitors in high activity residential areas. A common application of this is when ICS monitors low income housing communities.
LOITERING
This is a rule designed to notify the video center when someone or something has been within a specific area for a duration of time which is chosen by the customer. This is a powerful analytic when used for businesses with public facing sidewalks. It limits false alarms from innocent people walking by a business, but will trigger an event when someone suspicious is trying to break into a door.
Video Verification
Video verification is a tremendous tool that allows the ICS operator to ensure law enforcement is given all the information possible to make sure the proper resources (i.e. multiple units, canine units and helicopter) are dispatched to a location while also eliminating false alarms and false alarm fees. Video verification may not prevent a crime like vandalism or theft of outdoor property from taking place, but it will get the law enforcement officers to the scene faster to reduce the amount of damage that can be done and to increase the chances of apprehension of the criminals. In fact, a video verification alarm will typically receive a priority one response as a crime is in progress.
Platforms Supported:
Bold Manitou Platform
Acadian has four separate groups of servers that have the ability to run the entirety of our account base. These servers have geographic separation as the primary set are in our Lafayette office and the secondary set are in our Chicago office. In addition we have backup receivers for our Lafayette office in Chicago to handle all traffic in the case of a catastrophic failure. Acadian also leverages its class C network and the status of Acadian as a BGP organization to allow Acadian to fail its outside IP addressing to Chicago in the event of a failure. This means that all of Acadian’s outside addresses will continue to work during a failure as they will be routing through our Chicago office.
SureView Immix Platform
Acadian uses redundant virtual environments and redundant storage arrays to have the Immix machine move from Lafayette to Chicago within a few seconds. At that point Acadian would be running on the replicated data that we have in the storage array in Chicago. This data will be as current as the time when the failure occurred. The external address will also move to Chicago in this event so all incoming traffic will continue to be received.
Camera Systems:
Video verification is a tremendous tool that allows the ICS operator to ensure law enforcement is given all the information possible to make sure the proper resources (i.e. multiple units, canine units and helicopter) are dispatched to a location while also eliminating false alarms and false alarm fees. Video verification may not prevent a crime like vandalism or theft of outdoor property from taking place, but it will get the law enforcement officers to the scene faster to reduce the amount of damage that can be done and to increase the chances of apprehension of the criminals. In fact, a video verification alarm will typically receive a priority one response as a crime is in progress.
Platforms Supported:
Bold Manitou Platform
Acadian has four separate groups of servers that have the ability to run the entirety of our account base. These servers have geographic separation as the primary set are in our Lafayette office and the secondary set are in our Chicago office. In addition we have backup receivers for our Lafayette office in Chicago to handle all traffic in the case of a catastrophic failure. Acadian also leverages its class C network and the status of Acadian as a BGP organization to allow Acadian to fail its outside IP addressing to Chicago in the event of a failure. This means that all of Acadian’s outside addresses will continue to work during a failure as they will be routing through our Chicago office.
SureView Immix Platform
Acadian uses redundant virtual environments and redundant storage arrays to have the Immix machine move from Lafayette to Chicago within a few seconds. At that point Acadian would be running on the replicated data that we have in the storage array in Chicago. This data will be as current as the time when the failure occurred. The external address will also move to Chicago in this event so all incoming traffic will continue to be received.
Camera Systems:
Basic Rule Examples
PERSON/VEHICLE DETECTIONThis is a rule designed to pick up a person or vehicle when they have entered into a specific region where their presence is not allowed. This is the most popular rule that Acadian monitors at this time. Sensitivity adjustments for size and amount of time within area is a basic feature of this type of rule.
GROUP GATHERING
This is a rule designed to notify the video center when a group of people, with a number of people determined by the customer, are gathering in an area where they should not be. This is a very popular rule that Acadian monitors in high activity residential areas. A common application of this is when Acadian monitors low income housing communities.
LOITERING
This is a rule designed to notify the video center when someone or something has been within a specific area for a duration of time which is chosen by the customer. This is a powerful analytic when used for businesses with public facing sidewalks. It limits false alarms from innocent people walking by a business, but will trigger an event when someone suspicious is trying to break into a door.
PERSON/VEHICLE DETECTIONThis is a rule designed to pick up a person or vehicle when they have entered into a specific region where their presence is not allowed. This is the most popular rule that Acadian monitors at this time. Sensitivity adjustments for size and amount of time within area is a basic feature of this type of rule.
GROUP GATHERING
This is a rule designed to notify the video center when a group of people, with a number of people determined by the customer, are gathering in an area where they should not be. This is a very popular rule that Acadian monitors in high activity residential areas. A common application of this is when Acadian monitors low income housing communities.
LOITERING
This is a rule designed to notify the video center when someone or something has been within a specific area for a duration of time which is chosen by the customer. This is a powerful analytic when used for businesses with public facing sidewalks. It limits false alarms from innocent people walking by a business, but will trigger an event when someone suspicious is trying to break into a door.
Bring Technology Solutions of the Future, TODAY!
614-684-2500 |
Customers We Serve
|
1984-2023 ICS Technology Group