Powerful end-to-end security solutions Comprehensive video security and access control that provides intelligent, flexible cloud-native and on-premise solutions.
2 | (800) 323-7212 • induscom.com Contents 04 Physical Security Overview 17 Physical Security Risk Assessment 19 Cloud vs On-Premise Security Technology 22 Avigilon Overview 27 Avigilon Alta 36 Avigilon Unity 46 Camera Overview 52 Video Management Systems 59 Camera Hardware 77 Video Infrastructure 85 Access Control Overview 94 Access Control Hardware 115 Sensors & Alarms Hardware 117 Operations & Intelligence 130 Motorola Solutions Ecosystem 141 Industry Solutions Watch now What’s inside: Learn about the security system technology trends 2025: • Gain actionable measures against evolving threats • Pressing security challenges facing businesses • Best practices for security infrastructure planning • Find the right security system for your needs • Improve your security system’s ROI & efficiency
3 | (800) 323-7212 • induscom.com About us For 50 years, leading the way in safety and security solutions Founded in 1974, Industrial Communications is an established leader in wireless communications. The key to our success has been our investment in our people and infrastructure, our forward-thinking approach to wireless communications, and our commitment to providing quality products and services to our valued customers. No matter the industry, Industrial Communications will find a solution that perfectly suits your unique needs for voice, video, and data solutions. 3 Locations Boston, Miami, Fort Myers Our Mission Provide Personalized and Customized Communications Solutions • Work to identify the best solution for your unique communications needs. • Provide quality products at the best value and superior customer service and support. • Always keep you connected with durable and reliable communications solutions. • Make safety, efficiency, and productivity a priority. Your Complete Security Suite The Avigilon security suite provides a complete portfolio of flexible cloud-native and on-premise end-to-end video security solutions and services, powered by intelligence, so you can react faster when it matters most. Our mission as an Avigilon Elite partner is to advance your video security beyond megapixels and terabytes to focus on delivering business outcomes. Avigilon’s powerful video security solutions include intelligent cameras, AI-powered analytics, fully integrated technology, video management software, storage and access control solutions that provide customer safety and protection Every business is unique, and so are its physical security requirements. There is no one-size-fits-all approach that can protect all aspects of your business, so it’s critical to ensure that your physical security plan is customized to your organization and facility. Understanding what physical security is, as well as what robust physical security standards are, is a good start. Get a free on-site security assessment Our experts will determine if you have any security gaps and will provide: Have questions? We can help! Our video security experts can help you implement the right security system for your business. Let us design, install, and service an Avigilon vsystem tailored for your facility.
4 | (800) 323-7212 • induscom.com Physical security overview
5 | (800) 323-7212 • induscom.com Managed and Supported Services Physical Security What is physical security? A common definition of physical security includes security measures designed to limit access to authorized individuals, as well as any resources that protect personnel from harm and property from damage. So, in the simplest terms, physical security is defined as the securing and protecting of organizational assets from coming to harm because of physical events. These events can range from natural disasters such as fires and floods, to human-inflicted dangers including theft and vandalism. Accidents and accidental damage also fall under the umbrella of events that may be covered by a physical security plan. So, what do physical security systems and plans entail? On the surface, physical security measures include locks, gates, video security cameras and security guards. Although these are excellent strategies, there are deeper layers that you should consider when creating a physical security plan. An effective plan should include equipment and technology, and can work alongside these areas: • Training: Ensure your staff has the proper knowledge in implementing your physical security strategy. • Site design and layout: Equipment and physical security components should be strategically placed to complement the design and layout of your facility. • Emergency response readiness: Staff in your facility should be trained on what to do during certain situations and emergencies. • Access control: Understand how you will assign access to your staff and limit access for restricted spaces. • Environmental components: Create safety measures to mitigate damage from intentional or unforeseen natural disasters that may happen. Key Physical Security Measures When it comes to preventing different types of physical security threats in any facility, there are many types of innovations that you can use, from encrypted access cards and security cameras to mobile credentials and temperature sensors. But before you use any of these systems, it’s important to understand the different elements that can contribute to your overall plan. When creating a physical security strategy, you need to have all your security measures complementing one another. This means that you need to use different types of physical security measures in a layered approach to ensure that you’re protected from every angle.
6 | (800) 323-7212 • induscom.com Physical Security So, what is good practice for physical security? Here are the most common elements in an effective physical security plan: Deterrence This type of physical security technology focuses on keeping unwanted people, vehicles, or animals away from a certain area. Deterrence can encompass various equipment such as signage, security cameras and access control systems. It also includes physical barriers such as doors, locks, and walls. It is essentially any security systems or equipment that can help deter intruders from entering sensitive areas. Detection Deterrents can only do so much. If you want to fully protect your facility, you need to have devices that can identify potential intruders and ways to alert the correct authorities. Some technologies you can use for physical security detection measures are sensors, alarms and automatic notifications. Delay Several physical security controls are created to slow intruders down when breaking into a facility. Simple security measures such as additional doors, locks and security guards can help delay incidents. More advanced physical security technology, such as key cards and mobile credentials, can make it more difficult for unauthorized users trying to enter a building. With this technology in place, it’s easy to mitigate a breach before too much damage is caused. Response Once a breach or intrusion happens, you must also have a response strategy in place, such as building lockdowns or automatically notifying emergency services. Successful and effective plans should include these technologies to ensure that a facility can prevent physical threats and take necessary action if a security breach occurs.
7 | (800) 323-7212 • induscom.com Physical Security Components of physical security controls and systems Physical security controls fall into three main areas of concern: access control, surveillance and testing. How well these security component’s function can make or break your physical security program. Their performance can also indicate how well your plan was implemented, where to improve and what to maintain. Access Control The most effective way to maximize your physical security controls is by limiting and controlling who can access your commercial premises. This physical security component involves the means of restricting the exposure of specific assets and areas to authorized staff only. Companies can use physical security components like keypads, ID badges, biometric logins and security guards to limit access for unauthorized individuals. So, how does access control work? The first line of defense of physical security is its architecture. This includes walls, gates, doors and guards that are strategically placed to deter criminal entry. In some locations, barbed wires, additional locks, visible security signs and equipment can help reduce attempts to enter a facility. There are also more advanced access control measures that use a technology-supported approach to tighten up building security. One example of physical security is using proximity ID badges. Instead of just a plastic ID badge, employees are issued key cards that use NFC or RFID technology to authenticate identity when entering various locations in the building. Apart from employees, companies can also provide visitor access cards to easily control which areas your visitors can access in your facility. Some companies use mobile authenticators instead of ID cards to validate identities to enter a building. These ID scanners and authenticators will act as obstacles for anyone without authorization, making it more challenging for attackers to gain access to certain assets and information on your premises. Enabling multi-factor authentication (MFA) increases the time it takes for intruders to carry out any criminal offense they have in mind. This physical security best practice requires users to present at least two authorized credentials, such as typing in a PIN code and scanning an ID badge. The more strategically placed obstacles are in place, the more time companies can buy to act on threats and mitigate them. Additionally, access control can do much more than restricting unauthorized access. Physical barriers like walls and fences can help protect buildings from natural and environmental disasters including landslides and floods. Obviously, these risks depend on the location, but organizations must always consider threats like this when investing in physical security systems.
8 | (800) 323-7212 • induscom.com Physical Security Surveillance tools and technology When it comes to prevention and post-incident recovery, surveillance is the most critical component of physical security. It refers to the staff, resources and technology used by organizations to monitor the activity of different areas of the facilities. This includes video cameras, sensors, guards and automatic notification systems. One of the most commonly used types of physical security technology for this component is security cameras or closed-circuit television (CCTV) cameras. These devices continuously record the activity of a given area, allowing you to see what’s happening at a particular location in real time, or record it for later viewing. Some security cameras come with built-in analytics that can detect and classify objects intelligently, notifying you if there is something unusual going on. When you choose video equipment for your facility, make sure to enlist the help of a security camera installer who can carefully assess every entry point, checking for any blind spots that can be exploited. A security camera installer will also ensure that your video cameras are strategically placed in locations that require constant monitoring and protection. Importance of video cameras for physical security When criminal activity happens, you need evidence to prove the event occurred. Often, video security gives the proof you need. Most cameras allow for constant recording in a particular area, with some that have night vision capabilities to see through darker environments. If something suspicious happens at your facility, you can use these recordings as evidence. In addition, some monitoring devices offer an automatic notification feature, which provides you with instant alerts for physical security threats such as intrusion detection. Advanced video cameras and management software often have real-time monitoring, allowing you to see in-action breaches as they unfold. This can give you an idea of how to mitigate them as quickly as possible.
9 | (800) 323-7212 • induscom.com Physical Security Physical security systems testing Access control and monitoring are preventative physical security measures. Often, business owners are not able to measure the effectiveness of their building’s physical security until an incident occurs. To mitigate damages before they occur, it is advised to conduct testing as a physical security best practice. This physical security component checks how well your organization identifies, responds to and contains a security threat. Testing requires educating employees, often through training and written communication. Cameras and technologies can do a lot, but businesses will be better protected if employees are knowledgeable about the company’s security measures and what to do in the event of a physical security threat. This particularly applies to natural disasters such as fire and earthquakes, but is equally important in identifying physical security risks such as tailgating or other suspicious activities. Importance of testing for physical security Testing allows business owners or security personnel to understand how well their security system works and which areas to improve. If you conduct mock physical security breaches, you can see how well your employees perform in various scenarios. This gives you an idea of how your security measures are performing and if there are other vulnerabilities you need to protect. At the same time, educating employees about physical security policies and protocols can make them feel safer at work. If employees are made aware of the systems in place to detect criminal activity, it helps to deter any physical threat activity, such as fraudulent behavior or employee theft.
10 | (800) 323-7212 • induscom.com Physical Security Components of physical security controls and systems Perimeter security This is one of the most common physical security examples we see today. Perimeter security is straightforward. It involves creating physical barriers that protect your facility from intruders. This includes fences, gates, barbed wire and security guards. This type of physical security is also your first line of defense to deter intruders from getting into your facility. Environmental elements The layout and landscaping on your property can help control the flow of traffic on the premises and deter unwanted activity. For example, high hedges around the perimeter, motion-activated lighting and maintained walking paths make it easier to spot anyone who looks suspicious lurking around the building exterior. Secure credentials for authorized individuals Requiring every authorized individual to have access credentials is among the top security best practices to implement in your building. There are many types of systems, and each can be used depending on the threat level or importance of an area, including: • Key cards or ID badges • Key fob system • Biometric readers • Keypad locks • Mobile-based credentials These physical security devices ensure that each user can easily access the building when needed. They also give businesses better insight into daily traffic, failed access attempts and potential physical security threats.
11 | (800) 323-7212 • induscom.com Restricted access areas This physical security example shows how measures can be implemented for restricted areas, such as a server room or area with expensive equipment. Areas like this can only be accessed by a small subset of the staff, which requires additional access credentials, such as MFA, unique PINs or biometric credentials. If anything goes missing or is damaged in the room, it narrows down who can be held accountable. Additional monitoring security components, such as video cameras or a staffed guard, can further deter unauthorized activity in restricted spaces. Monitoring systems Most organizations have surveillance in place to protect a facility. This allows them to detect intruders right away that may have bypassed other security measures, like perimeter security. Some systems can also detect natural disasters and issue warnings. These systems can include motion detectors, security cameras and fire alarms. In some situations, having these devices record activities is enough. However, other facilities require a surveillance system to be actively managed by a guard or personnel. Staff members Often, business owners will need personnel to enforce physical security measures, and hiring security staff can help address issues as they arise. There are some staff members or security personnel that are explicitly hired to implement security plans, while others are only encouraged to take an active role when an emergency happens. For instance, security guards and receptionists can act as gatekeepers, only giving access to those who are authorized. Patrols, on the other hand, can monitor a section of a facility at certain hours of the day. However, staff members should not be the only physical security measure implemented in an organization. Security teams or other staff should be supplemented with other technologies and components to ensure that every ground that needs protection is covered. Physical Security
12 | (800) 323-7212 • induscom.com Detect Determining your risk level Before implementing physical security measures in your building or workplace, it’s important to determine the potential risks and weaknesses in your current security. Detection is of the utmost importance in physical security. While it is impossible to prevent all intrusions or physical security breaches, having the right tools in place to detect and deal with intrusions minimizes the disruption to your business in the long run. To locate potential risk areas in your facility, first consider all your public entry points. Where people can enter and exit your facility, there is always a potential security risk. Baseline physical security control procedures, such as proper access control measures at key entry points, will help you manage who is coming and going and can alert you to potential intrusions. Once inside your facility, you will want to look at how data or sensitive information is being secured and stored. Do you have server rooms that need added protection? Are desktop computers locked down and kept secure when nobody is in the office? Do employees have laptops that they take home with them each night? Even USB drives or a disgruntled employee can become major threats in the workplace. List all the potential risks in your building and design security plans to mitigate the potential for criminal activity. Common threats to physical security In the digital era we live in, the number of threats is alarmingly increasing, with many originating from cyberspace. From data breaches to hacking, the focus of many organizations has shifted, with greater focus on security solutions for physical security that also protect digital assets. There are common threats to physical security. These threats can be targeted not only at the assets on your premises but also at your digital and human resources. Physical security threats can be natural or man-made, so it’s vital that your strategy addresses both vulnerabilities. Threats can also be categorized based on the place of origin of the attacks: Internal threats This type of physical security threat comes from within your organization. Internal physical security risks are more challenging to contain than external threats as they are tougher to predict. They can be accidental or malicious in nature. Examples of such risks include: • Employees committing theft or causing property damage • Careless staff members leaving restricted areas open • Mistakes made by your security team • Faulty infrastructure or hazardous work conditions In fact, internal theft from employees is estimated to top $50 billion each year for U.S. businesses. Therefore, you need to have security measures in place to keep internal members from being tempted to act maliciously. This can include RFID-enabled access devices and video security systems to protect critical areas of your facility. Internal threats can also come from non-human sources such as fires due to faulty wiring, mishandled equipment, and more. Because these types of threats are harder to predict, it’s best to identify any areas of your facility that are more exposed to this type of danger and take proactive steps to mitigate this physical security risk. A proper emergency preparedness and response plan is also a critical physical security measure for these types of scenarios. Physical Security
13 | (800) 323-7212 • induscom.com Physical Security External threats As its name implies, this type of threat originates from outside your organization. This can include attacks from outside parties with malicious intent and natural disasters. External physical security threats can also include: • Forced entry or break-ins • Vandalism and property damage • Unauthorized entry for people outside your staff or approved visitor list In the United States alone, theft from commercial properties accounted for more than 37 percent of all burglary crimes in 2019, according to data from the FBI. Most of the time, this type of crime is perpetrated by external actors. However, internal actors can also participate in such events, sometimes unknowingly by letting a tailgater into a building or leaving a door propped open by accident.. Natural threats These physical security threats constitute damage caused by natural causes like floods, earthquakes, lightning strikes and other unpredictable natural disasters. In this situation, the physical security risk lies in the fact that such an event can cause extreme damage to your assets and endanger employees. More than the loss of hardware, the loss of years of critical business data and investment, as well as injuries to your employees can have a severe blow to your business operation. This is why it is crucial that physical security strategies include proper training and communication for emergency procedures across every industry and property type.
14 | (800) 323-7212 • induscom.com Physical Security Physical security best practices So, what physical security measures should you have in place to keep your facility secure? What components of physical security should you give more attention to? There is no one-size-fits-all physical security solution. Every organization has different needs, but there are common measures that, when adjusted to fit your situation, can help protect your organization from physical attacks. Investing in security personnel One of the best deterrents against possible attacks is visible security, and this is what investing in security personnel can guarantee. For example, you can hire extra security guards or change the existing patrol routes to cover more ground. Consider manning important entrances and exits, which can help ensure that no unauthorized entries or exits happen. Having security personnel can also give your employees peace of mind and dissuade those with malicious intent from working against your business. However, having security guards doesn’t automatically guarantee protection and safety. You also need to ensure that your security team understands your organizational requirements and is trained in the physical security measures your business is implementing. They should also have state-of- the-art equipment that they carry on their duty that can help deter and delay intruders. Security staff should also know how to respond appropriately in different security situations. Using monitoring systems Security guards can be effective in deterring and delaying intruders, but they can only detect threats within their proximity. This is where monitoring systems come into play. This type of physical security system can help you know what is happening in various areas of your facilities at the same time while preventing potential dangers. However, not all monitoring solutions are right for every property, and many factors contribute to their effectiveness. Security cameras should be strategically placed in locations that can offer maximum visibility over your premises. These video recordings can act as evidence when a breach occurs, and cameras equipped with AI analytics can help security teams know where to focus in critical moments. An automated alert system can notify the right person immediately in case of unauthorized access or suspicious movements in a particular area of your facility. This allows immediate response to threats to help lessen any damage. Sensors can also help provide better situational awareness. Some examples of the physical security component include smoke sensors, temperature sensors, water or leak sensors and occupancy counting devices. Some systems also allow security team leaders to check the location of their guards through GPS. This allows a quick response and delegation when an incident occurs, as leaders know who to call within the location of the incident.
15 | (800) 323-7212 • induscom.com Physical Security Limiting facility access Accessibility is an important factor to consider when it comes to security. Easy access to your facility makes it easier for malicious actors to compromise your assets. An effective way to stop this from happening is by restricting access to your facility. How you will restrict access to your property depends on what you want to protect and the risks you want to minimize. In areas that need less security, a guard will suffice. Some situations may call for visitors to verify their identity and for guards to conduct security checks when entering and leaving the building. However, in areas where maximum physical security should be implemented, more advanced access control like biometric readers and coded locks should be in place. Educating your employees Even with the most advanced security systems and trained guards implemented in a facility, it is crucial that employees are made aware of physical security protocols, particularly when it comes to natural disasters and physical intrusion. To guarantee that employees are prepared, make sure that they are well-trained to handle physical security threats. When they know the standard operating procedure, they can contribute to protecting an organization’s assets. Additionally, educating employees can give them peace of mind in knowing that they are protected when breaches and emergencies occur. Top considerations for physical security planning Physical security planning is an essential step in securing your building. Use this 10-step guideline to create a physical security plan that addresses your unique concerns and risks, and strengthens your security posturing: 1. Identify the scope of your physical security plans. This should include the types of employees the policies apply to and how records will be collected and documented. 2. Determine who is responsible for implementing your physical security plans, as well as the key decisionmakers for making adjustments or changes to the plan. 3. Include the different physical security technology components your policy will cover. 4. State the types of physical security controls your policy will employ. Include any physical access control systems, permission levels and types of credentials you plan on using. 5. List key access points and how you plan to keep them secure. 6. Define your monitoring and detection systems. What types of video surveillance, sensors and alarms will your physical security policies include? Identify who will be responsible for monitoring the systems and which processes will be automated. 7. Outline all incident response policies. Your physical security planning needs to address how your teams will respond to different threats and emergencies. 8. Scope out how to handle visitors, vendors and contractors to ensure your physical security policies are not violated. 9. Create a cybersecurity policy for handling physical security technology data and records. Include your policies for encryption, vulnerability testing, hardware security and employee training. 10. Address how physical security policies are communicated to the team and who requires access to the plan.
16 | (800) 323-7212 • induscom.com Physical Security What factors are influencing security technology trends in 2025? When it comes to recognizing new trends in security technology, certain factors will always drive what’s popular. Most often, security system technology trends are driven by the latest vulnerabilities. No business wants to fall victim to a known hack or fail to stop a theft due to outdated security technology solutions. That being said, the emerging security technologies and trends of 2025 also reflect new ways organizations conduct their business. Economic and social trends often change people’s expectations of how and when they work, which can drive exponential advancements in security technology. Below are the top five factors influencing new security system technology trends in 2025: 1. Increased adoption of cloud-based security technologies 2. Growth in the application of AI and machine learning 3. Efficiency gains achieved from unifying security technology solutions 4. Normalization of hybrid and remote working creates dispersed teams 5. Continued shift to information security technologies with zero-trust network access Final thoughts on physical security plans, systems and solutions Every business is unique, and so are its physical security requirements. There is no one-size-fits-all approach that can protect all aspects of your business, so it’s critical to ensure that your physical security plan is customized to your organization and facility. Understanding what physical security is, as well as what robust physical security standards are, is a good start. As physical and digital worlds continuously overlap, you need a trusted partner that helps you navigate both. Conduct a thorough risk assessment and consult with a professional to get the most out of your physical security systems and technology.
Physical security risk assessment
What is a physical security risk assessment? Also called a security audit, a physical security assessment is a systematic evaluation of a facility and its security measures, with the goal of identifying potential vulnerabilities and areas for improvement. This can involve a review of security policies and procedures, an inspection of the physical premises, load-testing any business security systems and interviews with employees. The physical security risk assessment should focus on the protection of people, assets and information, and should consider potential threats such as burglaries, natural disasters and internal theft. The purpose of an office security audit is to ensure that a facility is adequately protected against potential threats and that security measures are effective and appropriate. A good office security audit will also ensure all security equipment in place is properly running in case of a breach or emergency. You don’t want to wait for an incident to happen before knowing that some of your protocols and devices in place are not working. What happens during a physical risk assessment? There are several key steps to a physical security auditing checklist. 1. Policy and procedure overview. This step includes reviewing any physical access control system measures, security patrols, and incident response protocols to determine any weaknesses or inconsistencies in security practices. A physical security auditor can provide recommendations for improvement, if needed. 2. Inspection of the physical premises. In this part of a physical security risk assessment, an auditor will inspect building construction, layout, lighting and landscaping for deficiencies in the infrastructure that can be easily exploited and provide recommendations for upgrades or enhancements. 3. Testing your security systems. Technology is great, but only if it’s functioning at full capacity. That’s why it’s important to evaluate any electronic locks, video security systems and alarm systems to ensure they are all in working order. 4. Employee interviews. The final step in an office security office will help you gain a better understanding of how susceptible your employees are to malicious actors trying to take advantage of them to gain access to your facility, as well as help ensure that they know how to act in case of a breach or a natural disaster. Overall, a physical security assessment checklist is an important tool for ensuring the safety and security of a facility. By regularly conducting risk assessments and implementing security recommendations, facilities can reduce the risk of breaches and maintain a safe and secure working environment. How often do I need to conduct a physical security risk assessment? By regularly conducting assessments, facilities can identify any gaps in their security measures and take steps to address and improve them. This can help reduce the risk of security breaches and maintain a safe and secure environment for employees and assets. Generally, it is recommended to perform a thorough physical building security checklist every year. However, depending on the location, size and industry of the organization, the frequency may vary. Larger organizations with hundreds of employees may want to run more frequent audits.
Solutions Cloud vs On-premise
20 | (800) 323-7212 • induscom.com Cloud vs On-premise security technology Choosing the right security system is an important decision, and often a big investment for any size organization. There are two types of systems, with key differences to note: cloud-based and on-premise. What are the latest security technologies, and which one is right for your business? The main differentiator here is where these systems are managed. On-premise security tech runs on locally managed servers at the building site, and is viewed as the more traditional, or “legacy” option. With cloud-based systems, the servers are managed by a third-party, with local data synced via the cloud. Most cloud security tech providers use Amazon Web Services, Google Cloud, and Microsoft Azure for their server management. Take a closer look at how to compare cloud-based and on-premise security technology, and select the providers that are right for your business. Reasons to choose on-premise security systems: • On-premise uses thick client software which offers greater customization capabilities • Management software can be browser-based or tied to a specific on-site workstation • Good option for high-security environments with strict policy or compliance requirements • Installation, maintenance, and updates are all performed by a trained, on-site IT professional who knows the specific system • Compatibility with existing on-premise security systems Reasons to choose cloud-based security systems: • Eliminates the need to invest in on-site hardware and IT management • Scales with ease thanks to fully remote management capabilities and no server hardware to install on location • Software updates are automatically installed over the cloud • New capabilities and features are easier and faster to roll out across all sites • Redundancies built into large data centers increases cloud system reliability • Cloud security technology is often built on open standards for easy integration with other systems What if an organization has an existing on-premise security system, but also wants access to some of the capabilities of a cloud-based system? Luckily, there are cloud-based security systems that are backward compatible with legacy technology. In a hybrid model, organizations can retain their original investment in on-premise servers and upgrade the edge devices to cloud-based technology. For example, an organization that wants to keep their original on-premise ACU hardware can choose to update their door readers with a cloud-based access control system provider, allowing them to take advantage of frictionless mobile-based credentials and remote management without having to rip-and-replace the entire system. Cloud vs On-premise
21 | (800) 323-7212 • induscom.com Solutions Avigilon Overview
22 | (800) 323-7212 • induscom.com Avigilon overview Video security Access control Video security does not need to be complicated. Avigilon’s expansive portfolio of cameras, infrastructure, and video management software (VMS) is combined with powerful AI analytics that transform your security operations from passive observer to active partner. With cutting-edge cameras that continuously scan, analyze and learn from their environment, you get unprecedented visual detail and situational awareness to inform the best response. Whether you’re a school district looking for solutions that help you meet strict security and technology requirements or a local convenience store looking to improve employee safety, Avigilon’s on-premise Unity and cloud-native Alta video security technologies can meet your specific needs. From the H6A camera series to the Alta H5A Multisensor to the AI NVR 2, you can find a solution that will take your security to the next level. Couple that with powerful VMS for observing video from fixed cameras or your body-worn cameras, your security team can take full control of operations with AI-enabled tools to help ensure critical events do not go unnoticed. For on-premise operations, Unity Video merges onpremise video management with new AI-enabled and cloud-managed capabilities. It offers an edge-based analytics platform, AdaptAI, to detect potentially critical events. For cloud operations, the open, scalable and easy-to-use Alta Video is an enterprisegrade, cloud-native AI VMS equipped with integrated machine-learning capabilities. Safer facilities start with knowing who to let in, who to keep out and where people are. With Avigilon’s on-premise and cloud-native access control systems, organizations can help keep their facilities secure from unauthorized individuals and help protect people and their assets. Avigilon Unity Access is an on-premise access control system for enterprise-class installations. Easy to deploy and 100% browser-based, Unity Access provides operators with an intuitive turnkey solution that integrates with third-party access control software and hardware, offering superior flexibility. It also integrates with Avigilon Unity Video to provide a unified security solution that helps you proactively observe and secure your sites. Avigilon Alta Access is a fast, flexible, and futureproof cloud-native access control system. Security teams can enhance safety with modern readers and user-friendly mobile credentials while improving awareness from anywhere, anytime thanks to Alta’s remote management capabilities that provide ultimate flexibility and administrative control.
23 | (800) 323-7212 • induscom.com Avigilon overview Your complete security suite The Avigilon security suite provides a complete portfolio of end-to-end video security products and services, powered by intelligence, so you can react faster when it matters most. Smart video management systems Flexible, AI-powered software Avigilon’s video management systems integrate your cameras, access and analytics through an easy-to-use platform for smarter and more efficient management of your sites. Complete situational awareness Our AI-powered on-premise physical security platform brings together video security, access control and flexible cloud management under one centralized and scalable solution. Cloud versatility Deploy a fully cloud-native video management system to gain real-time visibility and insights that you can manage from anywhere. Driven by AI Intuitive and easy-to-use software learns and understands what matters to your security, alerting you when action is required.
24 | (800) 323-7212 • induscom.com Avigilon overview IP security camera systems Versatile cameras for every scenario Tap into the intelligence and flexibility of Avigilon’s comprehensive security camera solutions. Superior imaging Capture stunning image detail with resolutions of up to 61 MP, multiple lens options, and enhanced low-light capabilities, so you don’t miss a thing. Smart from the start Using AI technology, Avigilon’s cameras can detect up to 50 people or vehicles in a scene, even if they are stationary, providing you with greater accuracy. View video from the cloud Cloud-connected cameras allow you to view your sites from anywhere, from the palm of your hand. So, you can keep your sites secure no matter where you are.
25 | (800) 323-7212 • induscom.com Avigilon overview Access control systems Industry-leading technology Secure every entry with powerful on-premise and cloud-native solutions designed to support any number of users and sites, with enterprise-grade security. Reliable and secure Best-in-class smart readers, wireless locks and secure, touchless credentials for all your doors, turnstiles, elevators, parking gates and more. Manage from anywhere Easily grant access and manage your sites directly from your mobile phone, with support on any authorized device with browser-based and cloud-native software. Seamless integration Built on open standards for limitless integration with the tools you use every day to help future-proof your security with a flexible solution.
26 | (800) 323-7212 • induscom.com Avigilon overview AI and analytics Know exactly where to focus your attention With vast amounts of video data coming in every minute, you need a system that helps you focus on what matters most, so you can take action. Real-time alerts for proactive response Know what’s happening across your site with real-time alerts of potentially critical events so you can review and respond quickly. Fast, easy search AI-powered video search helps you find what you’re looking for faster, reducing investigation time from days to minutes. End-to-end intelligence The integration of video security and access control technology provides more context for alerts so you take action faster.
27 | (800) 323-7212 • induscom.com Solutions Avigilon Alta
28 | (800) 323-7212 • induscom.com Avigilon Alta Alta cloud security Avigilon Alta (formerly Ava, Openpath) is Motorola Solutions’ cloud-native security suite that empowers you to control your security from anywhere. Deploy a fully cloud-native security system or connect Avigilon Alta with your existing cameras and readers to modernize with intelligent cloud capabilities and analytics. Secured with end-to-end encryption, the 100% serverless solution supports any number of sites and the ability to integrate your current IT stack or custom apps for total operational flexibility. Experience comprehensive cloud security Improve visibility and increase efficiency across your entire organization with the Avigilon Alta end-to-end cloud security suite, equipped with AI-powered analytics and fully integrated technology. Key Features and Benefits: • Cloud-Native Architecture • End-to-End Cloud-Based Solution • Unified Platform • AI-Powered Intelligent Analytics • Scalable and Flexible • Future-Proof IoT Hardware • Mobile Access Control • Real-Time Reporting and Alerts • Integration with Third-Party Systems A smarter way to solve security challenges Avigilon Alta simplifies security at every level with intelligent technology designed to increase flexibility, efficiency and visibility across any number of sites and locations.
29 | (800) 323-7212 • induscom.com Avigilon Alta Unified video and access control Verify every access event, when and where it occurs with powerful, interoperable readers, cameras and cloud-native software. Manage the entire system together Associate Alta video hardware with entries and view real-time access activity alongside live footage, with integrated and customizable management dashboards accessible from any device. Enhance situational awareness Empower security teams and gain valuable operational insights with real-time reporting, custom AI-powered alerts and visual verification on any device, from anywhere in the world. Improve visibility with interoperable hardware Import live and recorded video from Avigilon Pro Series Smart Readers directly into Alta Video so you can see what’s happening at the door and throughout your entire facility — without being on-site.
30 | (800) 323-7212 • induscom.com Streamline access Reliable mobile access control The Alta cloud access control system is built with scalable technologies that can secure anywhere from a single office to a multisite enterprise with ease. Experience fast, touchless entry Avigilon Alta features a native mobile experience with remote unlock, digital badges, visitor credentials and automatic entry detection. Implement everywhere Choose from a complete range of readers and controllers with live video, two-way intercom and intelligent cloud capabilities in sleek, easy-to-install designs. Manage from anywhere Adjust credentials, schedules and permissions on any device, at any time in the cloud-native Alta Access software. Avigilon Alta
31 | (800) 323-7212 • induscom.com Avigilon Alta Heighten visibility Alta Video AI analytics Extend real-time visibility and proactive security management in the cloud across your entire deployment, all while lowering operational costs and increasing flexibility. Detect threats and anomalies Intelligent algorithms and self-learning technology detect abnormal behavior in specific scenarios and alert operators in real-time. Leverage directional audio analytics Cameras provide 360-degree audio coverage by identifying specific sound patterns, type and direction, and send instant alerts to Alta Video. Make existing cameras smart Transition to cost-effective cloud video management by connecting existing thirdparty cameras and sensors to Alta Video.
32 | (800) 323-7212 • induscom.com Avigilon Alta Scale operations Create your cloud security ecosystem Avigilon Alta is built on open API standards to support limitless integration with all the tools needed to run your business. Scale and automate your operations by integrating our solution with your existing hardware, business software and security applications, and seamlessly transition to cloud security. Easily find and configure cloudto-cloud integrations from leading technology providers with the Alta App Marketplace to build out your security ecosystem, all managed from a single intuitive, open platform. Detect threats and anomalies Intelligent algorithms and self-learning technology detect abnormal behavior in specific scenarios and alert operators in real-time. Leverage directional audio analytics Cameras provide 360-degree audio coverage by identifying specific sound patterns, type and direction, and send instant alerts to Alta Video. Make existing cameras smart Transition to cost-effective cloud video management by connecting existing third-party cameras and sensors to Alta Video.
33 | (800) 323-7212 • induscom.com Avigilon Alta Increase ROI Protect your investment Stay one step ahead with future-proof IoT hardware and flexible cloud management software that never compromises on security. Detect threats and anomalies Intelligent algorithms and self-learning technology detect abnormal behavior in specific scenarios and alert operators in real-time. Leverage directional audio analytics Cameras provide 360-degree audio coverage by identifying specific sound patterns, type and direction, and send instant alerts to Alta Video. Make existing cameras smart Transition to cost-effective cloud video management by connecting existing third-party cameras and sensors to Alta Video.
34 | (800) 323-7212 • induscom.com Avigilon Alta Build a cloud security system Whether you’re starting from scratch or updating an existing deployment, Avigilon Alta has a complete range of powerful and flexible products to secure any space. Smart access control readers Explore multi-technology access control readers for securing your doors, with seamless integration capabilities and cloud technology. Avigilon Alta security cameras AI-embedded cloud video security cameras provide high imaging detail so you always know what is happening at your site. Alta Access Fast, flexible and future-proof access control management software with reliable mobile and 100% remote cloud capabilities. Avigilon access control hardware Find the right access control panels, boards and hubs for your security needs, with scalable equipment for any size organization.
35 | (800) 323-7212 • induscom.com Avigilon Alta Alta Video Scalable, intelligent, cloud-native video security software that helps you gain real-time visibility and insights from anywhere. Alta Cloud Connector Make your existing cameras smart with uniquely scalable realtime AI and transition to cost-effective cloud management. Compliance and certifications Our leading cloud security solution is compliant with global government regulations and ensures our commitment to good security culture, technology and processes. System and Organization Controls (SOC) Federal Communications Commission (FCC) Industry Canada (IC) CE
36 | (800) 323-7212 • induscom.com Avigilon Unity
37 | (800) 323-7212 • induscom.com Avigilon Unity Unity On-Premise Video Security & Access Control Bring together video security, access control and flexible cloud management under one centralized and scalable onpremise video security solution, through Avigilon Unity. Video analytics that automatically learns and improves Unlock a new era of security with Avigilon Unity Video – Avigilon’s AI-powered video management software with cloud-managed capabilities. Avigilon Unity is an on-premise security suite that integrates video security and access control into a single platform. It provides a comprehensive solution for managing and securing physical environments, with features like AI-powered video analytics, access control, and real-time alerts. Key Features and Benefits: • Centralized Control • Easy Remote Access and Management • Unified Platform • AI-Powered Intelligent Analytics • Access Control • Scalable and Flexible • Integration with Third-Party Devices Watch now
38 | (800) 323-7212 • induscom.com Avigilon Unity Detect, verify and act on critical events Redefine how you interact with locally hosted video footage using Avigilon Unity Video. Maximize efficiency with automated alerts and real-time video previews. Make informed decisions with cutting-edge video analytics. Search and locate people or objects Find a person’s location or vehicle of interest across an entire site or multiple sites. Centrally manage sites Easily manage users across all of your organization’s sites, including their access to video and more. Avigilon Unity Access unification Working better together, the Unity Access and Unity Video unification helps verify access control events and alarms, informs access control responses and links visual and physical matches.
RkJQdWJsaXNoZXIy NjA1MzM=