Security is just as essential for a two-man company as for a large group of companies. That is why even our smallest compact solution provides a high security level and sophisticated technology. It can provide the same performance, flexibility and reliability as a powerful server solution. And your solution grows with you. It adapts to your needs. It can integrate new modules, from A (such as automatic number plate recognition) to Z (such as zone detection methods). As your needs develop. It's not about what we can do, but rather what you need. And how you need it.
Our new G-Scope makes life easy. It offers a greatly expanded level of base functionality. Much of what was previously additional software is now "all inclusive". Much of what came from different generations is now harmonized. Plenty of power, lots of experience, your benefit. Easily adjustable and easy to use – for both beginners and experts.
G-Core: Totally simple.
Simply comfortable. Comfortable because it's simple! Simple and comfortable. This was and is the most important guiding principle for the development of our new product generation. We are proud of the results: A comprehensive video solution that makes your job both easy and comfortable.
"In all beginnings dwells a magic force." We took these words literally. This is why our setup assistants are called "wizards". They guide you step-by-step through the installation process, from adding a camera to the creation of system events.
Saving time and money. And providing security, since setting errors are avoided from the start. Your entries are saved quickly and reliably.
Since time for training is often scarce, intuitive operation is crucial. Our user interfaces are optimized for the corresponding application. The technical complexity disappears into the background. In addition, they have a uniform concept, so that you always work in a familiar environment. The ergonomic color scheme draws your attention to important screen content. All this helps to make the right decision in an emergency, and it also facilitates fast, efficient search operations. You will also experience a high level of comfort when viewing image sequences: Time-synchronous playback is completely smooth – with H264CCTV even when fast-forwarding or rewinding.
We know thousands of users and how they work. We have incorporated this information into the development of our products. But we do not know you personally, at least not yet. For this reason, we developed a tool that will learn how you work. Depending on the situation, the object to be protected and your personal preferences, you can create scenes. You click the camera images together, zoom into certain areas, activate the timeline display. And G-Scope stores this exact configuration for you. In this way, your personal work profile is created. This makes it easy for you to find your way around. It's that simple.
Access to G-Scope is very straightforward. Regardless whether iOS or Android, Mac OS X, Linux or Windows. Whether smartphone, tablet or notebook: The choice is yours. Whether D1 or UHD resolution, whether live or recorded images: The video data is calculated specifically for browser access and can thus be optimally retrieved over low-bandwidth connections.
Test here live camera images from our G-Scope. If login does not work initially, this is due to the high volume of access attempts. It will work again later!
Username: gweb | Password: gweb
Compliance and data protection
Data protection and compliance are more than just popular buzzwords. Not because we have become better people, but rather because data can travel around the world in a matter of seconds. And then it's out there forever! Messages about targeted or even inadvertent disregard for intellectual property, invasions of privacy or image rights are a daily occurrence. The "offenders" range from adolescents with hacker ambition to overmotivated managers and security officers to paid spies.
Critics often miss the point, however. Video surveillance in particular is often demonized in the discussion on privacy. But this is unnecessary and hasty. With careful planning and wise use of well-controlled systems, a wide range of vulnerabilities can be eliminated. Mature technologies provide concrete functions for data protection and compliance.
External attacks differ in many ways from attacks performed internally. We have developed security options to combat both dangers. Which of them you use depends on your risk assessment, your protection objectives and the functionality of your video system.
Data protection begins with the collection of data, i.e. at the camera. Accordingly, our protective measures begin here. Automatic "Scene Validation" detects camera or lighting sabotage, for example turning, covering, spray painting over or changing the focus of the camera. The images recorded start their data trip here, a trip for which we will take many security precautions. We offer optional encrypted connections and work with tamper-proof formats. From the camera to the server to the user. From image capture, to storage, to use. The video database is based on our own development and is therefore particularly tamperproof. The authenticity of your video data is assured in any court of law. This is one of the reasons why exporting video can be encrypted and password-protected.
We take privacy and protection of personal rights seriously. From static suppression of defined image areas to pixelation of moving objects, we offer many options for privacy protection. Regardless of the camera technology. In an emergency, you can make these image areas visible again. But only with proper authorization. Depending on the rules, access can be restricted using two-person passwords. The level of protection can be customized throughout the entire process. Three areas are particularly relevant.
To have everything in view to ensure object protection, without violating rights. It's a bit like fitting a square peg into a round hole. We accomplish this goal using "fine tuning" of rights:
- At the camera level
- Separately for live and stored images
- For stored images with adjustable time horizon
- For the control of movable cameras with priorities according to alarm or user level
- With two-person passwords (e.g., worker representative and plant security, only with reasonable suspension)
To ensure that access rights can be effectively managed, user rights are administered centrally, and the specifications are automatically transmitted to all devices in the system. Integration with Windows domain management makes work even easier by assigning rights via user groups and "single-sign-on".