The 'appearance alerts' capability of the new version helps commercial organizations, educational institutions and hospitals, accelerate response times by identifying people of interest.

Avigilon Control Center 7.4

Avigilon has incorporated AI facial recognition technology into the new version of its video management software (Control Center – Acc).

The new ability to 'appearance alerts' (appearance alerts) version 7.4 helps commercial organizations, educational institutions and hospitals, accelerate response times by identifying people of interest in business environments. For example, can alert the security team in a high school when an individual who does not have access permission enters campus.

Avigilon Control CenterPersons of interest are identified based on a safe and controlled watch list created and maintained by authorized users.

Organizations that use the new ACC software and license Avigilon cameras for facial recognition, can identify matches based on the watch list. If a possible coincidence is found, the user receives an alert within the ACC software and security personnel can determine if further investigation or action is needed.

“The latest update to our ACC software provides substantial benefits by providing facial recognition technology in a safe and controlled manner. Appearance alerting capability allows for a reactive approach, looking at a wall of video streams where critical information can be easily lost, to a proactive approach that provides important information directly to authorized users so they can make better informed decisions", explains John Kedzierski, senior vice president of video security solutions at Motorola Solutions.

ACC's new facial recognition capabilities reflect Motorola Solutions' commitment to the use of artificial intelligence, as well as individual privacy rights. Data management is an integral part of these new capabilities. User authentication required for them, audit logs of actions are generated, data retention periods can be specified for the observation list within the application, and records can be deleted or verified through audits and reports.


You liked this article?

Subscribe to our RSS feed And you won't miss anything.

Other articles on
By • 9 Jan, 2020
• Section: Systems control, Video surveillance