DAVANTIS INTEGRATES WITH CORTECH DEVELOPMENTS

  • 04 Jun 2019
  • by davantiseditor
  • 0 Comments

The new DAVANTIS integration with partners Cortech Developments is now available, enabling end users to receive DAVANTIS advanced video analytics alarms with the Datalog Integrated Security Management Software suite.
This seamless integration between Datalog and DAVANTIS provides end users with a means to verify alarms even more quickly for more efficient site control. Operators can react within seconds and activate deterrents in case of intruders, unauthorised vehicles, tampering and loitering.
In just three clicks, operators will have detailed information about security alarms, receiving a snapshot with a frame around the alarm trigger, a video clip of showing what occurred at the trigger point, and real-time access to the camera that detected the activity and triggered the alarm.
Datalog is a modular software suite that operates as a single or multi-user graphical user interface, providing interoperability for multiple technologies across multiple sites, assisting organisations to reduce risk and costs.

Jason Blundell, Head of Sales & Marketing for Cortech Developments commenting on the integration said “We are delighted to welcome DAVANTIS into our portfolio of integration partners; we are looking forward to working together and providing innovation within perimeter detection. The partnership between DAVANTIS and Cortech demonstrates our on-going commitment to offer users flexibility and the widest choice, when selecting an integrated software platform.”

Aaron Plant - Regional Sales Manager for DAVANTIS - UK and Nordics comments, “DAVANTIS are delighted to be in partnership with Cortech Developments, with integration into the DATALOG PSIM product. The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection, backed by CPNI Level 3 approval. The combined solution delivers high performance, high reliability perimeter alarms via DATALOG to enable fast, efficient verification of real-time intrusions”.

DOWNLOAD PDF