You are here

Recording and Analytics

In today’s demanding world, keeping people, assets and property safe and secure is more crucial than ever.

Vingtor-Stentofon analytics solution has the capacity to record audio and video, permanent audio streaming and identify the sound from car alarms, voice aggression, gun shots and breaking glass. 

Recorder 2.0 is a fully featured IP audio recorder with additional support for video recording and audio analytics on IP networks and VPN utilizing CAT5/6 cabling or fiber equipment. The software is highly flexible with feature variations provided via software licensing.  This allows for scalability by adding only needed or required features.

Recorder 2.0 has a built in Playback Client for playback of audio, video, and analytic events. Additional Playback Clients can be purchased and installed on other PC’s for remote playback of events. Exported recorded events have a digital signature for authenticity. Recorder 2.0 is installed on Windows 7/8 or Windows Server 2008 or later. The required processing power and memory is dependent on system configuration.

Audio Call Recording 

Ability to record intercom calls such as; station to station, all/group calls, simplex and open duplex conferences on both analog and IP stations.

Video Recording

Recorder 2.0 provides video recording from Vingtor-Stentofon video stations. It also supports other camera formats including MJPEG, H.264 and MPEG4. Through the playback client, it is possible to view live and recorded video. Up to 64 total video devices can be recorded.

Permanent Audio Streaming

Vingtor-Stentofon IP stations can be put in permanent audio streaming mode on a 24/7 basis. Through the playback client, it is possible to view live and recorded video.

Audio Analytics

Permanent audio streams from Turbine Stations can be analyzed for specific analytics such as car alarms, voice aggression, gun shots and breaking glass. These analytics can trigger events when the threshold of the analytic has been reached (via programming). When a threshold is reached, for example, an alarm message can be played, an intercom call placed, and an e-mail notification.

Segment: Government, City Protection & Public Safety, Education, Detention
Solution: Other