That’s why Schneider Electric’s Buildings Business delivers integrated solutions that let you access and control your entire building landscape—across enterprises—from a single user interface. The benefits? Simplified usage, faster response times, greatly improved overall systems and integration with reduced costs and peace of mind.
Network digital video surveillance and analytics is a key component in your integrated security strategy. Schneider Electric Buildings offers a full suite of powerful video management and analysis solutions that provide real-time alarm and forensic tools for tracking events.
Our intelligent video does the heavy lifting: surveillance data is automatically analyzed and tagged, sending alarms to operators only when suspicious activities occur. With real-time, actionable information, incidents can be identified immediately and responded to more quickly, for a more secure environment.
- Quickly pinpoint potential security breaches with video content analysis software
- View live or recorded video on-demand for any alarm or event
- Eliminate the need for constant monitoring
- Powerful video analytics processing on the system or at the edge
- Integrated pan/tilt/zoom controls to view every area effectively
- View video at up to 30 frames per second and bandwidth grade resolution.
- Support for analog and IP hardware, protecting your investments in existing systems while providing a future-proof path for digital/IP migration
- Easy storage, search and control of digital recordings on hard disk
Together with Pelco by Schneider Electric, we deliver the most sought after video solutions in the security industry. Pelco is the recognized leader in video security, offering the most comprehensive array of products, services and expertise available today. For more than two decades, Pelco has set the benchmark for innovative and reliable technologies for any market, industry or application.
Traditionally Security, Surveillance, Access & Building Automation systems are set up separately with their own hardware, software, installation, oversight, service, maintenance, administration and training. This approach is no longer viable in a world where security threats are increasing and budgets are shrinking.