21.01.2016 Views

The GSN 2015 Digital Yearbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

VIDEO SURVEILLANCE/CCTV<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Intelligent Video Surveillance Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Object Origin by Qognify<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In mere seconds, Object Origin can analyze hours of<br />

surveillance video in order to detect the first time an object<br />

appears within a recorded scene. A patented video<br />

analytics solution, this unique capability is critical for<br />

high-traffic environments where unattended bags, suspicious<br />

objects, or unauthorized vehicles can cause costly<br />

disruptions or worse. And when combined with Suspect<br />

Search, a video analytics solution that can identifsy and<br />

tracks an individual’s movement in recorded video, law<br />

enforcement and security personnel are able to respond<br />

much faster, potentially criminal and dangerous situations<br />

by finding the object owner’s current location<br />

within seconds.<br />

Why it’s the best Intelligent Video Surveillance solution<br />

When it comes to safety and security, the sooner good<br />

decisions can be made, the more likely risk and damage<br />

can be mitigated. When a suspicious object is involved,<br />

there’s no time to manually scan hours of video, and no<br />

room for second-guessing. Object Origin saves precious<br />

time by quickly providing insight into how a suspicious<br />

object got there. With just one click on the object of<br />

interest, Object Origin starts searching to reveal when,<br />

how, and who placed the object at the scene. This allows<br />

security personnel and law enforcement to make<br />

informed decisions that can save time, resources, cost,<br />

and in some instances lives. While Object Origin can<br />

be used on its own, when it’s part of a comprehensive<br />

security solution in conjunction with NICE Suspect<br />

Search, the individual who left the object can also be<br />

quickly located. <strong>The</strong> operator simply uses uploads the<br />

video image of the object’s owner the target suspect and<br />

98

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!