You are here: Solutions & Technology » Solutions

Security and surveillance solutions that fit you

With our video security solutions, you can monitor everything that’s important to you – but only when you need to. We’ll only get in touch with you if something out of the ordinary happens. As soon as you confirm that there is cause for concern, your predefined alarm procedures are set in motion. Our intelligent software also helps you to optimise and track all production processes, including shipments, via video images. We even offer comprehensive yard management solutions capable of monitoring every process and every person. However we help you, you can rest assured that all of our security and surveillance solutions are fully compliant with the strict guidelines of the GDPR.

ei_1650634254129-removebg-preview
IDENTIFICATION

... of all possible objects, how many are present and their movement in video images to control individual follow-up actions.

ei_1650634281984-removebg-preview
PROTECTION

... through preventative, targeted and discreet detection of any irregularities in video images, with automatic warnings for staff.

ei_1650634293001-removebg-preview
LOCATION

... find lost or innocently stored goods or clarify any irregularities in the process, as well as documenting the status and quantities of goods and objects..

ei_1650634308316-removebg-preview
MANAGEMENT

... of processes on the company site. From controlling entry and exit to managing movements, procedures or logistics process optimization.

ei_1650634267438-removebg-preview
DOCUMENTATION

...of processes based on video recordings for analysis and evidence in the event of discrepancies in the goods flow or to uncover sabotage attempts.

IDENTIFICATION

Detect personal protective equipment

AI-trained software identifies known objects and the number

that are present in video images. Detection is based on

previously learnt object characteristics, which are taught in via a

training process based on photos and videos.

Read more »

csm_Identification-of-personal-protective-equipment-400-550_9a980859b2
IDENTIFICATION

Identification of protective cloth-      ing, such as face masks

Since the outbreak of the corona virus, countries such as the

Czech Republic have made it compulsory to wear protective

masks. As an alternative, scarves, shawls or storm hoods are also allowed. The purpose of this measure is to provide better…

Read more »

csm_CS-Mask-Public-Titelbild-01_447-265_23cccd1682
IDENTIFICATION

People Counting - contactless, automatic and reliable

At present, all shops have to comply with the regulatory

requirement to allow only a certain number of customers to

enter their shop at the same time.

Read more »

csm_People_Counting_447-265_b331f11174
IDENTIFICATION

Optimization of hygiene proce-dures in hospitals and forensic institutions

Due to the current pandemic, hygiene measures are being

increased.

Read more »

csm_Mask-Access-Control_447-265_a39c17dad6
IDENTIFICATION

AI-based systems for object detection

AI-trained software identifies known objects and the number

that are present in video images. Detection is based on

previously learnt object characteristics, which are taught in via a

training process based on photos and videos.

Read more »

csm_KI-basierte_Systeme_zur_Objekterkennung-400-550_01_bf92a6561f
IDENTIFICATION

Prevent break-ins/theft

To gain entry, intruders have to get past a number of

“boundaries”: including the fence, garden, car park, doors and

windows of the building. Video analysis detects all suspicious

movement in video images at an early stage and warns staff…

Read more »

csm_Prevent-theft-and-burglary-400-550_6d7b62b11e
PROTECTION

Reduce risk by detecting faults

at an early stage

When handling hazardous goods, the early detection of faults

can save lives. The combination of video analysis and an interface

link to fault detection sensors (gas, temperature etc.)

immediately shows staff what is going on at the location.

Read more »

csm_avert-dangers-400-550_1cb8f6e5ff
PROTECTION

Protect employee privacy

The GDPR provides strict protection for the privacy of people

working in areas that are monitored by video cameras. These

areas can be blacaked out, or people moving around in the

images can be pixelated to protect privacy.

Read more »

csm_How-the-protection-of-personal-rights-is-ensured-400-550_c20752347b
IDENTIFICATION

AI-based systems for object detection

AI-trained software identifies known objects and the number

that are present in video images. Detection is based on

previously learnt object characteristics, which are taught in via a

training process based on photos and videos.

Read more »

csm_KI-basierte_Systeme_zur_Objekterkennung-400-550_01_bf92a6561f
IDENTIFICATION

Prevent break-ins/theft

To gain entry, intruders have to get past a number of

“boundaries”: including the fence, garden, car park, doors and

windows of the building. Video analysis detects all suspicious

movement in video images at an early stage and warns staff…

Read more »

csm_Prevent-theft-and-burglary-400-550_6d7b62b11e
LOCATION

Find incorrectly stored items

By marking (framing) an object in a recorded video image, you

can use “Motion Search” to work out when the item was last

moved. The journey of the item can be tracked seamlessly from

point to point across multiple cameras.

Read more »

csm_Incorrectly-stored-goods-400-550_92748bf285
LOCATION

Boost security at entry points with links to X-ray equipment

At each scanner point that a package passes, video images are

recorded and linked to the read barcode. Using this barcode, you

can call up and simultaneously view all video images for a

package from all scanner points.

Read more »

csm_Lost-goods-on-conveyor-belts-400-550_c4525da498
PROTECTION

Prevent loss of items

The interface to the ERP system enables you to seach on the

order number of a dispatch order. You can view the journey of

each package in an order in almost real-time. Incorrectly loaded

items can be identified and corrected rapidly.

Read more »

csm_Prevent-loss-400-550_3054b7d271
PROTECTION

Clear up attempted deception

The seamless video documentation of the status of the goods –

from order picking through to final dispatch – provides court-

enforceable evidence for any claims relating to incorrect

deliveries, damaged or missing goods, or damaged packaging..

Read more »

csm_Fraud_attempts-clear-enlightenment-prevent-400-550_d2b05c4978
MANAGEMENT

Keep an eye on loading times

To organise the loading and unloading of trucks on your site, you

can automatically record how long trucks spend in the bay and

set a maximum time to limit vehicle traffic and prevent

inconvenience to either party.

Read more »

csm_Clarity-about-time-of-stay-on-the-premises-400-550_189c0ac95a
MANAGEMENT

Reduce waiting times on entry and exit

The administrative processes completed by the security staff at

an entry barrier can take a few minutes. If there’s a lot of traffic

coming to your site, jams can build up on public roads.

Automatic numberplate recognition reduces waiting times to a…

Read more »

csm_reduce-waiting-times-400-550_635f301e1a
IDENTIFICATION

Boost security with automatic entry and exit controls

Automatic numberplate recognition controls entry and exit

barriers based on a “black and white list”, opening the barrier

automatically only when an authorised numberplate and/or

trailer number is detected..

Read more »

csm_Control-of-entrances-and-exits-400-550_5ed0c7d9d0
MANAGEMENT

Control vehicle movement

All authorised numberplates can be assigned to the responsible

loading bay. When the system detects an authorised

numberplate on entry, the driver is shown details of their

destination on a display or sent the information by text message.

Read more »

csm_Control-vehicle-movements-400-550_d6a597dbd6
DOCUMENTATION

Document transfers of liability

Transfers of liability can be a source of challenges in the supply

chain. At these points, one logistics services provider often needs

to prove that the goods were handed off to the next party in the

chain in an undamaged condition. Video…

Read more »

csm_Document-transfer-of-liability-400-550_157bbeb163
DOCUMENTATION

Document damage to goods

Video recordings of all stations that a package goes through in

the supply chain can be found and evaluated in a matter of

seconds thanks to the barcode. Damage or incorrectly loaded

items can be located immediately. Processes that contain errors

are…

Read more »

csm_Document-damage-to-goods-400-550_0e7bc3bbbe
DOCUMENTATION

Uncover and clarify sabotage attempts

There’s nothing worse than a suspicion of sabotage taking place

on your own premises. By marking the damage in the video

recording, you can use backward searching to determine who

caused the damage, or whether it resulted from a genuine error,

in a…

Read more »

csm_Detect-sabotage-attempts-400-550_c848b54089
DOCUMENTATION

Clarify situations with documentation and evidence

The logistics industry is always working under time pressure, and this can sometimes result in collisions between trucks on your

site. Usually, the damage is only superficial. But who will pay for it

to be rectified? Video recordings clearly show…

Read more »

csm_Enlightenment-Documentation-Evidence-Safeguarding-400-550_c8b4ec89bc
DOCUMENTATION

Clarify issues of liability – in a way that is enforceable in court

Whether it’s damage to company property, missing security seals

on trucks, or vehicle damage: Some issues are only identified

days later. Easy image searching immediately locates the video

evidence you need and manages the forgery-proof image

export…

Read more »

csm_Clarify-liability-issues-400-550_bd3cb93edd
DOCUMENTATION

Meet legal requirements

From the continuous cooling chain and weights to protection

against unauthorised access: The law gives you a lot to think

about. The cooling system provides the temperature, the scales

provide the weight, and the access control provides the

personal…

Read more »

csm_legal-compliance-400-550_fe7a9377fe
DOCUMENTATION

Data protection & security

If employees understand that their image data will be handled in          a way that complies with data protection laws (with masking,          dual-control passwords and logging of video views/exports), this creates a sense of trust and allows you to prove that…

Read more »

csm_data-protection-security-400-550_8b6d695747
PROTECTION

G-Core/SmartphoneConnect

The new technology enables the rapid capture of video images, barcodes and QR codes via smartphone. This data is transmitted in real time to the G-Core video management system via a W-LAN or LTE network.

Read more »

csm_c-core-smartphone-connect-400x550px_0c963007d2
ei_1650634254129-removebg-preview
IDENTIFICATION
ei_1650634281984-removebg-preview
PROTECTION
ei_1650634293001-removebg-preview
LOCATION
ei_1650634308316-removebg-preview
MANAGEMENT
ei_1650634267438-removebg-preview
DOCUMENTATION
csm_Identification-of-personal-protective-equipment-400-550_9a980859b2
IDENTIFICATION

Detect personal protective equipment

AI-trained software identifies known objects and the number that are present in video images. Detection is based on previously learnt object characteristics, which are taught in via a training process based on photos and videos.

Read more »

csm_CS-Mask-Public-Titelbild-01_447-265_23cccd1682
IDENTIFICATION

Identification of protective clothing, such as face masks

Since the outbreak of the corona virus, countries such as the Czech Republic have made it compulsory to wear protective masks. As an alternative, scarves, shawls or storm hoods are also allowed. The purpose of this measure is to provide better…

Read more »

csm_People_Counting_447-265_b331f11174
IDENTIFICATION

People Counting - contactless, automatic and reliable

At present, all shops have to comply with the regulatory requirement to allow only a certain number of customers to enter their shop at the same time.

Read more »

csm_Mask-Access-Control_447-265_a39c17dad6
IDENTIFICATION

People Counting - contactless, automatic and reliable

At present, all shops have to comply with the regulatory requirement to allow only a certain number of customers to enter their shop at the same time.

Read more »

csm_KI-basierte_Systeme_zur_Objekterkennung-400-550_01_bf92a6561f
IDENTIFICATION

AI-based systems for object detection

AI-trained software identifies known objects and the number that are present in video images. Detection is based on previously learnt object characteristics, which are taught in via a training process based on photos and videos.

Read more »

csm_Prevent-theft-and-burglary-400-550_6d7b62b11e
IDENTIFICATION

Prevent break-ins/theft

To gain entry, intruders have to get past a number of “boundaries”: including the fence, garden, car park, doors and windows of the building. Video analysis detects all suspicious movement in video images at an early stage and warns staff…

Read more »

csm_Secure-employee-property-400-550_5c0332a408
IDENTIFICATION

Protect employee property by monitoring car parks

IDENTIFICATION Protect employee property by monitoring car parks Full and permanent camera coverage of car parks provides court-enforceable video evidence of all kinds of incidents and helps to deter criminals before they act.

Read more »

csm_Control-of-entrances-and-exits-400-550_5ed0c7d9d0
IDENTIFICATION

Boost security with automatic entry and exit controls

Automatic numberplate recognition controls entry and exit barriers based on a “black and white list”, opening the barrier automatically only when an authorised numberplate and/or trailer number is detected.

Read more »

Let us talk about your individual solution.
CONTACT US