Security Center Mobile - Instant information at the touch of a button

Product Profile

The Security Center Mobile feature was developed to help improve security personnel efficiency and provide security users with the information they need as soon as possible. Responding to emergency situations often requires operators to be away from their workstations, but with this new feature operators and security guards can efficiently monitor and control their video surveillance and access control systems while on the move.

With Security Center Mobile, it is now possible to connect back to your security platform over any wireless network and monitor and control your security environment quickly and easily with the latest BlackBerry®, Apple® and Android devices.

The Security Center Mobile feature has been designed to support multi-touch gestures such as swipes and pinches on all the latest mobile devices, ensuring that information is easily accessible and manipulated by users.

Installation is also extremely simple, with several options available to security and IT departments in terms of deployment. On the Apple iPhone, iPod touch, and iPad, security operators only need to log in to the iTunes App Store and load the Genetec Security Center Mobile app.

Standard features available with Genetec Security Center Mobile:

  • Receiving security alarms and push notifications
  • Monitoring live video
  • Controlling PTZ cameras
  • Viewing door status information
  • Unlocking doors

Read more

Technical Specification

Make Genetec
Manufacturer Genetec, Inc.
Category CCTV>CCTV observation systems & accessories
Model code Security Center Mobile
Additional info Receive, view, and acknowledge alarms from your Genetec Security Center platform, including access control, video, and LPR alarms. User authentication and password protection, as well as encrypted access between the Genetec Security Center Mobile app and the Genetec Security Center Mobile Server. Efficiently search and filter through thousands of doors and cameras.
Download PDF version Download PDF version

Related Whitepapers

How to create a successful physical security roadmap

How to implement a physical security strategy with privacy in mind

Cybersecurity in the physical security world

Quick poll
Which AI-powered capability will dominate in the years ahead?




Related tags