Download PDF version Contact company
G-SIM closes future connections to recorders that are not in use
G-SIM can now be synchronised with Microsoft Active Directory

Geutebruck's G-SIM is a leading security information management system. To ensure it stays that way, a Geutebruck development team works constantly on new optimisations under the motto "Simply More Efficiency"

Simple

G-SIM can now be synchronised with Microsoft Active Directory. This user management is further simplified. "Easy" is also a topic in the processing of site maps: Customer-specific symbols, called map object graphics can now be stored in a central library. This makes individual adjustments easier.

More

More flexibility in the monitor control adds this new feature: Effective immediately scenes and layouts can be permanently assigned to monitors. This makes it possible to always show the same scene. And for even greater reliability against failures, multiple spare recorders are now introduced for the failover feature. Previously, only one spare could be used per configured site.

Efficiency

This function is focused on system efficiency and low bandwidth: G-SIM closes future connections to recorders that are not in use. G-SIM does this automatically for the user in the background

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?