The first XProtect release of 2019 extends the usability of the Smart Client and takes it outside the control room with support for both one and two-way audio in the Mobile Client. This is beneficial for on-the-go security personnel, whose tasks require them sometimes to be away from the Smart Client. One-way audio allows users to listen to audio captured by the microphone connected to the camera directly from their mobile phones using the Milestone Mobile application.
Increased situational awareness
Users can also increase their situational awareness when a video is not available, like in extreme darkness or when an incident happens outside of the camera’s viewing range. Two-way audio takes the audio capability a step further with Push-to-Talk (PTT), a feature that allows users to speak through the camera-connected speaker directly from their mobile phones. This enables security personnel to use their VMS systems preventatively for things like access control, crowd warnings, and intruder alerts – all available on mobile.
Two-way audio allows users to speak through the camera-connected speaker directly from the Web Client anywhere
The 2019 R1 version of XProtect also includes support for two-way audio in the Web Client. Two-way audio allows users to speak through the camera-connected speaker directly from the Web Client anywhere. This transforms the VMS system into an interactive tool and allows users to respond quickly to things like access control requests and incident prevention without having to be physically present in the control room or on premise.
Resistance against cybersecurity threats
The 2019 R1 version of XProtect takes the system’s resistance against cybersecurity threats a step forward by encrypting all communication between the recording server and other servers and clients connected to it.
This certificate-based encryption requires that all components communicating with the recording server, including third-party solutions integrated with the VMS system, follow a strict certification process, guaranteeing the system’s resistance against cybersecurity threats. This system design provides the user with the best performance encrypted end-to-end.