Download PDF version Contact company

A technology partnership formed between SALTO and Wavestore is enabling operators to instantly visually verify the identity of anyone attempting to gain access to a site or sensitive areas of a building.

The successful integration of the two companies’ software platforms means users of SALTO Access Control are now able to view event-driven video captured by cameras connected to the Linux based and open platform Wavestore Video Management Software (VMS).

Interaction between access control and video surveillance systems has been possible for some time,” said Enrico Bizzaro, Head of Integrations for Wavestore. “However, with the Wavestore VMS able to quickly process large amounts of metadata, we are now able to provide operators with a powerful tool to instantly display detailed information on who, when and where staff and visitors have entered or moved around a building.”

SALTO & Wavestore enable operators to visually verify in real-time all access control activity

Real-time all access control

The integration between SALTO and Wavestore enable operators to visually verify in real-time all access control activity via the Wavestore Graphical User Interface (GUI).

A virtual spot monitor can be set up to display video captured by cameras associated with the door where an event is occurring. Colour coded text is generated to enable operators to more quickly identify the type of event, e.g. green for access granted and red when access is denied, whilst the operator also has instant access to data such as the name, job title, ID number and image of the person attempting to gain access.

Operators are alerted if a door is forced open. They are able to immediately see who is trying to break in and where the door is located on a map of the building.

Data recording & Forensic searches

Wavestore’s rules engine enables metadata pushed by the SALTO server to be configured to generate various actions when someone presents their access token to the reader, such as trigger a PTZ camera pre-set or a recorded audio message on an integrated speaker.

There is a long list of ways in which the recorded metadata can be filtered to allow operators to rapidly search for specific events

There is a long list of ways in which the recorded metadata can be filtered to allow operators to rapidly search for specific events. These include by time, door and camera location, first name, surname and ID number of a person or any other database credentials.

Seamless security personnel solutions

The combined SALTO and Wavestore solution offers security personnel with a range of other benefits, including:

  • One screen, total control: Just one operator screen is needed to seamlessly manage events captured by analogue, high definition or 360° cameras and the access control system, as well as other integrated third-party technologies.
  • Instant retrieval and transmission of video clips of events using Wavestore’s ‘just 3-clicks’ evidential export function.

This project gives end users a powerful and easy to use platform that delivers a host of security and access control benefits

Security & access control solutions

“Integration is one of our top customer requests and so this project with Wavestore gives end users a powerful and easy to use platform that delivers a host of security and access control benefits," said Ramesh Gurdev, Managing Director, SALTO Systems UK. "With the combination of the two technologies, users now have a comprehensive security solution at their fingertips.”

Globally, SALTO and Wavestore are now routinely being specified for the same high security and mission critical projects,” said Enrico Bizzaro, Head of Integrations for Wavestore. “As a result of this integration, Wavestore and SALTO are now able to provide mutual customers with a highly effective, efficient and easy to deploy solution for video, data and access control management.”

This technology partnership is an excellent example of how Wavestore is working closely with other manufacturers who are experts in their respective fields, to help our distribution and system integrator partners to compete for new projects by offering end-user clients a best-in-breed, seamless integrated solution.”

Download PDF version Download PDF version

In case you missed it

Security predictions 2025: AI, drones, and retail innovations
Security predictions 2025: AI, drones, and retail innovations

With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse futur...

2024 was a big year for M&A in the security market
2024 was a big year for M&A in the security market

Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Ann...

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Quick poll
What is the most significant challenge facing smart building security today?