Security and surveillance solutions that fit you
We only respond to unusual occurrences. Once you have confirmed an alarm situation, pre-defined alarm sequences come into effect. Our intelligent software also helps you to optimize all stages of the production and track and trace it via video image, including shipment tracking. We even keep an eye on everyone and anything around yard management.
With our video security solutions, you can monitor everything that’s important to you – but only when you need to. We’ll only get in touch with you if something out of the ordinary happens. As soon as you confirm that there is cause for concern, your predefined alarm procedures are set in motion. Our intelligent software also helps you to optimise and track all production processes, including shipments, via video images. We even offer comprehensive yard management solutions capable of monitoring every process and every person. However we help you, you can rest assured that all of our security and surveillance solutions are fully compliant with the strict guidelines of the GDPR.
Identification
… of all possible objects, how many are present and their movement in video images to control individual follow-up actions.
Protection
… through preventative, targeted and discreet detection of any irregularities in video images, with automatic warnings for staff.
Location
… find lost or incorrectly stored goods or clarify any irregularities in the process, as well as documenting the status and quantities of goods and objects.
Management
… of processes on the company site. From controlling entry and exit to managing movements, procedures or logistics process optimization.
Documentation
… of processes based on video recordings for analysis and evidence in the event of discrepancies in the goods flow or to uncover sabotage attempts.
Identification
Protection
Location
Management
Documentation
Protection
G-Core/SmartphoneConnect
The new technology enables the rapid capture of video images, barcodes and QR codes via smartphone. This data is transmitted in real time to the G-Core video management system via a W-LAN or LTE network.
Documentation
Document transfers of liability
Transfers of liability can be a source of challenges in the supply chain. At these points, one logistics services provider often needs to prove that the goods were handed off to the next party in the chain in an undamaged condition. Video…
Documentation
Document damage to goods
Video recordings of all stations that a package goes through in the supply chain can be found and evaluated in a matter of seconds thanks to the barcode. Damage or incorrectly loaded items can be located immediately. Processes that contain errors are…
Documentation
Uncover and clarify sabotage attempts
There’s nothing worse than a suspicion of sabotage taking place on your own premises. By marking the damage in the video recording, you can use backward searching to determine who caused the damage, or whether it resulted from a genuine error, in a…
Documentation
Clarify situations with documentation and evidence
The logistics industry is always working under time pressure, and this can sometimes result in collisions between trucks on your site. Usually, the damage is only superficial. But who will pay for it to be rectified? Video recordings clearly show…
Documentation
Clarify issues of liability – in a way that is enforceable in court
Whether it’s damage to company property, missing security seals on trucks, or vehicle damage: Some issues are only identified days later. Easy image searching immediately locates the video evidence you need and manages the forgery-proof image export…
Documentation
Meet legal requirements
From the continuous cooling chain and weights to protection against unauthorised access: The law gives you a lot to think about. The cooling system provides the temperature, the scales provide the weight, and the access control provides the personal…
Documentation
Data protection & security
If employees understand that their image data will be handled in a way that complies with data protection laws (with masking, dual-control passwords and logging of video views/exports), this creates a sense of trust and allows you to prove that…