Security and surveillance solutions that fit you

We only respond to unusual occurrences. Once you have confirmed an alarm situation, pre-defined alarm sequences come into effect. Our intelligent software also helps you to optimize all stages of the production and track and trace it via video image, including shipment tracking. We even keep an eye on everyone and anything around yard management.

With our video security solutions, you can monitor everything that’s important to you – but only when you need to. We’ll only get in touch with you if something out of the ordinary happens. As soon as you confirm that there is cause for concern, your predefined alarm procedures are set in motion. Our intelligent software also helps you to optimise and track all production processes, including shipments, via video images. We even offer comprehensive yard management solutions capable of monitoring every process and every person. However we help you, you can rest assured that all of our security and surveillance solutions are fully compliant with the strict guidelines of the GDPR.  

Identification

… of all possible objects, how many are present and their movement in video images to control individual follow-up actions.

Protection

… through preventative, targeted and discreet detection of any irregularities in video images, with automatic warnings for staff.

Location

… find lost or incorrectly stored goods or clarify any irregularities in the process, as well as documenting the status and quantities of goods and objects.

Management

… of processes on the company site. From controlling entry and exit to managing movements, procedures or logistics process optimization.

Documentation

… of processes based on video recordings for analysis and evidence in the event of discrepancies in the goods flow or to uncover sabotage attempts.

Identification

Protection

Location

Management

Documentation

Protection

G-Core/SmartphoneConnect

The new technology enables the rapid capture of video images, barcodes and QR codes via smartphone. This data is transmitted in real time to the G-Core video management system via a W-LAN or LTE network.

Read more

Documentation

Document transfers of liability 

Transfers of liability can be a source of challenges in the supply chain. At these points, one logistics services provider often needs to prove that the goods were handed off to the next party in the chain in an undamaged condition. Video…

Read more

Documentation

Document damage to goods

Video recordings of all stations that a package goes through in the supply chain can be found and evaluated in a matter of seconds thanks to the barcode. Damage or incorrectly loaded items can be located immediately. Processes that contain errors are…

Read more

Documentation

Uncover and clarify sabotage attempts 

There’s nothing worse than a suspicion of sabotage taking place on your own premises. By marking the damage in the video recording, you can use backward searching to determine who caused the damage, or whether it resulted from a genuine error, in a…

Read more

Documentation

Clarify situations with documentation and evidence 

The logistics industry is always working under time pressure, and this can sometimes result in collisions between trucks on your site. Usually, the damage is only superficial. But who will pay for it to be rectified? Video recordings clearly show…

Read more

Documentation

Clarify issues of liability – in a way that is enforceable in court 

Whether it’s damage to company property, missing security seals on trucks, or vehicle damage: Some issues are only identified days later. Easy image searching immediately locates the video evidence you need and manages the forgery-proof image export…

Read more

Documentation

Meet legal requirements 

From the continuous cooling chain and weights to protection against unauthorised access: The law gives you a lot to think about. The cooling system provides the temperature, the scales provide the weight, and the access control provides the personal…

Read more

Documentation

Data protection & security 

If employees understand that their image data will be handled in a way that complies with data protection laws (with masking, dual-control passwords and logging of video views/exports), this creates a sense of trust and allows you to prove that…

Read more