Sentinel ARC integration

The Digifort open platform VMS is now integrated with Sentinel, the most popular alarm receiving centre (ARC) and remote monitoring station software platform, in the UK.

Sentinel ARC integration

Sentinel provides a consistent user interface for alarm handling from CCTV, intruder, environmental and lone worker systems, independent of the equipment manufacturer being controlled.

On receipt of alarms and events from the Digifort system, Sentinel can be configured to respond in different ways. The following are some examples:

  • Highlight the alarm, so that an operator can make an immediate response, including stacking and prioritizing alarms.
  • Connect to the site for alarm verification.
  • Enable on site PTZ control, whilst in the alarm state.
  • Enable audio announcements, which can correlate with an individual camera or zone on site (zoned audio).
  • Listen for noises on site, using a microphone, which can be on a per camera basis.

Digifort includes a “Global Event” feature where the response, or sequence of responses, to an alarm or event can be specific to when the system is in a Global Event state. Global Events can be triggered in many ways, including from:

  • Digifort video analytics alarms.
  • Intrusion detection alarms from third-party PIRs, access control and sensor systems.
  • Motion detection alarms from cameras or from the server-based, Digifort system.
  • When the Digifort system goes into failover and failback mode.
  • When the connection to a camera, I/O module, or other monitored device is lost and / or re-instated.

Alarms and events generated by Digifort are used to drive the Sentinel ARC platform. However, Digifort’s own extensive functionality is not compromised or limited and can run alongside the Sentinel system to enhance the effectiveness of site security. For instance, whereas a global event might only send an email from Digifort to the Sentinel system at the ARC as an alarm, within the Digifort system real time video alerts can be sent to a specified hierarchy of keyholders, users and operators.

Ready to dive in? Talk to our team today