Download PDF version Contact company

Eagle Eye Networks, Inc. has announced that it has launched its first phase of video analytics, which includes line crossing, intrusion detection, and object counting within the Eagle Eye Cloud Security Camera VMS. This is the first analytics-based release, empowering customers to easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed.

A True Cloud Solution For Video Surveillance

Eagle Eye Cloud Security Camera VMS customers can simply enable the analytics from the web dashboard or their mobile app for any camera in their account. Eagle Eye Analytics will function on any camera that is supported by the Eagle Eye Cloud Security Camera VMS - no analytic functions of the camera are required. Eagle Eye Analytics will even operate with analog cameras.

Eagle Eye Network’s founder & CEO, Dean Drako stated, “Eagle Eye Analytics are a true cloud solution that are available on demand, per camera, instantly activated, and customers are only charged for what they use. Over the next few years, customers will have the option to turn on more sophisticated analytics as Eagle Eye Networks’ cloud-based model leads the physical security industry in making analytics more functional and more accessible.”

"Eagle Eye Networks’ cloud-based
model leads the physical security
industry in making analytics more
functional and more accessible"

Long-term Advantages Of Cloud-based Solutions

The ability to deploy analytics quickly and without upfront hardware or software investment shows the long-term advantages of a cloud-based solution. Beginning on January 1, 2018, Eagle Eye Analytics will be available to the customer for four to five dollars per camera, per month. For the remainder of 2017, Eagle Eye customers can utilize these analytics at no cost.

The following analytics are now available:

  • Line Crossing – Detects when an object crosses a virtual line. Direction may be specified and notifications may be generated. It is useful for receiving notifications when a security boundary (fence, restricted area, one-way road) is crossed. It is also well suited for monitoring building entrances, loading docks, and parking lots.
  • Intrusion Detection – Detects when an object enters a customer defined area. Intrusion detection is used to generate a notification when an object enters that forbidden area.
  • Object Counting – Counts how many objects cross a line in either directions. This can be used for counting cars, people, or other objects. Total count per day, per direction, and current delta of the count are maintained and displayed.

Improving Operational Efficiency With Analytics

Eagle Eye Analytics provide businesses with insight to improve operational efficiencies in addition to security applications. Analytics offer relevant business intelligence from which marketing, human resources, and operations can optimize their business and profitability.

Video analytics are a powerful tool for small business owners. Aaron Diaz, the owner of Gulf Coast Hardware stores in Southwest Florida described his intended use, “Our store is nearly 6,000 square feet with additional outside retail areas and I’m really excited about the ability to receive alerts based on activity in areas I specify. The counting will come in handy for me to gain a better understanding of the number of daily visitors, who may or may not make a purchase.”

No special cameras or equipment are required to utilize Eagle Eye Analytics. Eagle Eye Analytics work with both analog and IP cameras supported by the Eagle Eye Cloud Security Camera VMS. Businesses do not need to replace their existing cameras to have access to Eagle Eye Analytics.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...