The CIM exhibits a framework of monitoring functionalities that is fully event driven, using real time physical access control event occurred within deployment as event marker (valid card entry, invalid card entry, door forced opened, door left opened and many more) to trigger a series of integrated events that enable the operator to quickly locate the event related data within the CCTV system deployed locally or remotely for visual verification purposes – saving you time, and giving you total control over your next course of action, right there and then.
System Diagram