One of the most common tasks of an operator when responding to an alarm is to call key contacts from a call list. However, the list of who to call at a specific location and under what circumstances is often…
What are data sources? Data sources are used by investigators and security teams to access commonly used information when completing their records. For example, a data source could be an employee directory that lists all the employees of the organization.…
Last year we published a short blog about the ease of creating a QR code as a really simple way for people to report security events into your command center, you can find the blog here. Because this post generated so…
ICYMI— here’s a quick review of the related Feature Spotlight: Automatically plot location of incoming alarms…. At SureView our integrations utilize common standards-based protocols to connect systems. By leveraging these standards, security technology teams do not need to embark on…
Building an accurate, and specific report that automatically provides the information you need in a flash can be a challenge. Cases' reporting module, Insights, can automatically calculate any field that has a numerical value—making it easy for administrators to custom-build…
At SureView our integrations utilize common standards-based protocols to connect systems. By leveraging these standards, security technology teams do not need to embark on complex development projects to connect software systems, they simply need to configure their existing systems to…