In the latest update of Milestone Systems’ XProtect 2019 R1 video management software (VMS), the company has introduced two-way audio in the Mobile Client, enabling end users to speak to people on camera directly from their mobile devices.
The first XProtect release of 2019 extends the usability of the Smart Client and takes it outside the Control Room with support for both one and two-way audio in the Mobile Client. This is beneficial for ‘on-the-go’ security personnel whose tasks require them to be away from the Smart Client on occasion.
One-way audio allows end users to listen to audio captured by the microphone connected to the camera directly from their mobile phones using the Milestone Mobile application. Users can also increase their situational awareness when video isn’t available, such as in extreme darkness or when an incident happens outside of the camera’s viewing range.
Two-way audio takes the audio capability a step further with Push-to-Talk, a feature that allows users to speak through the camera-connected speaker directly from their mobile phones. This enables security personnel to use their VMS systems preventatively for things like access control, crowd warnings and intruder alerts – all available on mobile.
The 2019 R1 version of XProtect also includes support for two-way audio in the Web Client. Two-way audio allows end users to speak through the camera-connected speaker directly from the Web Client anywhere. This transforms the VMS system into an interactive tool and allows users to respond quickly to access control requests and incident prevention without having to be present in the Control Room or on-premise.
The 2019 R1 version of XProtect takes the system’s resistance against cyber security threats a step forward by encrypting all communication between the recording server and other servers and clients connected to it. This certificate-based encryption requires that all components communicating with the recording server (including third party solutions integrated with the VMS system) follow a strict certification process, guaranteeing the system’s resistance against cyber security threats. This system design provides the end user with the best level of performance encrypted end-to-end.