Demos

Intro to Ocularis 5.0

Ocularis 5.0 offers a simplified product line, added operational features, installed security improvements, and streamlined setup and configuration.

RUNTIME 4:08

Critical Camera Failover

Ensures that you never lose sight by switching to a failover camera in as little as two seconds if the connection to the primary camera is compromised.

RUNTIME 5:42

Audit Logging

Allows the administrator to know what data was accessed, exported or removed, when and by whom.

RUNTIME 7:18

Mix & Match

Combine different camera license types under the same system for optimal flexibility and cost savings.

RUNTIME 2:59

Alerting & Event Handling

Increase the availability of information, actions and handling methods upon receiving an alert. Associate multiple cameras to a single event and set incoming alerts to trigger one or more automated actions out of a large variety of actions to choose from.

RUNTIME 7:03

Licensing

Accelerate the migration from analog to IP video surveillance operations with a one-to-one-to-many licensing structure whereby only one license is required for each encoder IP address.

RUNTIME 5:04

Features & Functionality

Allows the administrator to know what data was accessed, exported or removed, when and by whom.

RUNTIME 3:50

Ocularis Investigation Tools

Ocularis Client provides multiple tools for accessing and investigating video of an incident, including Kinetic Timeline.

RUNTIME 1:39

Ocularis Shared Event Handling

OnSSI's Ocularis provides a comprehensive tool-set that enables your organization's entire security team to collaborate...

RUNTIME 1:18

Live Monitoring in Ocularis Client

Instantly investigate during live monitoring and change cameras, copy camera images and send a peer-to-peer video alert, all while keeping an eye on the entire camera array.

RUNTIME 1:38

Ocularis Video Wall Management

Ocularis provides the capabilities to manage and control local unified video client for all versions of Ocularis.

RUNTIME 1:03

Ocularis - Handling a Campus Security Breach

Learn about the event handling process from detection, analysis, shared event handling among multiple users, to distribution of alerts to first responders.

RUNTIME 7:21