Skip to main content
Bosch Security and Safety Systems I South Korea
Management Software

BVMS 12.1 with multi-camera Forensic Search

security operator in control room with BVMS on screens

In today’s increasingly digital world, new solutions like anonymizing video streams are important to facilitate compliance with ethical data handling practices and legal industry guidelines. However, operators must ensure the building is secure and know what is happening inside and outside, so balancing personal privacy with security and safety measures is crucial. With the new AI-based Privacy overlay in BVMS 12.1, anonymizing persons in the field of view of selected video streams enables businesses to maintain the safety and security of people and property by visualizing the right information at the right time while protecting the personal privacy of individuals captured on video.

BVMS 12.1 is a modular, resilient video management system that offers maximum security through seamless integration with a broad range of security domains and applications. It can add value at every touchpoint, from video surveillance to access control to intrusion detection. Ideal for government buildings and financial institutions, BVMS 12.1 presents all relevant information at the right time via one intuitive interface.

security operator in control room with BVMS on screens

Multi-camera Forensic Search

Multi-camera forensic search

When searching for relevant events in video archives, it's critical to quickly locate results, even if the exact time is unknown. BVMS scans the recorded metadata to find specific events within seconds, improving efficiency. With its new multi-camera Forensic Search feature, the software allows searches across multiple camera feeds simultaneously, significantly reducing time and effort.

Forensic Search benefits:

Explore playback recordings during investigations with ease

Search for any motion in a selected area or find events in recorded video data, such as objects entering or leaving an area, traversing a route, loitering in an area, and more. Available IVA metadata is used so no manual replay of recordings is needed. Operators can change search rules even after an event has occurred.

Search across multiple cameras quickly

Perform an exact search across multiple cameras faster by configuring a single task and applying it to all the cameras opened in playback mode. This method simplifies the configuration process and allows you to get results quickly.

Easily define specific search criteria

Each camera can be configured individually with specific search criteria. The search process can be run only once, enabling advanced search scenarios.

Streamline your work

Use global task search for one or multiple cameras.

Decouple and manage your cameras with ease

With a single click, each camera can be kept at a specific time position or adjusted using our intuitive controls.

Reliably detect and anonymize persons

The AI-based Privacy overlay removes personal data from videos by pixelating the whole person without exposing their unique identity, ensuring compliance with data protection laws and regulations worldwide.

Situational awareness of where a person is in a particular area without identifying them is still possible with descriptive information such as clothing type or color, which is not inextricably linked to a single person. Depending on user permissions, operators can restrict cameras to public spaces, entryways, and perimeters. The client application anonymizes video so businesses can use their existing, compatible Bosch or third-party cameras. A single-camera stream can be used for live and recorded video, enabling masks based on user permissions. Operators can apply these masks only for specific system events as an added benefit. If necessary, unprocessed video footage can be turned over to law enforcement.

Pixelated people standing in studio

Highlights

Securing data at the highest level

security lock, hands

Because video data is often highly critical and sensitive, every component of the video security infrastructure, including cameras, storage devices, network communication, Public Key Infrastructure (PKI), and video management software, needs to be addressed. Bosch embraces a systematic approach centered on a built-in Trusted Platform Module (TPM), safely storing all certificates and keys required for authentication and encryption. This strategy encompasses Bosch cameras, storage devices, and network communications.

Users can rely on BVMS for maximum resilience with continuous live video and playback, no matter the interruption. The video management system keeps operations running even if both management and recording servers fail. BVMS uses Advanced Encryption Standard (AES), preventing unauthorized access to sensitive data. It also offers extensive user management to ensure only authorized users can access video data.

BVMS portfolio

Thanks to its scalability, BVMS grows with the customer’s video surveillance system's needs and can manage up to 200,000 cameras. From live and recorded video data to advanced functionalities such as alarm and event management, map viewing capabilities, and maximum resilience, there's a BVMS edition for everyone.

Downloads

Thumb Infographic

BVMS

Infographic

Share this on: