{"id":12659,"date":"2023-01-25T10:44:27","date_gmt":"2023-01-25T14:44:27","guid":{"rendered":"https:\/\/senstar.com\/security-digest\/open-platform-certified-third-party-integrations\/"},"modified":"2023-01-25T10:59:24","modified_gmt":"2023-01-25T14:59:24","slug":"open-platform-certified-third-party-integrations","status":"publish","type":"post","link":"https:\/\/senstar.com\/de\/security-digest\/video-management-de\/open-platform-certified-third-party-integrations\/","title":{"rendered":"Open Platform, Certified Third-Party Integrations"},"content":{"rendered":"<p><span data-contrast=\"none\">Installing a video surveillance system is usually one of the first steps organizations take to secure their premises. As organizations grow or security requirements change, a multi-layered approach involving a secure perimeter becomes increasingly important. Perimeter intrusion detection sensors (<\/span><a href=\"https:\/\/senstar.com\/products\/fence-sensors\/\"><span data-contrast=\"none\">fence sensors<\/span><\/a><span data-contrast=\"none\">, <\/span><a href=\"https:\/\/senstar.com\/products\/buried-sensors\/\"><span data-contrast=\"none\">buried sensors<\/span><\/a><span data-contrast=\"none\">, <\/span><a href=\"https:\/\/senstar.com\/products\/above-ground-sensors\/\"><span data-contrast=\"none\">above-ground sensors<\/span><\/a><span data-contrast=\"none\">, and <\/span><a href=\"https:\/\/senstar.com\/products\/video-analytics\/outdoor-people-and-vehicle-tracking\/\"><span data-contrast=\"none\">outdoor-optimized video analytics<\/span><\/a><span data-contrast=\"none\"> help secure the site by detecting and locating intrusions before the intruder can reach the buildings or sensitive areas.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">At Senstar, we are often asked if our comprehensive portfolio of sensor products will work with a site&#8217;s existing video or security management software (VMS\/SMS). The short answer is Yes! The long answer: our products support open, industry-standard interfaces that ensure compatibility with third-party systems, cameras, and devices:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Certified integrations available for all major VMS\/SMS systems<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Free, field-tested, simple to integrate, documented SDK\/API<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Custom messages over TCP\/IP<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Hardware I\/O<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Senstar\u2019s open, industry-standard interfaces avoid vendor lock-in and <\/span><a href=\"https:\/\/senstar.com\/de\/security-digest\/how-open-standards-provide-future-flexibility\/\"><span data-contrast=\"none\">guarantee future options<\/span><\/a><span data-contrast=\"none\"> as requirements and systems change.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Integration App Notes<\/span><span data-ccp-props=\"{&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h3>\n<p><span data-contrast=\"none\">To assist customers with integrating our perimeter intrusion detection sensors with industry-standard video and security management systems (VMS\/SMS), we\u2019ve prepared a set of helpful app notes: <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><a href=\"https:\/\/senstar.com\/wp-content\/uploads\/NMS-ACC-Integration.pdf\"><span data-contrast=\"none\">Avigilon Command Center (ACC)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/a><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><a href=\"https:\/\/senstar.com\/wp-content\/uploads\/Network_Manager_Genetec_Integration_Datasheet_EN.pdf\"><span data-contrast=\"none\">Genetec Command Center (GCC)<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\"><a href=\"https:\/\/senstar.com\/wp-content\/uploads\/Network_Manager_Lenel_Integration_Datasheet_EN.pdf\"><span data-contrast=\"none\">Lenel OnGuard<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"8\" data-aria-level=\"1\"><a href=\"https:\/\/senstar.com\/wp-content\/uploads\/Appnote_NM_Symphony_Integration.pdf\"><span data-contrast=\"none\">Senstar Symphony Common Operating Platform<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><a href=\"https:\/\/senstar.com\/wp-content\/uploads\/Network_Manager_C-Cure_Integration_EN.pdf\"><span data-contrast=\"none\">Software House C-Cure 9000<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"10\" data-aria-level=\"1\"><a href=\"https:\/\/www.videonetics.com\/public\/media\/file\/technology-integration\/videonetics-ivms_senstar-nms-integration-datasheet-1645075234.pdf\"><span data-contrast=\"none\">Videonetics IVMS<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">See Senstar&#8217;s <\/span><a href=\"https:\/\/senstar.com\/de\/technologische-partner\/\"><span data-contrast=\"none\">Technology Partners<\/span><\/a><span data-contrast=\"none\"> page for a comprehensive list of supported applications and software vendors. Not on the list? <a href=\"https:\/\/senstar.com\/contact\/contact-sales\/\">Contact us.<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Installing a video surveillance system is usually one of the first steps organizations take to secure their premises. As organizations grow or security requirements change, a multi-layered approach involving a secure&#8230;<\/p>\n","protected":false},"author":15,"featured_media":11962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[42,362],"tags":[],"class_list":["post-12659","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-digest","category-video-management-de"],"_links":{"self":[{"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/posts\/12659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/comments?post=12659"}],"version-history":[{"count":0,"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/posts\/12659\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/media\/11962"}],"wp:attachment":[{"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/media?parent=12659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/categories?post=12659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/senstar.com\/de\/wp-json\/wp\/v2\/tags?post=12659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}