Products
Your current location: Home > Products > Software Products
- Introduction
- Type
- Features
- Parameter
- Case
HT-DVR2000-RVSC-IMS centralized data management system consists of data configuration software, data update server, a device management server and centralized management and monitoring software. Data configuration software can be updated with the data server with the machine running, configure the managed devices, and through the data update server at any time; a device management server for real-time data acquisition equipment management; centralized management monitoring software through the software and servers data support for all devices in the system for all-round monitoring.
The system supports MySQL, SQLServer and other databases, including the database server, the server device data, event collection server, client processing side, the linkage processing server modules, can be in a client interface for video, alarm, intercom, access control, environment monitoring, video walls linkage, remote control, electronic map display centralized alarm processing and control systems, to achieve the true sense of multi-system integration. The stability, integration, can be manipulated, data security, storage efficiency and reliability have comprehensive design, the user can be combined flexibly to meet the needs of different scale projects.
System centralized management of user permissions video monitoring, alarm host arm and disarm, permissions voice intercom, access control and other remote switch for controlling the operation. Implement user permissions across multiple software modules unified control, to solve each security subsystem interconnection, interoperability, interactive and management issues. Fast and easy installation while the system by installing the database, configure the system after the device, you can use a variety of systems equipment resources in each software module, truly separate configuration and event data processing system.
HT-DVR2000-RVSC-IMS Centralized management and monitoring software
● unified user management: centralized management of network users, including assign permissions, role management, network user authentication, users achieve unified management and login services.
● harmonization of the video hosting resource management, such as IP address, host type, name, host resources
● harmonization of alarm host resource management, such as IP address, zone, brand, user interaction, contacts, etc. Alarming plan
● harmonization of access host resources management, such as IP address, brand, gate count, linkage, contacts, etc. License
● harmonization of IP intercom system resource management, such as IP address, brand linkage, broadcast control resources
● harmonization of the remote control system resource management, such as IP addresses, control channel, linkage types
● dispersed, a lot of equipment for centralized management.
● Network user operation log: a detailed record of Internet users IP address, login time, logout time, operation time, operation content, access to the host, access channels, etc.
● Multi-user concurrent access interface service.
● supports user connection limit, to prevent unlimited use of network resources, avoid rush connection phenomenon, to ensure stability of the system
● multi-user, multi-sectoral, multi-level rights management.
● centralized emergency contingency plans, fully functional integrated system.
● The centralized collection system records all events in real-time storage management, distributed under the authority of each software module for processing
● History centralized inquiry, user-friendly query historical operating records quickly, quickly return to the event site, the content contains today, yesterday, last week, etc.
● Online user connection information and control: real-time view the online user's connection information, IP address, host name, connect video host, the connection length, up / down transmission flow and other privileged system administrator can also be forcibly broken suspicious connections On Control
● network security management: Support System Management MAC / IP address filtering, log on to prevent unauthorized computer, while the health status of the server monitoring service, the current number of online users, the connection status, etc., is currently being filtered or blocked website access information, network utilization, etc.
● Login time control, each character can be set a login time, to control user login time
● Area: Set the management of the region by region, each monitoring point video hosting and video channels
● Database Backup: Automatic database backup time and cycle setting