CLOSE
Search
Close this search box.

v-ENGINE D2

Multifunctional
v-ENGINE is a Vigilate product designed to manage IP cameras with video recording and video analysis functions which, in real time, can trigger alarm events. Thanks to a suite of protocols, v-ENGINE is also able to interface and integrate a series of other systems from the main brands in the sector such as: access control, fire prevention and anti-intrusion. Its functions are all-in-one as follows: - NVR - Neural Video Analytics - Integration of third party systems - Gateway to the supervisor
Performance
v-ENGINE allows you to operate video analysis algorithms simultaneously on all connected cameras, ensuring the processing of 8 images per second at VGA or CIF resolution for each camera. v-ENGINE allows on-board recording of all the video streams of the connected cameras at the maximum resolution of the camera up to a max of 8Mpx.
Data security
Data and images are stored in an encrypted manner directly in the product as well as being sent to the v-SUITE Xentinel control system. The video streams sent are authenticated.
Configuration and integration
It is possible to configure v-ENGINE via a web configurator from any remote location via the on-board web server. It represents on the building where a single manager of all security devices is installed, directly managing the balanced sensors of traditional anti-intrusion systems and existing cameras. Furthermore, it also integrates other security systems such as access control units and fire and smoke detection systems. Towards the v-ENGINE platform it is natively integrated with the v-SUITE VIGILATE Xentinel supervisor, but has the SDKs necessary to integrate with the main market platforms such as Milestone, Genetec, Axxonsoft.

Please note that the technical data, information and images contained in this document are for reference only. Vigilate S.r.l. reserves the right to change the data, drawings and information here at any time and without notice contained.

All trademarks belong to their respective owners; third-party trademarks, logos, product names, trade names, corporate and company names mentioned are trademarks owned by their respective owners or registered trademarks of other companies and have been used for explanatory purposes only, without any intent to violate the Copyright rights.

  • Intelligent NVR-DVR system with advanced video analysis directly on board
  • Available algorithms: Blob Motion Tracking; Track & trace; Pointer; People Counter, Anti-climb
  • Manage up to 8 IP channels, for each video channel analyses real-time images at VGA@8fps resolution, with the same video input flows, reducing the number of analyzed flows the system can even analyze 720p resolutions , 1080p and FULL HD
  • Recording up to two H264 streams per channel up to 2TB storage or on external NAS
  • Communication protocols for 3rd part anti-intrusion integration , 3rd part anti-fire systems integration and 3rd part access control system integration (*)
  • Simple Remote I/O devices management
  • Xentinel supervision platform compatibility
  • Cloud computing ready
  • Integration framework with the Xentinel supervisor
  • Web based configuration software
  • Operation control panel
  • (*) Request the list of certified integrable devices. To integrate new devices, contact the sales office

Please note that the technical data, information and images contained in this document are for reference only. Vigilate S.r.l. reserves the right to change the data, drawings and information here at any time and without notice contained.

All trademarks belong to their respective owners; third-party trademarks, logos, product names, trade names, corporate and company names mentioned are trademarks owned by their respective owners or registered trademarks of other companies and have been used for explanatory purposes only, without any intent to violate the Copyright rights.

Bike detection

Bicycle detection video analytics uses algorithms to identify and track bicycles in footage. This technology helps in traffic monitoring, safety surveillance and urban planning for cyclist-friendly infrastructure.

Object

Video analytics for object detection in security systems uses algorithms to identify and track objects of interest, improving the effectiveness of surveillance and enabling rapid response to potential security threats.

Pointer

Target tracking in security systems uses algorithms to monitor and follow specific subjects within a scene, improving surveillance efficiency and facilitating rapid response to security incidents

Face detection

Security face detection video analytics uses algorithms to identify and recognize human faces in footage, aiding surveillance, access control and identity verification in various security applications

Crowd detection

Crowd detection video analytics uses computer vision to analyze video footage, identifying and monitoring crowd movement, density and behavior in real time for various applications such as security and crowd management.

People counter

People counting video analytics uses algorithms to accurately count people in a scene, aiding in crowd management, retail analytics, and optimizing resource allocation in various environments.

Vehicle counter

A vehicle counting algorithm is a computational method designed to count the number of vehicles passing through a line in a particular area, typically based on data from video feeds.
These algorithms are often used in traffic management systems, surveillance systems and transportation planning.

Vehicle detection

Video analytics for vehicle detection uses algorithms to identify and track vehicles within footage, enabling applications such as traffic monitoring, parking management and security surveillance in urban environments and transportation systems.

Animal detection

Animal detection uses algorithms to identify and track animals within your footage. It employs techniques such as object recognition, motion detection and machine learning to distinguish animals from the background while reducing false alarms in modern security and video surveillance systems.

Man down

Automatic neural learning software of the scene, capable of recognizing and identifying the presence of human subjects on the ground. The recognition of the person on the ground works both in the case of a person who is moving and in the case of a person on the ground completely still.

Smoke and fire detection

L’analisi video per la rilevazione di fumo e incendio nei sistemi di sicurezza utilizza algoritmi per identificare e avvisare di segnali di fumo o fiamme, migliorando la sicurezza antincendio e le misure di risposta alle emergenze.

Cross line

Automatic software for the detection of objects (blobs) that cross virtual alarm lines defined within the scene captured by a camera. The algorithm is able to control the crossing of virtual lines in both directions and generate different notifications for each of them (event, warning, alert type notifications). The demarcation lines of the areas are broken in order to adapt them perfectly to the area that you intend to delimit with the analysis tool.

Intrusion

Automatic neural scene learning software for the shape-based classification of objects affecting an alarmed area. This algorithm allows you to discriminate the exact nature of objects moving in a scene in order to diversify reaction strategies based on the type of object recognized and reduce false alarms.

Motion detection

Automatic software for the identification of moving objects (blobs) in the scene framed by the camera, with analysis of the shape, center of gravity, temporal tracking and color histogram of the object under investigation. It employs background modeling techniques with continuous learning of the reference scene.

Blind

The anti-masking algorithm uses algorithms to identify obscured areas and attempts to sabotage the device, preventing potential criminal activity and vandalism and improving the effectiveness of surveillance.

HW features
ProcessorIntel i3 11° Gen 2.2-3.9Ghz 2C/4T
Memory16 GB RAM DDR4
S.O.MICROSOFT® WINDOWS Embedded
SSD120GB M2 NVME per OS, Applicativo e Database
Storage Disk2TB SATA WD PURPLE per storage video
PortsN°2 10/100/1000 Ethernet port
N°2 USB2 ports front panel
I/ON°4 Input Contact N.O.,
N°4 Output Relay
General characteristics
Power supplyCompact 230VAC/12VDC 120W with connector mini-din included
Dimensions110(A) x 230(L) x 195(P) mm
WeightApprox. 5 Kg
Operating temperature-10°C : 50°C
Humidity80% Relative humidity non condensing
ProtectionIP54

Please note that the technical data, information and images contained in this document are for reference only. Vigilate S.r.l. reserves the right to change the data, drawings and information here at any time and without notice contained.

All trademarks belong to their respective owners; third-party trademarks, logos, product names, trade names, corporate and company names mentioned are trademarks owned by their respective owners or registered trademarks of other companies and have been used for explanatory purposes only, without any intent to violate the Copyright rights.

  • Intelligent NVR-DVR system with advanced video analysis directly on board
  • Available algorithms: Blob Motion Tracking; Track & trace; Pointer; People Counter, Anti-climb
  • Manage up to 8 IP channels, for each video channel analyses real-time images at VGA@8fps resolution, with the same video input flows, reducing the number of analyzed flows the system can even analyze 720p resolutions , 1080p and FULL HD
  • Recording up to two H264 streams per channel up to 2TB storage or on external NAS
  • Communication protocols for 3rd part anti-intrusion integration , 3rd part anti-fire systems integration and 3rd part access control system integration (*)
  • Simple Remote I/O devices management
  • Xentinel supervision platform compatibility
  • Cloud computing ready
  • Integration framework with the Xentinel supervisor
  • Web based configuration software
  • Operation control panel
  • (*) Request the list of certified integrable devices. To integrate new devices, contact the sales office

Please note that the technical data, information and images contained in this document are for reference only. Vigilate S.r.l. reserves the right to change the data, drawings and information here at any time and without notice contained.

All trademarks belong to their respective owners; third-party trademarks, logos, product names, trade names, corporate and company names mentioned are trademarks owned by their respective owners or registered trademarks of other companies and have been used for explanatory purposes only, without any intent to violate the Copyright rights.

HW features
ProcessorIntel i3 11° Gen 2.2-3.9Ghz 2C/4T
Memory16 GB RAM DDR4
S.O.MICROSOFT® WINDOWS Embedded
SSD120GB M2 NVME per OS, Applicativo e Database
Storage Disk2TB SATA WD PURPLE per storage video
PortsN°2 10/100/1000 Ethernet port
N°2 USB2 ports front panel
I/ON°4 Input Contact N.O.,
N°4 Output Relay
General characteristics
Power supplyCompact 230VAC/12VDC 120W with connector mini-din included
Dimensions110(A) x 230(L) x 195(P) mm
WeightApprox. 5 Kg
Operating temperature-10°C : 50°C
Humidity80% Relative humidity non condensing
ProtectionIP54

Please note that the technical data, information and images contained in this document are for reference only. Vigilate S.r.l. reserves the right to change the data, drawings and information here at any time and without notice contained.

All trademarks belong to their respective owners; third-party trademarks, logos, product names, trade names, corporate and company names mentioned are trademarks owned by their respective owners or registered trademarks of other companies and have been used for explanatory purposes only, without any intent to violate the Copyright rights.

Bike detection

Bicycle detection video analytics uses algorithms to identify and track bicycles in footage. This technology helps in traffic monitoring, safety surveillance and urban planning for cyclist-friendly infrastructure.

Object

Video analytics for object detection in security systems uses algorithms to identify and track objects of interest, improving the effectiveness of surveillance and enabling rapid response to potential security threats.

Pointer

Target tracking in security systems uses algorithms to monitor and follow specific subjects within a scene, improving surveillance efficiency and facilitating rapid response to security incidents

Face detection

Security face detection video analytics uses algorithms to identify and recognize human faces in footage, aiding surveillance, access control and identity verification in various security applications

Crowd detection

Crowd detection video analytics uses computer vision to analyze video footage, identifying and monitoring crowd movement, density and behavior in real time for various applications such as security and crowd management.

People counter

People counting video analytics uses algorithms to accurately count people in a scene, aiding in crowd management, retail analytics, and optimizing resource allocation in various environments.

Vehicle counter

A vehicle counting algorithm is a computational method designed to count the number of vehicles passing through a line in a particular area, typically based on data from video feeds.
These algorithms are often used in traffic management systems, surveillance systems and transportation planning.

Vehicle detection

Video analytics for vehicle detection uses algorithms to identify and track vehicles within footage, enabling applications such as traffic monitoring, parking management and security surveillance in urban environments and transportation systems.

Animal detection

Animal detection uses algorithms to identify and track animals within your footage. It employs techniques such as object recognition, motion detection and machine learning to distinguish animals from the background while reducing false alarms in modern security and video surveillance systems.

Man down

Automatic neural learning software of the scene, capable of recognizing and identifying the presence of human subjects on the ground. The recognition of the person on the ground works both in the case of a person who is moving and in the case of a person on the ground completely still.

Smoke and fire detection

L’analisi video per la rilevazione di fumo e incendio nei sistemi di sicurezza utilizza algoritmi per identificare e avvisare di segnali di fumo o fiamme, migliorando la sicurezza antincendio e le misure di risposta alle emergenze.

Cross line

Automatic software for the detection of objects (blobs) that cross virtual alarm lines defined within the scene captured by a camera. The algorithm is able to control the crossing of virtual lines in both directions and generate different notifications for each of them (event, warning, alert type notifications). The demarcation lines of the areas are broken in order to adapt them perfectly to the area that you intend to delimit with the analysis tool.

Intrusion

Automatic neural scene learning software for the shape-based classification of objects affecting an alarmed area. This algorithm allows you to discriminate the exact nature of objects moving in a scene in order to diversify reaction strategies based on the type of object recognized and reduce false alarms.

Motion detection

Automatic software for the identification of moving objects (blobs) in the scene framed by the camera, with analysis of the shape, center of gravity, temporal tracking and color histogram of the object under investigation. It employs background modeling techniques with continuous learning of the reference scene.

Blind

The anti-masking algorithm uses algorithms to identify obscured areas and attempts to sabotage the device, preventing potential criminal activity and vandalism and improving the effectiveness of surveillance.

Multifunctional
v-ENGINE is a Vigilate product designed to manage IP cameras with video recording and video analysis functions which, in real time, can trigger alarm events. Thanks to a suite of protocols, v-ENGINE is also able to interface and integrate a series of other systems from the main brands in the sector such as: access control, fire prevention and anti-intrusion. Its functions are all-in-one as follows: - NVR - Neural Video Analytics - Integration of third party systems - Gateway to the supervisor
Performance
v-ENGINE allows you to operate video analysis algorithms simultaneously on all connected cameras, ensuring the processing of 8 images per second at VGA or CIF resolution for each camera. v-ENGINE allows on-board recording of all the video streams of the connected cameras at the maximum resolution of the camera up to a max of 8Mpx.
Data security
Data and images are stored in an encrypted manner directly in the product as well as being sent to the v-SUITE Xentinel control system. The video streams sent are authenticated.
Configuration and integration
It is possible to configure v-ENGINE via a web configurator from any remote location via the on-board web server. It represents on the building where a single manager of all security devices is installed, directly managing the balanced sensors of traditional anti-intrusion systems and existing cameras. Furthermore, it also integrates other security systems such as access control units and fire and smoke detection systems. Towards the v-ENGINE platform it is natively integrated with the v-SUITE VIGILATE Xentinel supervisor, but has the SDKs necessary to integrate with the main market platforms such as Milestone, Genetec, Axxonsoft.

Please note that the technical data, information and images contained in this document are for reference only. Vigilate S.r.l. reserves the right to change the data, drawings and information here at any time and without notice contained.

All trademarks belong to their respective owners; third-party trademarks, logos, product names, trade names, corporate and company names mentioned are trademarks owned by their respective owners or registered trademarks of other companies and have been used for explanatory purposes only, without any intent to violate the Copyright rights.

Technical support
Request our support: thanks to our ticket management platform, you will receive complete assistance in a short time.
Don't know where to start?
Trust our technicians to identify the most suitable solution for your business needs.