SYS-CON MEDIA Authors: Jim Kaskade, Yeshim Deniz, Elizabeth White, Greg Ness, Sean Houghton

News Feed Item

Eagle Eye Networks Announces On-Demand Security Camera Video Management System (VMS)

Eagle Eye Networks, Inc. today announced its flagship product, the Eagle Eye Security Camera Video Management System (VMS). Customers get the advantages of cloud management and cloud storage - including lower TCO, on demand deployment, and centralized management - all with complete flexibility to store video in the cloud, on premise, or any combination of the two.

Eagle Eye Security Camera VMS Bridge (Photo: Business Wire)

Eagle Eye Security Camera VMS Bridge (Photo: Business Wire)

The Eagle Eye Security Camera VMS solves the historical obstacles to cloud deployment, such as high bandwidth consumption, security/privacy vulnerabilities, and limited camera selection. Eagle Eye delivers Intelligent Bandwidth Management™ and Complete Privacy Encryption™, and supports a broad array of IP and analog cameras.

In other news today, Eagle Eye also announced its company debut. The company’s President and CEO Dean Drako was previously founder, President and CEO of Barracuda Networks, an IT security company.

The Eagle Eye Security Camera Video Management System is an on-demand secure VMS that is 100% cloud-managed. It offers anytime anywhere access to live and recorded video, provides comprehensive mobile applications, and consolidates multiple sites into a single view. The Eagle Eye Security Camera VMS is currently deployed at a large variety of customers, spanning large and small businesses, retail, commercial, residential, and mixed use communities.

“The desire for on demand deployment, mobile viewing, instant alerts, off-premise video storage, high reliability, and reduced cost of ownership - including lower infrastructure investment - has been driving companies to evaluate cloud-based video systems,” said Drako. “However, to date, excessive bandwidth requirements and security vulnerability concerns have hindered broad adoption. We have spent the last 18 months working extensively with customers to ensure our Eagle Eye Cloud Security Camera VMS captures the full potential of the cloud and overcomes these challenges.”

Eagle Eye Security Camera Video Management System (VMS)

The Eagle Eye Security Camera VMS gives companies the tools to meet their security and business operations goals:

Mobile and web video access with critical alerts

Companies can view their live and historic video with audio from mobile devices or any major web browsers from anywhere in the world. Businesses can set up email and SMS alerts for important items spanning activity, irregular activity, motion detection, camera malfunction, system tampering, and more.

They can also easily specify appropriate permission levels for different users to view and download video. The system is web/browser based, with role based management, therefore access can be given to different departments of the business for both security and operations management.

The VMS can be used for traditional security and loss prevention, as well as to achieve broader operations and business goals, such as training, verifying compliance, reducing slip and fall risk, optimizing product placement, store quality, raising customer service levels, and verifying operational hours.

Simple, fast on-demand deployment and support

Because Eagle Eye's system is on-demand and cloud based, there are no traditional DVRs, PCs, or software to buy and support. Eagle Eye’s on-premise bridge and cloud-managed video recording appliances require no networking expertise, router configuration, or software installation. All software is automatically upgraded and maintained for all customers. When using Eagle Eye cloud storage, companies don't need to worry about disk space, configurations, hardware failures, backups, or other IT tasks. The Eagle Eye Security Camera VMS uses a high reliability redundant cloud-based architecture so the customer's video data is always safe.

The retention period and the number of cameras can be adjusted at any point in time without having to purchase additional hardware or manage hard disks. It’s easy for customers to add cameras or sites when they need too. Most cameras can be configured and installed with a single click.

Eagle Eye Security Camera VMS Maximizes Cloud Benefits while Eliminating Drawbacks

Eagle Eye delivers several key technology breakthroughs to maximize cloud benefits and eliminate drawbacks.

1. Compatibility with most IP and analog cameras

Eagle Eye works with most ONVIF compatible cameras and most analog cameras. Resellers and businesses get maximum flexibility to utilize existing cameras and select optimal new cameras.

2. Eagle Eye Cloud-Premise Flex Storage™

Eagle Eye gives customers the flexibility to adjust the portion of video stored in the cloud and the portion stored on premise. Video can be stored entirely on premise, entirely in the cloud, or in any combination, based on the customer’s security requirements, such as eliminating the risk of evidence or system tampering, available bandwidth, number of cameras, and the customer’s application. The user has the same smooth experience with real-time video search and access, independent of the video storage location or user location.

3. Eagle Eye Complete Privacy Encryption™

Eagle Eye eliminates the security vulnerabilities commonly found in other systems. There are no open ports to the internet. The video is fully encrypted during transmission and fully encrypted at rest -- making evidence tampering nearly impossible.

4. Intelligent Bandwidth Management™

Earlier cloud recording systems faced challenges with bandwidth consumption. Eagle Eye’s unique, multi-layered bandwidth management technology means the system works with both small and large camera installations without requiring additional bandwidth. In addition the Cloud-Premise Flex Storage provides a consistent user interface regardless of where the video is stored.

Pricing and Availability

Eagle Eye Security Camera VMS is available immediately. Pricing starts at $299 for an on-premise bridge appliance with a $4.99/camera/month subscription.

Security Professionals Select Eagle Eye Security Camera VMS

Several companies have already validated and deployed Eagle Eye Networks Security Camera VMS including Royal Securities, Capital Factory, and Stonegate.

Royal Securities
“We’ve deployed the Eagle Eye Security Camera VMS at three locations recently. Eagle Eye was extremely easy to implement, even for our installers who were experts on analog cameras rather than IP cameras,” said David Manento, President of Royal Securities. “Their digital IP camera system was just plug and play – we didn’t have to do any routing configuration. The images are great and it just works – the playback is always there when we need it. We manage video monitoring for our customers, and this level of reliability is critical.”

Capital Factory
“Our Eagle Eye security camera system has 15 cameras across multiple floors of our 50,000 square foot facility. We have had a couple of security related incidents occur and were able to use the Eagle Eye Security Camera VMS to quickly and easily do the forensic search to identify the people involved,” said Sarah Cox, Operations Manager at Capital Factory. “Eagle Eye fully encrypts the video, so we know the content is completely secure – this is an absolute requirement for us. Eagle Eye does all the video management, so I can focus on other operations rather than worrying about managing system software or hardware.”

Stonegate
“We have a gated community, and given my own background in security and software, I knew exactly what I wanted in a security camera system for our entrance and exit. Eagle Eye Networks met my criteria,” said Phil Burks, Vice President of Stonegate Communities. “Eagle Eye not only had the mobile access we needed, but its off-premise recording means we don’t have to worry about anyone tampering with our video evidence. By having the Eagle Eye Security Camera VMS in place, we are offering our residential community a greater feeling of protection.”

Download: Security Camera System Whitepaper

About Eagle Eye Networks

Eagle Eye Networks is a provider of the first on-demand cloud based security and operations video management system (VMS) that provides both cloud and on-premise recording. Eagle Eye offers secure recording, transmission, and storage, camera management, mobile viewing and alerts --all from a 100% cloud managed platform. The Eagle Eye Security Camera Video Management System supports a broad array of IP and analog cameras, and delivers Complete Privacy Encryption™. It also uses Intelligent Bandwidth Management™, making it easy to deploy at single and multiple sites, both small and large. Eagle Eye Networks sells through authorized resellers. The headquarters is at 411 Brazos St, Suite 101, Austin, TX. For more information please visit www.eagleeyenetworks.com or call +1-512-473-0500.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...