Eagle Eye Networks

Cloud Video Surveillance

Learn about the benefits of cloud and why more and more businesses are making the switch to cloud video surveillance.

The-4-Cyber-Security-risks-for-Video-Monitoring-Centers-rsz

The 4 Cyber Security Risks for Video Monitoring Centers

Video Monitoring Centers are taking unnecessary cyber security risks daily just by working with video surveillance providers that are not cyber secure. But just because the video surveillance market stays behind the times on cyber security, does it mean the Video Monitoring Centers should, too? Read further to understand the

Read More »
cmvr-product-blog

Eagle Eye CMVRs

In addition to Eagle Eye Bridges, we also offer a range of Cloud Managed Video Recorders (CMVRs). Eagle Eye Bridges transfer video to the cloud, while Eagle Eye CMVRs provide both on-premise and cloud video storage. CMVRs are ideal for when there is limited bandwidth or if there’s a policy

Read More »
5-port-switch-blog

5 Port Managed PoE Switch

Eagle Eye Networks now offers a compact, 5 Port Managed PoE Switch. This is perfect for customers who have limited space and need 1-4 PoE ports. Eagle Eye Networks’ Managed PoE Switches were designed specifically for video surveillance, giving authorized users the ability to power cycle individual PoE ports and

Read More »
generic-beach-resort

Mastering the Podium: Opening & Welcome

This week marks my six month working with vacation clubs and I’ve had some amazing opportunities thus far. I’ve had the privilege of (1) learning from executives and functional employees at countless clubs, (2) sitting in on both podiums and signing ceremonies at many of said clubs, and (3) attending

Read More »

Eagle Eye CameraManager: New Subscriptions

NEW SUBSCRIPTIONS We launched our new subscriptions for Eagle Eye CameraManager. With this, we offer a new standard for all Eagle Eye CameraManager partners. The new subscriptions replace the existing Starter, Business, and Professional subscriptions and come with better and improved features. IMPROVED VIDEO QUALITY With these new subscriptions, we significantly improved the

Read More »
equifax-breach

Most Severe Breach

Equifax, the credit reporting company, just experienced the most severe data breach in history. This breach exposed sensitive information, including Social Security numbers and addresses, of up to 143 million Americans. This is the most severe breach in history because for the first time it includes birthdates, Social Security numbers,

Read More »

The Benefits of LocalLink

With Eagle Eye CameraManager comes a desktop application which you can install and run on your local machine. Because it’s a local application the application contains the most advanced features and is very responsive.

Read More »

How to Manage Cameras on Multiple Locations

With Eagle Eye CameraManager you can manage cameras at multiple locations in one single overview. Because all the cameras connect to the cloud you can easily manage all the cameras from one place. Zones For each location, you can create a zone with the corresponding (optional) contact information. In the

Read More »
build-own-cloud-fi

Build Your Own Cloud

In this article, I provide insight as to why we at Eagle Eye Networks are believers in building your own cloud versus moving all of your core assets to 3rd party companies. As we aim to own the market segment for video surveillance in the cloud at Eagle Eye Networks,

Read More »
line-crossing-blog-post-new-image

Line Crossing

About Line Crossing Line Crossing is setup the same as Object Counting, but with the ability to send a notification when the line is crossed in the specified direction. The current count is not overlayed on the preview or history browser, but the count is graphed. For highest accuracy with

Read More »
Analytics-Counting

Object Counting

About Object Counting For higher accuracy when counting people, use a dedicated camera mounted with a top-down view in which persons remain the same size as they travel through the image. In order to be counted, objects must be tracked across a line. This means the object must be tracked

Read More »
Analytics-Intrusion-Detection-2

Intrusion Detection

About Intrusion Detection Intrusion detection is used to generate an alert when an object enters a forbidden area. The forbidden area may be any size and shape. Notifications may be sent. Intrusion regions are created the same way as motion regions. Click the yellow plus (+) symbol to add a

Read More »
Analytics-Setup

Enabling Video Analytics

How to Enable Video Analytics To enable Video Analytics, go to camera settings and choose the Analytics tab. Each analytic may be enabled separately and is billable per camera. A new tab will appear for each when clicking the checkbox. Camera Settings – Enabling Analytics To view the analytics overlay

Read More »
Security-Analytics-New-Line-Crossing-Image

Security Analytics

Eagle Eye Networks released Line Crossing and Intrusion Detection security analytics for the Eagle Eye Cloud Security Camera VMS. These security analytics ensure surveillance images are continuously analyzed in real-time to alert Eagle Eye Customers to things that need attention. Custom alerts can be generated, and these analytics can be

Read More »
Business-Analytics-Blog-Image

Business Analytics

Eagle Eye Networks launched Object Counting business analytics for the Eagle Eye Cloud Security Camera VMS. With Object Counting, businesses can interpret data directly from the source to help them make smarter decisions. Some examples include: Monitoring presence to reduce utility bills Identifying patterns in customer activity to improve sales

Read More »