Average Ratings 3 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

No need to buy expensive sensors - Camlytics works with any IP camera system! Get the most important data from your video streams. Camlytics can detect motion, count people, cars and build heat maps. This will increase the efficiency of your camera system. We don't store any camera data/events on our servers so your privacy is completely protected. Also works with video archive. We offer simple webhooks and API for all camera events (Motion detected. Line crossed. Tailgating. Camlytics can be used with any third-party software. Example of object counting in complex mall entrance conditions: many obstructions (automatic door), rough light changes. Despite these obstacles, precision in this demo is approximately 95% thanks to overhead camera positioning. Example with faraway camera in rough conditions. Constant light changes, car lights glares, angle camera. As you can see, cars and people can still be reliably identified, tracked, and counted.

Description

Put a stop to invasive surveillance and unattractive webcam coverings. Not only do millions of everyday users resort to taping over their webcams, but high-profile individuals like Facebook's founder Mark Zuckerberg and former FBI director James Comey do the same. The reality is that constant surveillance is a pervasive issue, as highlighted by the revelations from whistleblower Edward Snowden in June 2013 when he exposed NSA documents. The risk is not just from hackers who exploit webcams without alerting users; modern malware is also a significant threat, specifically designed to gain control over integrated device cameras. Fortunately, with a single click, you can activate Camera Guard, which effectively blocks and monitors any processes attempting to access your camera. Any potential security breaches are promptly reported, allowing you to maintain control over which applications are permitted access to your peripherals. Additionally, we have developed Deep Detective, an advanced tool that diligently tracks all access to your macOS device, enhancing your security and privacy like never before. This innovative solution not only safeguards your camera but also provides peace of mind in an increasingly monitored world.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Apple Mail
Apple Photos
Google Cloud BigQuery
Google Sheets
Protectstar Micro Guard

Integrations

Apple Mail
Apple Photos
Google Cloud BigQuery
Google Sheets
Protectstar Micro Guard

Pricing Details

$129.00/one-time/user
Free Trial
Free Version

Pricing Details

$8.90 per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Camlytics

Founded

2014

Country

United States

Website

camlytics.com

Vendor Details

Company Name

Protectstar

Founded

2004

Country

United States

Website

www.protectstar.com/en/products/camera-guard

Product Features

People Counting

API
Anonymous Counting
Benchmarking
Car Counting
Conversion Tracking
Data Export
Events Statistics
Heatmaps
Mood/Age/Gender Recognition
Motion Detection
Reporting / Analytics
Retail Counting
Staff Exclusion
WiFi Tracking
Zone / Area Monitoring

Physical Security

Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Alternatives

Alternatives

Xeoma Reviews

Xeoma

Felenasoft
VCA Reviews

VCA

VCA Technology