Integrated Access Security Management System

WatchNET ACCESS is an Enterprise-Class Security Management System integrated with multiple cohesive modules such as Access Control, Visitor Management, Biometric, Time Attendance, Digital Surveillance, Data Integration & Building Management, etc. WatchNET Access is the industry’s most powerful system that manages multiple control panels, elevator controllers, I/O equipment, proximity readers & biometric devices through secured TCP/IP gateway & encrypted software. A perfect & bespoke system for multi-site integration.


Access Control

Our universal controllers are engineered to be self-contained and superlatively suited for medium & large projects. The panel caters a variety of control & automation functions in addition to the basic access control requirements with the variants of 1, 2, 4 & 8 reader controllers and shall communicate through RS485 or TCP/IP with the Cardholder capacity of 150,000 & Transactions of 270,000 per panel.

Elevator Control

Can control up to 16 floors independently & the system to control access for up to 128 floors. This enables the security Administrator to assign the cardholders to specific floors.

Digital IO Controller & Data Integration

I/O controller has been designed to add a variety of automation functions by seamlessly increasing the number of I/O that already exists on the controller with 8 Output (NC/NO) and 16 Inputs (NO) with a built-in TCP/IP interface.

CCTV & Biometric Integration

WatchNET ACCESS software is seamlessly integrated with digital surveillance through NVRs & Network Cameras. Also, the integration with Biometric readers makes enrollment of the cardholders and their fingerprints/faces from a single screen.

Access & BACnet Integration (BMS)

WatchNET BACnet interface module provides a simple and efficient way to integrate WatchNET Controllers with third-party building management systems. BACnet is a communications protocol for Building Automation and Control Networks. Combining security and building management gives an additional layer of information and operational capabilities.


Mimecast’s sixth annual State of Email Security (SOES) 2022 report

Mimecast has released its sixth annual State of Email Security (SOES) 2022 report, which has revealed that organisations in the Middle East are bracing for the fallout of an email-borne attack. Eighty four percent of United Arab Emirates respondents expect to suffer a negative business impact from an attack in 2022, and 92% of Saudi Arabian organisations report the same, with 14% saying it’s inevitable

The global survey of IT decision makers aims to shed light on cybersecurity challenges, cyber resilience gains from new tech implementations and external forces impacting business.

The emerging picture from the 2022 report is one of markedly increased apprehension over the dire consequences of an email-bourne attack. In 2021 60% of KSA organisations and 76% of UAE organisations were hurt by a ransomware attack, while 90% and 94% respectively were the target of an email-related phishing attempt.

But the report has found that organisations in the Middle East are making gains in building greater cyber resilience. All of the UAE respondents and 94% of KSA organisations either have a cyber resilience strategy or are actively planning to put one in place. But there’s still some work to be done with only 32% of UAE organisations already having a strategy in place, against a global average of 38%. However, 44% of KSA reported the same which is encouraging.
Additionally, despite the uptick in ransomware attacks, the downtime was an average of five days for KSA and 5.8 days for UAE – in comparison the global average of over seven days.

Download your copy of the report to help with your sales conversations surrounding your organisation’s cybersecurity.


Take your security to the next level with AcuSense by Hikvision

Hikvision’s AcuSense technology embeds deep-learning algorithms into security cameras and video recorders to equip businesses and homeowners with smart tools to take security to the next level, both indoors and outdoors. AcuSense technology helps you with accurate, real-time threat detection that distinguishes people and vehicles from other targets.

Security systems are installed in homes and businesses every day to create that sense of security. Compared to conventional sensor-based alarm systems, a security system that utilizes cameras has several advantages:

  • The ability to watch events in real-time,
  • Obtaining key data around those events,
  • Providing solid and accurate evidence for law enforcement.

Empowered by deep learning algorithms, AcuSense technology distinguishes people and vehicles from other moving objects. AcuSense series products are your perfect choices for an accessible and intelligent security system!

  • Accurate Alarm for Humans and Vehicles
  • Search Targets Quickly by Type
  • Visual and Auditory Warning

As a result, you’ll get an alarm only when people or vehicle intrusions are identified, depending on the event type you choose to focus on.


AcuSense Network Camera can be set to react to intrusion events with a flashing light and customizable siren, alerting any would-be intruder that they are being monitored and have already been spotted.


The security team can set their AcuSense devices to send alerts only upon the detection of a human intrusion. Wild animals crossing the line will no longer trigger the alarm.

Restricted Areas

With an AcuSense camera, you can customize an audio message to be sent when the camera detects someone attempting to enter the area.

To know more details about the product, check out here!
Contact us for more inquires:


Edge Computing Makes All Cameras Ready for Facial Recognition

By utilizing new wave of edge computing technology, most cameras can now process biometric verification or identification on-device, significantly reducing server load and bandwidth requirements

Although video surveillance has changed significantly in the past few years, imbuing it with biometric abilities has remained a challenge. To process video streams from security cameras, servers needed high bandwidth and high RAM and computing capacities to be able to process the streams. This also made scaling cumbersome.

With the advent of edge computing – utilizing specially designed systems-on-chip or systems-on-module for specific, computing-intensive tasks at the place where video stream is created – has changed the game. These chips can pre-process most of the intensive tasks at or near the cameras and send only the extracted biometric data, usually faces, for final matching on the server.

Innovatrics, a seasoned European developer of biometric solutions, introduced edge computing into its latest public security offering. Its SmartFace 5 combines facial recognition and anomaly detection features into a preemptive security system.

“Our aim is to prevent security incidents at the earliest moment possible by utilizing our trusted facial recognition algorithms and real-time notification system,” explains Michal Vilagi, SmartFace Development Manager at Innovatrics.

The brand new main airport at Palmerola, Honduras has opted for SmartFace 5 as its video surveillance solution.

Using SmartFace’s cascaded architecture, a video feed can be pre-processed on the camera, resulting in significant savings of the required network bandwidth along with server resources required at the central site.

The major advantage of this edge-to-cloud architecture is the scalability of the system, which can virtually support an unlimited number of cameras and protect entire cities without missing a single important event. It also allows the connection of as many cameras as required without overburdening the whole architecture.

Moreover, SmartFace 5 can utilize GPUs to further improve the performance of the entire system. The GPUs can be both on the main server and on the edge system as well, such as in the NVIDIA Jetson device. It also makes use of specialized systems-on-chip such as Blaize or Ambarella. In conjunction with fully-fledged ABIS it also allows searching video streams for faces in real-time or even faster in case of the recording, allowing instant interception or investigation of suspicious events.


Vandal-proof filter fan Kit

The filter fan kits are devised for the installation in a limited space of electrical enclosures, that can be used for the deployment of protected outdoor video surveillance systems. The devices feature a vandal-proof original design.

NSBon-19 kit is designed for mounting in electrical enclosures in order to bring outside air into the enclosure from the bottom and force the hot air out of the top of the other side. The units are made in a vandal-proof housing with the possibility of quick filter replacement. The kit includes two housing, two fans both intake and exhaust, two filters.

Fan filter units are used for enclosure climate control to dissipate heat from within the enclosure to prevent the premature failure of the equipment inside it. It helps to increase an operational reliability and a service life for electrical and electronic systems.

The filter fan kit is suitable for the most types of electrical enclosures whereas it has been created for outdoor access nodes, referred to as NSBox, that used for the deployment of protected outdoor video surveillance systems. The Nodes provide trouble proof operation of connected video cameras with a secure power supply, reliable data transmission, and protection of sensitive equipment from power surges.


Extending the lifespan of physical security through unification

Many organizations find themselves with proprietary solutions that aren’t meeting their evolving security needs. These solutions can be a serious liability as they try to respond to new, emerging security threats, a growing footprint, and increasing pressure from decentralization.

When looking to modernize your existing physical security system, you must determine the best foundation for your new security infrastructure. There are two options available:

System integration


In this whitepaper, we’ll walk you through the five pillars to help you make the most informed decision when choosing a solution for your organization.


Simplify Security Operations

Security operation teams face rapidly increasing demands, threats, growth and, always, change. SureView has responded by developing a suite of software that simplifies and dramatically improves the ease of managing and operating any security program or operations center. Offered as a Saas, you can subscribe to individual modules or the entire suite for enhanced manageability.

Integrated with the tools you rely on

The SureView Operations Suite is an integration platform providing a single, easy-to-use, interface connecting all critical systems. Now you can leverage universal protocols or native plugins from our extensive integration library, SureView simplifies the integration with your security and the back-office systems of your organization. Have a look at our 3 newest modules:


A single interface for coordinating the real-time response to alarms and events–from any system, any device, any source, anywhere around the globe.

Field Operations

Connects your field team seamlessly with the command center—track the real-time location and status of field staff and critical assets with the SureView Mobile app, providing immediate situational awareness to responding teams.


Our flexible incident-tracking and investigation tool adapts to your workflow, delivering information from operations to investigations teams—immediately, succinctly, accurately. Any incident can evolve into a case and the information is all there for key stakeholders and law enforcement to access.

Download our latest Whitepaper – Integrating your Security Operation: A roadmap for connecting technology to deliver operational value, to learn more about how to unify technology in the security command center.


The knowledege [to] protect

Leonardo’s Cyber & Security Academy is an advanced training centre that enables institutions, companies and organisations to train and certify their teams on security issues, at technological, regulatory, methodological and process levels, providing the tools to promote a secure digital transition and contributing to spread a culture of security.


Immersive, modular training courses, adapted to operational needs, enable students to consolidate theoretical and practical skills in prevention, detection and management of cyber-physical security incidents already acquired through university courses, post-graduate Masters and specialised certifications. This approach combines technological expertise with enhancement of the ‘human factor’, crucial to increasing risk awareness,

The Academy uses platforms for virtualisation and immersive training, based on proprietary technologies developed in collaboration with Defence, Research, University and SME organisations. Students can learn both individually and in groups, through an immersive cyber game that is both collaborative and competitive. Leonardo’s platforms are able to support exercises with digital twins of thousands of nodes and hundreds of networks, simulating up to five complex scenarios simultaneously, with multiple teams and tens of users per team.

Leonardo’s Cyber & Security Academy enables students to follow training courses online and in person at its partners’ premises or at Leonardo’s premises in Genoa (the main facility with spaces that can be booked on request for training, events, testing centres and registrations), Chieti and Rome.