The following table lists the features in Security Center that are available through the Genetec Clearance™ plugin.
Feature | Supported | Additional information |
---|---|---|
Export options | ||
Create new case | Yes | |
Upload video or snapshot to existing case | Yes | |
Add case metadata | Yes | Case incident number, record number, incident time, and description can be created from Security Desk. |
Bandwidth throttling | Yes | Enable throttling to control the maximum bandwidth used by exports. |
Video request options | ||
Publish cameras in Clearance registry | Yes | Select cameras to be published in Clearance registry. Cameras include entity name, field-of-view thumbnail, and archive retention period. |
User management privileges | ||
Request video from participants | Yes | Users with this privilege can request video from participants who have enrolled their cameras in the Clearance registry. |
View Clearance activities report | Yes | Users with this privilege can view the Clearance activities task and review video exports and requests made using the Clearance plugin. |
View participant locations in maps | Yes | Users with this privilege can view the location of participants who have enrolled their cameras in the Clearance registry. |
Cancel other users' Clearance video evidence upload | Yes | Users with this privilege can cancel exports initiated by other users. |
Send evidence to Clearance | Yes | Users with this privilege can send video evidence exports to Clearance. |
Send snapshot to Clearance | Yes | Users with this privilege can send snapshots to Clearance. |
View camera selection | Yes | Users with this privilege can view the camera selection page of the plugin. |
View plugin configuration | Yes | Users with this privilege can view and edit the plugin configurations. |
View request notifications page | Yes | Users with this privilege can add users to the request notifications list. |
Security | ||
AES-256 encryption | Yes | Receive request notifications when new request for Security Center exports are made. |
Communication encryption | Yes | Communication with Clearance is secured using HTTPS protocol and TLS certificates. |
Digital signature | Yes | A SHA-256 signature is generated to detect any attempts to modify data and to ensure the integrity of files. |
Proxy network | Yes | Connect to the Clearance to connect using a proxy network. |