Numéro copié

An easy-to-integrate product

We pay close attention to the ease of integrating our product for users. Each tool has been designed to reduce integration time (automatic generation, ergonomic positioning, site audit tools, etc.) to ensure you have the best integration experience.

Our integrator applications

What is the SIP ?

The SIP (System Integrator Program) is a package designed for system integrator partners to train them in the integration and deployment of the Smart Shield ERP hypervision software, and to provide them with a reference platform.

The shared goal is to generate business together after this skill development, through mutual referral and giving the integrator the ability to include Smart Shield ERP in their responses to tenders.

What we offer you

Comprehensive training on our software

We train you on all our applications, from installation to testing, and then provide you with all the manuals. We support you throughout the installations via a ticketing platform.

Software license included

So you can conduct every necessary tests.

Certificate + diploma

Of the software, to be received at the end of your training.

Interested ?

Integration and deployment capabilities of our solution

Compatibility with sensors and subsystems

Compatible with existing hardware

  • All types of cameras, recorders, and VMS
  • All types of intrusion detection
  • All means of communication and geolocation
  • Expert sensors (Radar, NRBCE, Biometrics, etc.)
  • SDK for new system plugins

Deployment flexibility within an IT infrastructure

Distributed architecture

  • Microservices architecture
  • Compatibility with Oracle, DB2, SQL Server databases
  • Multi-programming languages
  • Virtualization, containers, cloud, multi-OS

Configuration and settings capabilities

Flexibility in configuration and settings

  • Factory configuration with sensor simulation
  • Import of 3D models with processing
  • Zone management
  • Configuration of alarm correlations
  • Homogeneous management of subsystems of the same nature
  • Management of technical alarms from subsystems
  • Network failover management
  • Training kit for integrators

Compatibilité avec la cybersécurité

Encryption and cyber alerts

  • Authentication and encryption processes (PKI, TLS, AES, etc.)
  • Interface with third-party encryption
  • Interface with SIEM