The origins of Critical Event Management solutions start with Mass Notification Systems, these systems are used to essentially define groups of people to be sent targeted alerts regarding specific events. For example, send all the police officers in Precinct 12 a message indicating that the traffic lights at the intersection of Main St and Townsville Blvd are not functioning. The functionality usually extended to telephony integration, customized recipient lists and the ability to send follow-on messages.
The next evolutionary step was when Mass Notification was combined with Geographic Information Systems such as digital maps and geofences. This leap forward in functionality allowed system administrators to set boundaries and define areas affected by events, additionally system users could now identify and select groups of people based on their proximity to an event or location. This was a transformational jump in capabilities, making CEM solutions essential tools for ensuring safety and security.
It was at this stage in the evolution of CEM solutions that we entered the marketplace, our objective from the onset was to extend the capabilities of our industry segment in several distinct directions. One approach was to provide an interface to thousands of types of sensors and input devices, ranging from simple smoke detectors to complex machine vision and pattern recognition systems. Another direction took us into the realm of workflow and conditional branching combined with service level management. Yet another initiative forced us to conclude that users should be empowered to be able to build input data interfaces, response templates, workflow rules and logic without needing to write a single line of code. This empowers the users to make the system their own and to build solutions that we could never have imagined. We believe we occupy a space that the rest of the industry is yet to evolve into.
Beyond our software development prerequisites, our various backgrounds includes individuals with extensive experience in (US DoD) IDEF modeling, low level device interface development combined with IoT and IFTTT, machine learning and machine vision through back propagation.
Our customer profiles range from national government public safety projects, individual ministry and departmental initiatives, monitoring of critical infrastructure and transportation hubs, corporate asset protection for campuses and buildings.