Quickly identify security threats and ensure the health of your system
Make sense of all your data and turn it into actionable intelligence
Enhancing security through faster insights
Identify security risks, comply with data protection regulations, and ensure the health and uptime of your system.
Identify insider threats or misuse of security systems with Audit reports
Turn audit logs into actionable intelligence to identify insider threats or misuse of security systems. Protect sensitive data by highlighting unauthorized activity and maintain compliance with regulatory requirements.
Ensure your system is optimized with Health reports
Get system-wide monitoring coverage, keep device firmware up to date, maintain time synchronization and gain system-wide visibility of camera and recording status.
Identify suspicious activity with CyberVigilant reports
Identify activity which may be related to a potential compromise or breach and correlate CyberVigilant data with audit logs to defend against cyber attacks.
Streamline incident reporting
Cut the time it takes security guards, operators and officers to document security incidents. Quickly create incident reports by associating Control Center users, cameras, alarm events and audit log records. Easily attach media including documents, audio, video and more.
Frequently Asked Questions
What are IndigoReports system requirements?
IndigoReports has a few system requirements, such as:
– 64-bit Intel processors
– 16GB RAM minimum
– 300GB storage
– IndigoVision Control Center v14.0 or later
Download our datasheet for a full list of all the requirements.
Are all the features included in the VMS reporting module?
To get access to all the functionalities of IndigoReports, an incident Reporting Module is required. It will give you access to the following features:
– Incidents reports
– Save a HTML
– Media file attachments
– Spell check
What security authentication does the camera offer?
Our solutions come with a variety of security features, including password protection, HTTPS encryption, digest authentication, WS authentication, user access log, and 802.1x port-based authentication.