Compared Features | Our product | Third-party products | Details |
Video Equipment Operation Log Creation | O | X | Third-party products rely on VMS-generated logs, in most VMS misuse analysis is impossible since it only generate simple log |
IP Camera Direct Access Log Creation | O | X | Since it is possible to operate the camera by directly connecting to the IP camera, it is necessary to generate an operation log for this, and third-party products do not have a log generation function. |
Ruleset Management by Rule Engine | O | X | Third-party products can only show simple Ruleset |