Deploying innovative Physical and Virtual surveillance protocols,

is where our team of System integrators, Software programmers and Sec Op staff, 

work their magic.


A protocol describes how the algorithms should be used. A sufficiently detailed protocol includes details about data structures

and representations,  at which point it can be used to implement multiple, interoperable versions of a program.