Reliable and anonymous

Facial Recognition Systems

FACIAL RECOGNITION SYSTEM

KNOW THE PROFILE OF YOUR VISITORS

Today it is considered the most natural of all biometrics, and is that we do not recognize ourselves by looking at our fingerprints or iris, but by looking at our face.

The incorporation of facial recognition algorithms in video surveillance systems opens up a world of possibilities, both for security and for the operation of a business.

Facial recognition systems detect, identify and process images of individuals, while making them “anonymous” by transforming them into sequences of zeros and ones, in order to exploit the information from the captured images to the maximum.

With SCATI, thanks to this technology, you will be able to segment the profile of your public by gender and age, identify your VIP clients and offer them a differential treatment. It will also be possible to control the access of your employees and visitors, authorizing or denying access to certain areas or others, or even prevent identity theft anonymously. All of this in compliance with current data protection regulations.

Do you want to have information about who accesses your facilities?

Open, comprehensive and scalable

Incorporate as many facial recognition devices as you need. Your needs may change, but you can manage everything from a single video platform.

Centralized management

The system allows you to create, update and manage databases centrally to simplify daily operations.

Proactive system

When a person is identified, the security officers will receive an automatic alarm with the associated image or video, and the corresponding action protocol will be activated.

Advanced Forensic Search

Locate any person in seconds through advanced search filters (faces, names, IDs, etc.) or reference images. Get all the information about your accesses and exits of the facilities.

Bidirectional

The communication between the control centre and the installations is bidirectional, so the information is fluid and updated automatically.

Business Intelligence

With the information collected, a business intelligence system is exploited, accessible by other departments of the organization. They will use the information to produce reports, improve security and business insight.

other solutions

BODY TEMPERATURE AND MASK DETECTION

Complement your system with the latest in body temperature measurement and mask detection to ensure safe environments for infection prevention.

ACCESS CONTROL

Discover our solutions for contactless access control based on facial recognition systems.

Read more

New Face recognition video recoders range

New Face recognition video recoders range

Deep Learning Series SCATI, a manufacturer of intelligent IP video solutions, incorporates in its portfolio a new range of video recorders with Deep Learning technology for facial recognition. Facial recognition is the perfect solution to complement your video...

case studies

Santander Bank Financial City (Spain)

Access control by facial authentication in the corporate environment. The solution is completed with a body temperature measurement system and mask detection to allow access.

Excellence in hospital care (Mexico)

The systems identify patients in order to offer them more personalized and differential care.

Combat identity theft in branches (Mexico)

The system detects persons entering its branches so that, if they have previously committed illegal acts, a notification is sent to the control center.

Tell us about your project

If you can imagine it, we can create it

    First name and surname *.
    E-mail *
    Telephone *
    Company *
    Country *
    Company type *
    Specify *
    Sector *
    Specify *
    How did you hear about us? *
    Specify *
    Message *
    Yes, I would like to receive general communications about SCATI products, campaigns, promotions, and events.
    Basic information on data protection - Responsible: SCATI LABS, S.A. Purpose: to respond to your request for information and/or contact and to send you information about products, services and activities, provided that you give us your consent to do so. Legitimation: consent of the interested party by ticking the box and sending their data. Rights: Access, rectify and delete data, as well as other rights as explained in our privacy policy.