Integrity Networks
Contract Number: WLS325
Education/SLED Account Manager
Phone: 808-306-0558 (direct)
Email: MelanyM@integrity-net.net
Website: https://integritynetworksinc.com/
Contract #WLS305 is now merged with Contract #WLS325
Product Description:
Integrity Networks prides itself on its team of exceptional Safety and Security professionals, renowned for their expertise in the design, installation, support, training, and servicing of our comprehensive range of Safety and Security products. With an extensive portfolio of offerings and a wealth of knowledge, our experienced experts, coupled with our well-staffed Service Department, deliver a distinguished suite of services that sets us apart in the competitive Safety and Security market.
- Highly Competent Safety and Security Design team
- Skilled Installation and Service Technicians
- 75+ service technicians cross-trained across Security, Networking, A/V, DAS, etc.
- In-house Programming Experts
- In-house CAD department using AutoCAD design software
- Systems Training
- Fully Staffed Service Department
- Multiple Service options outside of standard warranty
Avigilon - Surveillance System
AVIGILON - ALTA VIDEO
Avigilon provides comprehensive video security and access control solutions that help you create a safe and secure environment and protect what is most valuable – your students, staff, and faculty.
SURVEILLANCE SOLUTIONS:
Avigilon cameras not only provide the level of image detail you need but are also built with the intelligence to help you make sense of what you’re seeing. Avigilon cameras can also provide next-generation video analytics technology to help focus your attention on potentially critical events, providing a smarter and more powerful video security solution from the moment you set it up.
-
Avigilon Control Center (ACC) 7 is the latest and most advanced version of ACC™ video management software. Designed to bring the right information to you so that you can take action, ACC 7 provides an easy-to-use, AI-enabled user interface to help ensure critical events do not go unnoticed.
-
COVID-19 Response Technology: Operate safely and comply with local health and safety guidelines by deploying powerful video analytics for occupancy counting, social distancing and no face mask detection – natively available to ACC 7 software users with no additional licenses required.
-
Cloud-Connected ACC: Avigilon Cloud Services (ACS) enables you to connect existing ACC sites to the cloud for easy and secure remote access to video via the web or mobile app, without complicated firewall port forwarding or time-consuming user configuration. Leverage centralized system health monitoring in ACS to assess the operational state of cameras and servers remotely. Benefit from future enhancements of ACS by updating to the latest versions of ACC software.
-
Focus of Attention Interface: Focus of Attention uses AI to detect and flag events that may require your attention, highlighting potentially critical events on the interface so you can easily see where action is required: Blue: Motion Detected. Teal: Unusual Motion Detected or Analytic Event. Yellow: Unusual Activity Detected, Face Watch List Match Event, License Plate Watch List Match Event, or No Face Mask Detected. Red: Alarm
-
Facial Recognition: AI-powered facial recognition technology helps organizations accelerate response times by identifying people of interest based on secure watch list(s). Populate watch lists easily by uploading images or finding faces from recorded video. If a match is found, you can be notified either using the FoA interface or through ACC alarms using armed panels or the alarm view. ACC software will display the video image that triggered the alarm along with the reference image from the watch list, enabling operators to verify the match and act quickly.
LENELS2
Verkada - Video Surveillance
Cisco Meraki
Cisco
Cambrium Networks
CommScope
Extreme Networks
Extreme Networks, Inc. (EXTR) is a market leader in cloud networking focused on delivering services and solutions that connect devices, applications, and people in new ways to drive better outcomes. More than 50,000 customers in over 80 countries trust Extreme to help enrich customer experiences, reduce risk, improve operating efficiency, and grow topline revenue through innovations such as machine learning, artificial intelligence, analytics, and automation.
Founded in 1996, Extreme pushes the boundaries of technology to empower enterprises to accelerate digital transformation and address technology solutions to drive exceptional results. Extreme’s comprehensive portfolio of industry-leading innovations are purpose built to securely connect today's infinitely distributed users and devices. From wired and wireless network equipment, SD-WAN, carrier-grade routers, fabric technologies, as well as a leading cloud networking management platform and robust applications portfolio covering analytics, security, and access controls, Extreme offers the networking solutions necessary to meet any Enterprise need. As testament to our innovation, Extreme was named a Leader by Gartner, Inc. for the sixth consecutive year in the 2024Gartner® Magic Quadrant™ for Enterprise Wired and Wireless LAN Infrastructure.
Headquartered in Morrisville, North Carolina, Extreme has approximately 3,500 employees worldwide and is backed by 9,000+ technology partners who share our vision. Extreme’s customers include over half of the Fortune 50, but we continue to keep the qualities of a small company by remaining nimble and responsive to remain customer focused. Extreme is also more than just another networking company. We are a customer-first organization unique in the industry for going to the extreme with a whatever it takes attitude to ensure our customers’ success.
Extreme is recognized for having the industry’s best service and support with the industry’s only 100% in-sourced support team, has a 95% customer satisfaction rating, and in 2023 was named a “Gartner Peer Insights Customers' Choice” for Enterprise Wired and Wireless LAN Access Infrastructure, a distinction received for the sixth consecutive year. Extreme is also guided by our core values of Candor, Transparency, Curiosity, Teamwork, Gartner Peer Insights Customers’ Choice Ownership, and Inclusion, with focused corporate social responsibility (CSR) efforts that cascade across our entire business, from the supply chain partners we select to the customers we serve.
Pricing:
-
IDENTITY MANAGEMENT: Display user ID profile pictures with access control events and alarms to know who attempted to enter a door and when. Register visitors and print badges in seconds by scanning an ID via integration with HID Global's EasyLobby Secure Visitor Management software.
-
REMOTE DOOR LOCK/UNLOCK WITH MAPS: Visually pin access-controlled doors spatially on a facility map, view open/close status of doors and remotely lock and unlock doors, including lockdowns during emergencies.
-
REPLICATION & HOT STANDBY AUTO FAILOVER: Simplify identity management with the ability to replicate identity data on multiple ACM Appliances across sites. Save policies, settings and identities from any one primary appliance to a standby appliance with hot standby-auto failover.
-
ACM VERIFY VIRTUAL STATIONS: Extend access control to locations where physical doors are not feasible. ACM Verify enables any browser-enabled device to act as a virtual station by recording and confirming an identity with a PIN.
-
ALARM MANAGEMENT: Streamline alarm management with audible alerts and colored indicators to visually represent alarm priority. View associated video, enter notes, acknowledge and clear alarms in one place.
-
BUILT-IN TEMPLATES: Be up and running in minutes with a wide selection of easy-to-use templates to configure doors and wiring.
-
CUSTOMIZED REPORTS: Leverage ready-made reports that can be customized to display important access control data suited for your facility.
-
FIPS 201-2 CERTIFICATION: ACM is FIPS 201-2 compliant and is on the GSA Approved Product List with pivClass technology, meeting the PIV requirements for U.S. federal employees and contractors.
-
Advanced, Deep Learning Analytics: Most VRx systems include the capability to perform real-time, server-side object detection on up to 40fps of video. Forensic searches based on object detection can be used to locate recorded video of interest.
-
Crowdsourced Video and Mobile Management: The VRx system includes the ability to manage and display crowdsourced video footage submitted to security teams alongside regular surveillance footage. VRx video streams can be viewed and managed from the LenelS2 Mobile Security Professional® app.
-
Unified Access and Video: VRx provides a unified access control and video surveillance experience when used in conjunction with the NetBox™ access control system, Magic Monitor® unified client and Cumulus™ cloud-based service.
-
Scalable and Easy to Setup, Use and Maintain: VRx systems seamlessly fit into the NetBox ecosystem, allowing the entire solution to easily scale with organizational growth. The Linux-based VRx server appliance is plug-and-play, making it easy to set up, configure and maintain.
-
Unified Video Management and Access Control: NetVR systems provide a unified access control and video surveillance experience when used in conjunction with the NetBox™ access control system and Magic Monitor® unified client.
-
Real-time Video Monitoring: Real-time video monitoring and recorded video playback are accessible through the Magic Monitor client. Customizable monitoring displays enable single or multi-camera views as well as unification with access control and live Internet feeds for optimal situational awareness.
-
Mobile-Enabled: NetVR systems can be managed and viewed from anywhere using the Mobile Security Professional® mobile app, available for iOS® and Android®.
-
Easy to Install and Operate: The Linux-based NetVR server appliances are plug-and-play, making them easy to set up, configure and maintain.
-
Browser-based, plug-and-play: NetBox access control systems are accessible from any device that can open a web browser, regardless of operating system. NetBox systems are flexible and work well with existing infrastructure and peripheral devices. There is no software to install, making deployment easy.
-
Unified security management: NetBox systems tightly integrate with LenelS2 NetVR™ and VRx™ video management systems, providing unified system management and administration. When used with the Magic Monitor® client, access events, video and live internet feeds are available from a single user interface to optimize situational awareness. Integration with third party video management systems is also supported.
-
Full-featured system: NetBox systems provide features such as person record and cardholder management, event and alarm monitoring, threat level escalation and reporting.
-
Open API: An open source API, allowing NetBox systems to integrate with a variety of third-party products ranging from human resource databases to elevator systems and HVAC controls.
-
Seamless all-in-one system: Natively integrated ecosystem of cameras, access control, sensors, alarms, and visitor management
-
Cloud-based Solution: Leveraging AI to make security more effective & more efficient
-
Future-proof Investment: 10-year warranty on all devices + free firmware updates
-
Scalability: Easiest to install and lowest bandwidth cameras in the world
-
Zero Risk: 30-day free trial of any product, shipping included
-
Intelligent motion indexing with search engine
-
Built-in motion analytics tools like Motion Search, Motion Recap, and Motion Heatmaps
-
Machine learning capability for intelligent object detection
-
No special software or browser plugins required
-
Cloud-augmented edge storage minimizes physical infrastructure
-
Secure encrypted control architecture
-
Secure boot and signed firmware backed by hardware security chip
-
Granular user access controls
-
Wireless functionality for install flexibility
-
Meraki dashboard simplifies operation
-
Suitable for deployments of all sizes: 1 camera or 10,000+
-
Uncomplicate your Network – Simplify IT operations with Cisco DNA Center management, automated provisioning, and seamless software upgrades and patching.
-
Enhance Security – Get integrated network security for before, during, and after an attack. Protect your network and your data with advanced security features like link encryption and segmentation.
-
Improve Reliability – easily manage wired and wireless networks, strengthen security, and simplify your campus LAN. Ready for increased wireless bandwidth demands, higher-capacity uplinks, and multigigiabit ports.
-
Scale with Efficiency – Pave your way to an Automated, digital-ready network with access switches.
-
If the Solution Provider (vendor) performs Public Work services, the customer is responsible for including the required provisions on procurement side-of business.
These products were competitively bid.
Government Customers can find the RFP documents on Washington’s Electronic Business Solutions (WEBS) website.
WLS Providers
- Language Acquisition Software (RFP 1818-52)
- English Language Arts Classroom Tools (RFP 1818-53)
- Digital Math Tools (RFP 1818-54)
- Safety Products and Services (RFP 1818-55 and RFP 1818-58)
- Debt & Lease Management Software/Services (RFP 1818-56)
- Classroom Display & Audio Technology (RFP 1818-57)
- Artificial Intelligence (AI) in Education (RFP 1818-61)