{"id":598,"date":"2025-02-02T09:06:24","date_gmt":"2025-02-02T09:06:24","guid":{"rendered":"https:\/\/telinsoft.com\/?page_id=598"},"modified":"2025-02-16T17:42:41","modified_gmt":"2025-02-16T17:42:41","slug":"video-security","status":"publish","type":"page","link":"https:\/\/telinsoft.com\/?page_id=598","title":{"rendered":"VIDEO SECURITY"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"598\" class=\"elementor elementor-598\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b79ccee e-flex e-con-boxed e-con e-parent\" data-id=\"b79ccee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5b9236 elementor-widget elementor-widget-heading\" data-id=\"f5b9236\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VIDEO SECURITY ENGINEERS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9c116b elementor-widget elementor-widget-text-editor\" data-id=\"b9c116b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our video security developers help in development of VMS applications according to project specific requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08e7893 e-flex e-con-boxed e-con e-parent\" data-id=\"08e7893\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d2061db e-con-full e-flex e-con e-child\" data-id=\"d2061db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b2eb93 elementor-widget elementor-widget-heading\" data-id=\"4b2eb93\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Telinsoft Video Management Software Company<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e09f5ed elementor-widget elementor-widget-text-editor\" data-id=\"e09f5ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of Telinsoft`s core strengths lies in its expertise in video management systems. Our engineers take part in building thematized video management applications. Basically, teams are specialized in video security development with smart content analysis (e.g. anomaly detection, face recognition, license plate recognition etc.). We have spent more than 30 000 man-hours on dedicated video security projects, implementing complex software from scratch (including R&amp;D) and supporting\/improving existing systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc8ca80 e-con-full e-flex e-con e-child\" data-id=\"dc8ca80\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22cf217 elementor-widget elementor-widget-heading\" data-id=\"22cf217\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">HOW WE CAN HELP<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8dc046 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b8dc046\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">full cycle of new VMS product development process<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">analysis and creation of business requirements<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">design of video security applications<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">artificial Intelligence, machine learning services<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">R&D in video security area<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">video security software support services for existing systems<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4a2cb8 e-flex e-con-boxed e-con e-parent\" data-id=\"a4a2cb8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b321a89 elementor-widget elementor-widget-heading\" data-id=\"b321a89\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CORE COMPETENCIES<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e09fc0 e-con-full e-flex e-con e-child\" data-id=\"6e09fc0\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-33925de e-con-full e-flex e-con e-child\" data-id=\"33925de\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af3f07e elementor-cta--skin-cover elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"af3f07e\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/f82976ebc25fa36631d099142196a17e-1024x762.jpg);\" role=\"img\" aria-label=\"f82976ebc25fa36631d099142196a17e\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tVIDEO MANAGEMENT\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tOur engineers help in building of reliable video security systems with an option of preventing and anticipating undesirable incidents (such as structural defects, errors or frauds etc.). For this purposes they used a technology for identifying suspicious events\/items.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1371e3b e-con-full e-flex e-con e-child\" data-id=\"1371e3b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61e4a30 elementor-cta--skin-cover elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"61e4a30\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/0x0-1024x576.webp);\" role=\"img\" aria-label=\"0x0\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tSECURITY MANAGEMENT\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tOur engineers help in building of reliable video security systems with an option of preventing and anticipating undesirable incidents (such as structural defects, errors or frauds etc.). For this purposes they used a technology for identifying suspicious events\/items.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-460c97a e-con-full e-flex e-con e-child\" data-id=\"460c97a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-123a380 e-con-full e-flex e-con e-child\" data-id=\"123a380\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccb63cf elementor-cta--skin-cover elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"ccb63cf\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/i-10.webp);\" role=\"img\" aria-label=\"i (10)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tVIDEO CONTENT ANALYSIS\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tOur engineers help in building of reliable video security systems with an option of preventing and anticipating undesirable incidents (such as structural defects, errors or frauds etc.). For this purposes they used a technology for identifying suspicious events\/items.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-888e9c8 e-con-full e-flex e-con e-child\" data-id=\"888e9c8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-342f19e elementor-cta--skin-cover elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"342f19e\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/i-11-1024x576.webp);\" role=\"img\" aria-label=\"i (11)\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tANOMALY DETECTION\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tOur engineers help in building of reliable video security systems with an option of preventing and anticipating undesirable incidents (such as structural defects, errors or frauds etc.). For this purposes they used a technology for identifying suspicious events\/items.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46a0830 e-con-full e-flex e-con e-child\" data-id=\"46a0830\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-585e28f elementor-cta--skin-cover elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"585e28f\" data-element_type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/1960x0-1024x540.webp);\" role=\"img\" aria-label=\"1960x0\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tFACE AND BRAND RECOGNITION\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item elementor-animated-item--grow\">\n\t\t\t\t\t\tOur engineers help in building of reliable video security systems with an option of preventing and anticipating undesirable incidents (such as structural defects, errors or frauds etc.). For this purposes they used a technology for identifying suspicious events\/items.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de22591 e-flex e-con-boxed e-con e-parent\" data-id=\"de22591\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-863b486 elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"863b486\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"81\" height=\"82\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/software-application-development.svg\" class=\"attachment-full size-full wp-image-687\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">30000+ man-hours as video security experience<\/h5><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-778bccc elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"778bccc\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"75\" height=\"76\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Group_59.svg\" class=\"attachment-full size-full wp-image-690\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">27 software engineers in total<\/h5><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf18814 elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"cf18814\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"65\" height=\"57\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Group_81.svg\" class=\"attachment-full size-full wp-image-689\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">11 certified video security engineers<\/h5><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea2f38c elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ea2f38c\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"74\" height=\"75\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Group_130.svg\" class=\"attachment-full size-full wp-image-688\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">5 Projects<\/h5><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-514acd5 e-flex e-con-boxed e-con e-parent\" data-id=\"514acd5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7a4607 elementor-widget elementor-widget-heading\" data-id=\"d7a4607\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Projects from Video Security Industry<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f40ade e-con-full e-flex e-con e-child\" data-id=\"0f40ade\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4a1fa7d e-con-full e-flex e-con e-child\" data-id=\"4a1fa7d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7d6051 elementor-widget elementor-widget-image\" data-id=\"c7d6051\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"491\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/AI-ML-Anomaly-Detection-1024x628.png\" class=\"attachment-large size-large wp-image-775\" alt=\"\" srcset=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/AI-ML-Anomaly-Detection-1024x628.png 1024w, https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/AI-ML-Anomaly-Detection-300x184.png 300w, https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/AI-ML-Anomaly-Detection-768x471.png 768w, https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/AI-ML-Anomaly-Detection.png 1111w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e30228f elementor-widget elementor-widget-heading\" data-id=\"e30228f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"#\">AI\/ML. Anomaly Detection<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff2e3dd e-con-full e-flex e-con e-child\" data-id=\"ff2e3dd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c707c1e elementor-widget elementor-widget-image\" data-id=\"c707c1e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"396\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Brand-recognition-and-Inventory-Count.jpg\" class=\"attachment-large size-large wp-image-791\" alt=\"\" srcset=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Brand-recognition-and-Inventory-Count.jpg 634w, https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Brand-recognition-and-Inventory-Count-300x187.jpg 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11116c5 elementor-widget elementor-widget-heading\" data-id=\"11116c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"#\">AI\/ML. Brand Recognition and Inventory Count<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3908d79 e-con-full e-flex e-con e-child\" data-id=\"3908d79\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-850f864 elementor-widget elementor-widget-image\" data-id=\"850f864\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"396\" src=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Facial-recognition-access-control.webp\" class=\"attachment-large size-large wp-image-792\" alt=\"\" srcset=\"https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Facial-recognition-access-control.webp 634w, https:\/\/telinsoft.com\/wp-content\/uploads\/2025\/02\/Facial-recognition-access-control-300x187.webp 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddb5e0c elementor-widget elementor-widget-heading\" data-id=\"ddb5e0c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"#\">Facial Recognition Access Control<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>VIDEO SECURITY ENGINEERS Our video security developers help in development of VMS applications according to project specific requirements. Telinsoft Video Management Software Company One of Telinsoft`s core strengths lies in its expertise in video management systems. Our engineers take part in building thematized video management applications. Basically, teams are specialized in video security development with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-598","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/telinsoft.com\/index.php?rest_route=\/wp\/v2\/pages\/598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telinsoft.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telinsoft.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telinsoft.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/telinsoft.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=598"}],"version-history":[{"count":5,"href":"https:\/\/telinsoft.com\/index.php?rest_route=\/wp\/v2\/pages\/598\/revisions"}],"predecessor-version":[{"id":820,"href":"https:\/\/telinsoft.com\/index.php?rest_route=\/wp\/v2\/pages\/598\/revisions\/820"}],"wp:attachment":[{"href":"https:\/\/telinsoft.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}