
Technology and Methodology

Using a combination of advanced technology and well-trained staff, RCD Security Systems provides highly effective, sophisticated security solutions featuring Facial Recognition Panels and Pro-Active AI Deterrence cameras.
We endeavor to stop problem incidents before they start and tailor our solutions for the most effective result. Our Opposite Time Zone Control Centre responds to real-time incident events using advanced AI technology to filter out false alarm events.
Our detailed reporting provides immediate online access through a phone application as well as any browser for clients to monitor incidents and issues in real time and provide feedback and requests.
▶ Viewing Pro-Active Live Video Alarm Events
We endeavor to stop problem incidents before they start and tailor our solutions for the most effective result. Our Opposite Time Zone Control Centre responds to real-time incident events using advanced AI technology to filter out false alarm events.
Our detailed reporting provides immediate online access through a phone application as well as any browser for clients to monitor incidents and issues in real time and provide feedback and requests.
▶ Viewing Pro-Active Live Video Alarm Events

Advanced Video Management system
All-in-One video surveillance management software for system scalability and reliability with the ability to integrate multiple access and video intercom devices. | |
Provides user rights management, device management, alarm management and two-way audio. | |
Support for real-time face recognition and robust event management controls |


Smart Motion Detection and Perimeter Protection
Smart Motion Detection (SMD) uses an advanced algorithm to differentiate human and vehicular shapes within a scene and send alarms only when a person and/or vehicle is detected.
Because the SMD Perimeter Protection technology can accurately recognize humans and vehicles, false alarms from type-based intelligent target detection – tripwire breach, area intrusion, fast movement, parking detection, loitering detection, crowd gathering detection etc. – are greatly reduced.
Smart Motion Detection (SMD) uses an advanced algorithm to differentiate human and vehicular shapes within a scene and send alarms only when a person and/or vehicle is detected.
Because the SMD Perimeter Protection technology can accurately recognize humans and vehicles, false alarms from type-based intelligent target detection – tripwire breach, area intrusion, fast movement, parking detection, loitering detection, crowd gathering detection etc. – are greatly reduced.

SMD Perimeter Protection technology dramatically reduces false alarms
▶ AI cameras and SMD (Smart Motion Detection)
This technology is extremely useful in restricted areas e.g. construction sites, pedestrian and vehicle restricted areas.
▶ Perimeter Protection Technology
▶ AI Customized Perimeter Protection & SMD+
Opposite Time Zone Control Centre
Our Opposite Time Zone Control Centre is 15 hours ahead of Edmonton (MST) time which means that our staff there are working during the day to watch our Surveillance Projects here in Edmonton during the night.


Face Recognition Video and Access Management Software
The Facial Recognition Terminals are only one part of the Facial Recognition technology solution for entrance and building doors, other parts are the Video and Access Management software along with centralized databases.
Our highly configurable software handles time and day access schedules and provides an activity log of who is using the entrance and building doors.
The doors can be remotely opened if necessary and by combining these with 2-way voice communication cameras, entrance and building doors can be both monitored and actively controlled.
▶ Processing Alarm Events through Video Management System
Detailed Online Reporting
We use Microsoft Teams to provide detailed reporting for our clients. With this powerful reporting application,we document incidents complete with video and pictures of security related events or incidents. Reports, video, and pictures are available for review or download.
At the start of each shift, we do a camera and equipment check and log the results. At the finish of each shift the operators will log a Summary, listing security events or incidents.
We routinely add “Hourly Report” shift note entries listing any security events or incidents on each project, these are time stamped to ensure accuracy when reviewing.
Any equipment or operational issues are recorded as they arise to be dealt with asap.
Go to Support page