LOGiT

LOGiT is Biometrica’s first foray into the security sector, as differentiated from the surveillance sector. It is a Security Management and Incident Reporting (IR) tool, a security-focused IR module that is the basis for the building of a digital case file of every incident at the security level.

Read More

LOGiT allows for security and surveillance records to be tied together at the local level and beyond, through alerts generated by the Security & Surveillance Information Network, locally or otherwise.

It also creates a digital audit trail that monitors updates or modifications to any file. Anytime a piece of data on an individual is seen or updated, it tags that individual and attaches the data to them.

It gives investigators and forensic analysts the ability to recreate a timeline, or put together a chain of events at a later date, by answering two basic questions: What Did You Know? And When Did You Know It?

LOGiT can be used in different ways. A security officer could send a local level SSIN alert to check on a questionable letter of credit presented at a property, thus creating a minor Incident Report to keep an eye on it, or send a more broad-based, urgent internal or external SSIN alert, when a potential money launderer, or someone previously known to have committed credit card fraud, is spotted. Those alerts are attached to the individual being tagged, and an incident report is created.

Biometrica’s Fusion Center also actively tracks available lists for suspicious individuals, including known sex offenders, and Politically Enhanced Persons (PEPs) or their associates. A security official can create quick, urgent alerts, for instance, when a PEP, a known escort, a person with ties to a drug cartel, an individual or group on a terrorist watch-list, or a known associate of any of these, is spotted.

Logging incidents or events of every kind helps protect your property, your physical and human assets, and the people that patronize your products and services in different ways.

A security team member might, for example, want to be able to proactively, and discreetly, suggest that someone with a previous record as a child sex offender, stay away from a children’s play area in a resort, or from the children’s toys section in a retail establishment. Or ensure that only certain employees are allowed into a “cash room.”

Because you can tailor the alerts at the local level, and control whoever sees those alerts, the potential to successfully and discreetly monitor all situations is immense.

Any SSIN security alert, when entered into the system, also becomes a matter of record for the surveillance team. In the security space, this is a game-changer, allowing security and surveillance records to be tied together, and giving security teams the ability to create blacklists and whitelists for properties, and implement very specific Attribute-Based and Role-Based Access Controls.

Submit a help ticket or question