The G-SIM security information management software is specially designed for the central management and control of complex high-security systems.

G-SIM is a powerful security information management software that has been specially developed to centrally manage and control complex high-security systems.
This software enables you to comprehensively manage video streams, alarms and process data, both on site and in globally distributed installations.
With G-SIM, you always have an overview of your security infrastructure thanks to an intuitive, user-friendly interface that you can customize.

By integrating the latest technologies and security standards, G-SIM guarantees maximum flexibility, reliability and data protection.
We offer G-SIM both as a cloud service and as an on-premise solution to meet the different needs and requirements of our customers.
This allows you to choose the solution that best suits your specific requirements and ensures that your security infrastructure is optimally supported.

Security Information Management Software G-SIM

The G-SIM security information management software offers numerous advantages that significantly optimize your security infrastructure.

Central administration

G-SIM controls and manages video streams, alarms and process data centrally, enabling efficient monitoring and coordination.

Maximum security

With functions such as SSL encryption and audit trails, G-SIM protects your data comprehensively and meets the highest security standards.

Reliability

In the event of a failure, the failover server automatically takes over the functions of the G-SIM server. The camera channels of a G-Core server are also taken over by the failover server.

Active Directory synchronization

Active Directory synchronization makes it easier to manage users and rights in G-SIM and enables single sign-on with Windows users.

Integration of third-party systems

Thanks to its open architecture and SDK support, G-SIM easily integrates external systems, allowing you to extend its functionality.

Multi-client capability

The multi-client capability enables several independent users to be set up on one G-SIM system with individual access to the G-SIM resources.

Intuitive user interface

The user-friendly interface adapts to your individual needs, which makes it easier to use and ensures quick familiarization.

Efficient alarm management

G-SIM offers intelligent alarm workflows and automated instructions to help you respond quickly to security incidents.

Flexible scalability

Whether on site or in globally distributed installations, G-SIM scales flexibly with your requirements and grows with your company.

The Security Information Management Software G-SIM offers various modules and functions, that help you to optimally utilize and efficiently manage your security infrastructure

With G-SIM, you can centrally control and monitor all aspects of your high-security systems, including video streams, alarm management and process data.
The modular functions of G-SIM allow you to customize and expand your security infrastructure so that you can respond to new challenges and requirements at any time.
This allows you to optimize your security measures and ensure that your systems are always state of the art.

The Management Console (ManCon) manages all resources, functions, users and their authorizations in real time.
It enables immediate plausibility checks and supports simultaneous access by multiple administrators.
You can also establish parallel connections to multiple G-SIM servers, which makes it much easier to configure the system efficiently.

The system logs usage and all setting changes in a central database.
You can call up these logs in the Operator Console, allowing you to assign image and video material exports and system-critical actions to a specific user name and device.
This allows you to keep track of all activities at all times and ensures a high level of traceability.

The Operator Console (OpCon) serves as the main user interface with which you can individually control, display and monitor video streams, site plans and resources.
It provides the appropriate permissions for each user or location, so you can ensure that each user can only access the functions and data assigned to them.

The Remote Console (ReCon) serves as a remotely controllable output console for display on monitor walls or external TV sets.
You can control ReCon via the Operator Console, which gives you flexible and centralized control over the display of video content.

With the G-SIM/Global software option, you can connect several independent G-SIM installations at geographically distributed locations to form a global security network.
This allows you to access other systems from any local system as required, for example to set up substitution scenarios or search for specific process data.
This function facilitates collaboration and ensures seamless integration and coordination of your security infrastructure.

The site plans provide a comprehensive overview of all cameras and other resources on individually configurable and georeferenced maps.
You can see the current status of each camera immediately in the site plan and can display the relevant video image simply by dragging the camera into the viewer.
In addition, individually configurable and placeable control elements enable interaction with connected systems, which increases the flexibility and user-friendliness of your security infrastructure.

The process data search makes it easier to find desired metadata such as license plates or barcodes.
You can then export the results in various formats for further processing.
This function enables efficient analysis and use of the collected data, which optimizes your work processes and supports decision-making.

Lost parcels on conveyor belts can be found quickly, even on complex, branched routes.
The simultaneous image display shows the respective position of the parcel on the conveyor belt, enabling parcels to be located and traced quickly.

This integration allows you to display web browser windows directly in the Operator Console viewers.
You can integrate websites from external systems via bookmarks, which enables fast and individual functional expansion.
Authorization is controlled via the G-SIM user administration, so that only authorized users have access to the integrated content.

The protection of personal rights is already guaranteed at login.
Access to personal image material is only possible if two defined users are logged in together.
The administrator can define specific rights for this joint login in advance to ensure that sensitive data can only be viewed by authorized persons.

Technical brief

The Geutebrück G-SIM software was developed to centrally manage and control complex high-security systems.
It enables unlimited access to Geutebrück VMS, cameras and locations, even via site plans.
Intelligent redundancy concepts minimize downtime by ensuring operation in the event of a system failure.

G-SIM offers separate consoles for administrators, operators and external monitors or video walls.
The software meets all compliance requirements and offers numerous optional functions.

Basic specifications

With SynaEdge, you can also obtain the Security Information Management Software G-SIM from Geutebrück as a cloud service by subscription

As a cloud provider, we offer you the G-SIM security information management software in the cloud. We manage and maintain your software comprehensively. This includes regular software updates to ensure that your systems are always up to date with the latest technology. We carry out ongoing system diagnostics and monitoring to identify potential problems at an early stage and rectify them immediately. This significantly reduces downtime and maximizes the uptime of your systems.

  • No high initial investments: You avoid high upfront costs for licenses, hardware, and infrastructure. Instead, you simply pay monthly or annual subscriptions, keeping your expenses predictable
  • Scalability on demand: If your requirements change, you can easily add additional resources without having to invest in new hardware
  • Automatic updates: You always work with the latest version of the software without having to worry about installing updates or patches – we take care of that for you
  • No maintenance required: You don’t have to worry about maintaining the software, we take care of that. This allows you to fully focus on your core business
  • Protection of your data: Your software and data are stored in highly secure data centers that provide comprehensive physical security measures and encryption
  • Redundancy and failover: Even in the event of hardware failures, your software remains available because we ensure high failover.
  • Around the clock support: We offer you 24/7 technical support so that you always get help when you need it
  • Guaranteed availability: With our Service Level Agreements (SLAs), we ensure high availability and fast response times for you
Would you like to increase your security or optimize your operating processes? We look forward to hearing from you.