How webeye works
No platform software needed

Webeye is a cloud based alarm platform so all of the platform software sits on the cloud. All the user needs is a computer or smart phone* connected to the Internet. No contracts let alone long term contracts, this pay as you go service charges only when an alarm system is commissioned. Webeye accepts any IP blind alarm system that supports the Contact ID protocol or any of our integrated video alarm systems/DVR’s/NVR’s. This 'monitor it yourself' (MIY), automated and central station solution is suitable for just about anyone. With a 24/7 managed environment it has one big advantage, its platform reliability, and you will not believe the price.

*iPhone or Android applications required (free to download.)

webeye offers the monitoring of alarm systems by two methods:
Via a modern browser on any PC or tablet, or via a smart phone app. Whether you have one site or thousands, webeye can deliver your alarms to you reliably and promptly.
The browser method allows an organization to set up their own monitoring station with minimal cost. All that's needed is a modern browser.
The smart phone app method allows webeye to take over the role of people for the receipt of alarms, alarm handling and alerting alarm recipients.
The beauty of our system means browser and mobile can be used in combination to provide the ultimate protection.
altaltaltalt
webeye cms is compatible with the most popular browsers
altalt
webeye cms has applications on the most popular mobile operating systems
Monitoring: Browser Interface
Alarms are displayed in a modern web browser via an alarm list, showing the relevant site name, date/time of activation and type of alarm. Alarms in red are called standard alarm messages (SAMs) and alarms in blue are called webeye messages (WEMs). Handling an alarm through the browser offers various functionality.
  • Site details and auditing for the current alarm can be viewed.
  • The user can control the alarm system (if applicable), for example, a siren could be remotely activated.
  • Videos and other events are listed in date/time order. Video can be played back.
Alarm in the list A modern web browser showing an alarm in the alarm list.
Handling an alarm Handling an alarm in a browser.
Monitoring: Smartphone Interface
Alarms are displayed in the app on your iPhone or Android smart phone in an alarm list. SAMs have red bells and WEMs have blue bells. The alarm list seen on your smart phone displays the relevant site name, date/time of activation and type of alarm. What you see in the browser is what you see in the app! Handling an alarm through the app is similar to the browser interface
  • The user can control the alarm system (if applicable), for example, a siren could be remotely activated.
  • Video can be played back by pressing it.
  • Videos and other events are listed in date/time order. Swiping to the left and the right will scroll through details regarding to the alarm, for example, auditing.
Alarm in the list Alarms are displayed in the app on your iPhone or Android smart phone in an alarm list.
Handling an alarm Handling an alarm in the app is similar to the browser interface.
SAMs and WEMs
When an alarm comes through, it generates either a SAM or a WEM alarm, depending on your configuration. Standard Alarm Messages (SAMs) are recommended for monitoring stations, or for those who need complete accountability. webeye messages (WEMs) are recommended for domestic users, or those who generally just want to keep an eye on their alarms.
SAMS and WEMS in the alarm list. SAMs and WEMs within the alarm list on the browser interface.
Features of a WEM alarm are:
  • WEM alarms do not need to be closed
  • Multiple WEM alarms can exist for the same site, at the same time
  • WEM alarms have a status of read or unread, on a per user basis
  • Similar to emails
Features of a SAM alarm are:
  • SAM alarms must be closed by a user, and the user must provide comments for that alarm
  • Only one SAM alarm can exist for a particular site at any time
  • All signals are appended to a SAM alarm until it is closed
  • SAM alarms provide full accountability for the alarm handler
Alarm Generation Process
Receive signal
Alarm signals are sent to load balancers, which distribute traffic evenly amongst servers for signal processing. We use two load balancers, each with a different provider to ensure reliability.
Store signal
After the load balancer routes the signal to the server, it is stored in the database. After processing, this data is replicated across multiple servers to ensure redundancy.
Distribute signal
When the signal is processed and stored, alarm logic using webeye's PADARC technology distributes the signal to an unlimited number of users within seconds, whether they use the browser or have a mobile device.
Alarm receive and store process.
Alarm receive and store process.
PADARC
PADARC is webeye's own delivery technology. It stands for Progressive Alarm Delivery and Response Confirmation. Traditionally when an alarm is activated, it sends out an alert, but there is no knowledge or monitoring to confirm it is received by the relevant people. Our systems make sure when we know, you know.
  • Multiple techniques of alarm delivery used
  • Webeye knows when an alarm has been viewed
  • Future methods also include email and social media alarms
  • Webeye can offer output to a manned monitoring station, because it knows if an alarm has not been viewed
Progress alarm delivery and response confirmation.
Progress alarm delivery and response confirmation flow chart.
Management
Group management
With webeye you can organise your sites how you want. Sites and users belong to groups. These groups can have an infinite amount of sub groups, which allows a creation of a hierarchy for sites. We have designed a clear path through the hierarchy where sub-groups can be easily seen.
Site management
From a site record, you can edit your site details and view the site's alarm history. Alarms are listed in date/time order. The auditing can also be viewed inside a historic alarm, this allows you to see users who have viewed the alarm, and any actions that user performed.
Device management
Devices are attached to sites, a site can have multiple devices. From the site record, device details can be edited. Devices can also be assigned peripheral devices, these are on a per device basis. When an alarm is generated from a configured peripheral device, the name of the peripheral device will be shown within the alarm.
Management. Webeye's management page
Site management. Webeye's site management page
iPhone home screen. iPhone application home screen
iPhone site options screen. iPhone application site options screen
Contact webeye today
We believe webeye is the most reliable system on the market. Our unique approach means we are efficient, low cost and versatile. You can customise to meet your specific requirements and because we are cloud based, there is no investment needed in servers or infrastructure. Be part of the security revolution and contact webeye today.