Lighthouse Security

The LightHouse™ system unifies every component of a user's security system.

Security Audit

The LightHouse™ system is the product of over fourteen years and 200,000 man-hours of R&D development, testing and quality assurance. It is designed to unify every component of a user's security system in a seamless manner and provide comprehensive control within a single, intuitive interface. It supports virtually any component, sub-system or third-party security product on the market and has been successfully deployed in Federal, Military and Energy based installations as well as municipal and commercial sites.

FPS Logo
FIPS 140-2 Inside

(NOTE: TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments) 

Contact us at sales@networkharbor.com.

The Incident Management system for LightHouse(tm) is a component used to allow one or more operators to collaborate responses to an incident, as well as generate a non-volatile record of actions taken.  The Structured Incident option further allows system administrators the ability to require the responding operator(s) to respond to a sequence of form entries or instructions in order to finish the incident.

The Media Management System (MMS) for LightHouse(tm) is a component that integrates disparate video and audio surveillance and communication systems into a single coherent system for viewing live media as well as recording and review of media, in a standardized and vendor-independent fashion.

The Text Management System (TMS) for LightHouse(tm) is a component that integrates text-based notification and communication systems into a single coherent system for sending both pre-configured and extemporaneous messages to text-receiving endpoints, both manually and automatically, as well as handling responses.

User layouts are an important feature of the NHI LightHouse user interface.  A layout, which might also be called a 'dashboard', is a configurable representation of informational controls presented to the user as their primary view of system operations, device states and locations.