MONITORING IN A FRESH WAY

About us

We manage a state-of-the-art operation center that provides you with expert services and cutting-edge remote live monitoring solutions to manage and protect your organization. 

Our promise to you

Providing quality remote live monitoring services by prioritizing your organization’s needs. 

Overcoming the most challenging difficulties by creating innovative and powerful solutions.

The ideal partner for you

Your ability to face tomorrow’s challenges will be determined by the decisions you make today. But, with technology and the nature of risks evolving, how can you insure your monitoring security service provider can scale up simply?

Sirix incorporates several other services allowing greater flexibility. You can customize the services and add-ons that best suit your needs, ensuring that your monitoring services evolve alongside your company.

SIRIX'S KEY ASSETS
expertise-in-your-market-brain-icon
Expertise in your market

Before you go headfirst into partnerships, keep in mind that when you join forces with a company, you’re tying your wagon to theirs. It shows you’ve done your homework to learn more about their history, and more importantly, their expertise.

A notable advantage of Sirix is that we work with a multitude of security partners as we are a distributor of service. Every day, our technical teams are confronted with complicated scenarios that we have to solve. Working with our security partners requires us to come up with fresh creative solutions on a daily basis. We assist one another in comprehending and resolving major issues.

open-architecure-unificication-icon
Open Architecture

The open integration interface that connects Sirix to your physical security and IT systems is at the heart of our software. Our universal plug-ins connect to most commercial systems and devices using common industrial standards. 

Our native connectors provide an additional set of enterprise functionality for big or custom deployments. It is why Sirix is considered technology agnostic.

state-of--the-art-command-center-icon
Business continuity and recovery plan

In the event of an emergency, disaster, or other big event, the business continuity strategy outlines how the company will continue to operate. It entails developing plans to keep critical products and services available, as well as restoring vital processes and systems.

Check to determine if a document has been created to this effect, listing the following elements:

  • Business Continuity Planning Team
  • Recognition of all required skills and employee reassignment opportunities
  • Identifying problems
  • Types of problems
  • Business continuity plan
  • Schematic documentation of network
  • Essential services and prerequisites
  • Recovery time
operator-icon-300
Number of operators on duty

Technology play a key role with regard to site security operations. Once the events are triggered from the video cameras or sensors, the operators on duty need to effectively conduct the event response. Some responses require post event investigation. Some other time, the security operator might be on a live event and needs to stay in direct contact with the authorities.

We believe a minimum of two operators on duty are required. In addition, it is important to validate whether operators are dedicated to other functions, such as intrusion alarm and fire alarm monitoring. As ULC regulations require to prioritize intrusion and fire type alarms, we suggest having a minimum of two operators dedicated to video events only.

reporting-icon
Reporting

Analytics offer undeniable advantages. They can perform advanced and recurring tasks. However, since the environment changes, the analytics must be constantly recalibrated. The goal is to reduce false events as much as possible. This way, the events that are shown to the operators are as true as possible. The primary goal is to reduce the operator’s fatigue.

Daily, a dedicated operator monitors event reports in real time. When a particular site reaches a certain threshold of the number of events, a communication is sent to our partner with the problem as well as the solution to the problem.

Here is an example of a daily report:

Problem:

  • Multiple false alarms, Spider and/or spider web on lens of the cameras (Cam 8 Facing (Drive-through)
  • Detection outside perimeter (Cam 7 Front Lot, NW Facing (W Driveway)

Solutions:

  • Clean the camera and see tips ‘’Spider web problem’’
  • Adjust masking (Cam 12 south lot, SW Facing (N Boulevard) and make sure to test your new masking during the day and night when there is activity on-site.
data-sent-offshore-icon-2
Data sent offshore

Corporate executives are turning to offshore outsourcing to satisfy many of their company’s operations as they seek more consolidated and low-cost methods of processing information. 

However, data theft and violation of privacy are two of the most serious concerns with outsourcing. Although most outsourcing businesses have equipped security guards stationed outside and companies constantly plan their data center recovery, they do not have appropriate follow-through when it comes to operational safety.

Because security and regulatory risks are the most significant concerns in outsourcing, corporate leaders must determine which projects may and cannot be outsourced offshore. 

Another source of concern is intellectual property. Business executives must have safeguards in place to prevent intellectual property theft or abuse.

Make sure the out-staffing service provider you are about to contract with respects your corporate regulation policy.

Insurance

Like many business owners, you may be an expert in your industry but know little about insurance. Asking your Live Monitoring Center for proof of insurance in your industry is necessary. Insurance for specific market can be an add-on to regular insurance. 

Some suppliers might not be aware and putting everyone at risk. As an example, Remote Secure Transport and Cannabis Plant, require a special insurance. These are often neglected because of how expensive they can be.

years-of-experience-icon
Years of experience

From 2007 to 2013,  we were subcontracting live monitoring services to third-party wholesale. We started our own remote live monitoring center in 2013.

Since then, things have changed quite a lot, but one thing remains, our promise to offer the best tools to our working staff. Throughout the years, we had our share of errors, and are consistently improving our techniques.

expertise-in-your-market-brain-icon
Expertise in your market

Before you go headfirst into partnerships, keep in mind that when you join forces with a company, you’re tying your wagon to theirs. It shows you’ve done your homework to learn more about their history, and more importantly, their expertise.

A notable advantage of Sirix is that we work with a multitude of security partners and manufacturers as we are a service distributor. Every day, our technical team are confronted with complicated scenarios that we have to solve. Working with our security partners requires us to come up with fresh creative solutions on a daily basis. We assist one another in comprehending and resolving major issues.

open-architecure-unificication-icon
Open Architecture

The open integration interface that connects Sirix to your physical security and IT systems is at the heart of our software. Our universal plug-ins connect to most commercial systems and devices using common industrial standards. 

Our native connectors provide an additional set of enterprise functionality for big or custom deployments. It is why Sirix is considered technology agnostic.

state-of--the-art-command-center-icon
Business continuity and recovery plan

In the event of an emergency, disaster, or other big event, the business continuity strategy outlines how the company will continue to operate. It entails developing plans to keep critical services available, as well as restoring vital processes and systems.

It’s always a good practice to verify that this type of documentation has been created listing the following elements:

  • Business Continuity Planning Team
  • Recognition of all required skills and employee reassignment opportunities
  • Identifying problems
  • Types of problems
  • Business continuity plan
  • Schematic documentation of network
  • Essential services and prerequisites
  • Recovery time
operator-icon-300
Number of operators on duty

Technology plays a key role in regards to site security operations. Once the events are triggered from the video cameras or sensors, the operators on duty need to effectively conduct the event response. Some responses require post event investigation. Other times, the security operator might be on a live event and needs to stay in direct contact with the authorities.

We believe a minimum of two operators on duty are required to accomplish the tasks of a security operation center. It is important to validate whether operators are dedicated to other functions, such as intrusion or fire alarm management. As ULC regulations require to prioritize intrusion and fire type alarms, we suggest having a minimum of two operators dedicated to video events only.

reporting-icon
Reporting

Analytics offer undeniable advantages. They can perform advanced and recurring tasks. However, since the environment changes, the analytics must be constantly recalibrated. The goal is to reduce false events as much as possible. This way, the events that are shown to the operators are as true as possible.

A dedicated operator monitors events reports in real time. When a particular site reaches a certain threshold of the number of events, a communication is sent to our partner mentioning the problems as well as the solutions to correct the problems. Our reports are usually very informative but most of all very precise as to what needs to happen in order to prevent and eliminate the problems. We go as far as suggesting modifications in the VMS or devices but also logistics and procedural changes. All this can be received and viewed in realtime.

data-sent-offshore-icon-2
Data sent offshore

Corporate executives are turning to offshore outsourcing to satisfy many of their company’s operations as they seek more consolidated and low-cost methods of processing information. 

However, data theft and violation of privacy are two of the most serious concerns with outsourcing. Although most outsourcing businesses have equipped security guards stationed outside and companies constantly plan their data center recovery, they do not have appropriate follow-through when it comes to operational safety.

Because security and regulatory risks are the most significant concerns in outsourcing, corporate leaders must determine which projects may and may not be outsourced offshore. 

Another source of concern is intellectual property. Business executives must have safeguards in place to prevent intellectual property theft or abuse.

Make sure the out-staffing service provider you are about to contract respects your corporate regulation policy.

Insurance

Like many business owners, you may be an expert in your industry but know little about insurance. Asking your Live Monitoring Center for proof of insurance in your industry is necessary. Insurance for specific market can be an add-on to regular insurance. 

Some suppliers might not be aware and putting everyone at risk. As an example, Remote Secure Transport and Cannabis Plant, require a special insurance. These are often neglected because of how expensive they can be.

years-of-experience-icon
Years of experience

From 2007 to 2013,  we were subcontracting live monitoring services to third-party wholesale. We started our own remote live monitoring center in 2013.

Since then, things have changed quite a lot, but one thing remains, our promise to offer the best tools to our working staff. Throughout the years, we have had our share of problems which become access to solutions. We have always worked on consistently improving our techniques and solutions. We will always be one step ahead because this is our passion!

IT'S TIME TO WORK SMART

Monitoring Enterprise Security Infrastructure - Best Practices

Strategic security alliances will only become more vital as the digital era progresses, especially in the AI sector. Finding the ideal company to collaborate with is the first step in every successful cooperation. We believe that there is 4 simple processes to keep your environment safe when dealing with Live Monitoring. 

  • Analysis and Design
  • Technical assistance
  • Our unified platform
  • Report and analysis

As the saying goes, two heads are better than one. We develop creative security solutions that reflect context requirements via planning and design. Whether it's an urban park, a paid parking, a transport facility, or an industrial site, we assist our clients in realizing their unique ideas by creating possibilities from complicated physical limitations.

The Sirix team works with your team to design the best tactics and identify the best technologies. This initial stage, we believe, is critical to the success of the Remote Live Monitoring services.

Our technical support staff goes above and beyond to guarantee that you receive the best possible assistance. Because Remote Video Surveillance relies on the technology used, it is critical that problems are resolved fast. A dedicated operator watches incident reports in real time every day. When a site's number of occurrences hits a specific level, a notification is sent to our partner describing the problem as well as the remedy. The second step is critical for getting the most out of your Live Monitoring solution and ensuring that your system is performing at its best.

The Sirix unified operation interface allows coordination of every alarm and event from any system or device, coming from any source.

Alarms are automatically grouped and prioritized. No need to switch from one system to another. Each event is handled in a similar and consistent manner, which boosts productivity and improves safety outcomes.

We share information for each site allowing analysis of the main performance measures. Every action taken in response to an event is automatically audited by SIRIX, providing a common set of metrics. As a result, teams can quickly identify bottlenecks and act on the data. Automating compliance and management reporting eliminates many of the common and tedious processes of managing data from disparate systems.

ONE PLATFORM, ENDLESS SOLUTIONS

Sirix Unified Management Software

Segregated and real-time insights

full-outsourcing-icon
Unified operator interface

The open architecture approach allows coordination of every alarm and event from any system or device, coming
from any source.

Alarms are automatically grouped and prioritized. No need to switch from one system to another.

Each event is handled in a similar and consistent manner,
which boosts productivity and improves safety outcomes.

Report and analysis

We share information in real time for each site allowing
analysis of the main performance measures.

Every action taken in response to an event is automatically
audited by SIRIX, providing a common set of metrics. As a consequence, teams can rapidly identify and address bottlenecks. The response time is improved.

Automating compliance and management reporting eliminate many of the common and tedious processes of managing data from disparate systems.

History

Sirix’s history has been shaped by integrity values and a strong work ethic. It is a tale of growth and evolution that has propelled this organization from Blainville, Quebec, to become a coast-to-coast operation.

2003
2003
Read More
DCI Consultants is founded by Daniel Cyr and offers IT consulting services to small and medium sized businesses.
2005
2005
Read More
First security project completed with a large Toyota car dealership in the heart of Montreal.
2006
2006
Read More
DCI Security is founded and offers security integration services to high-end residents, companies and government entities.
2007
2007
Read More
First customer connected to a video monitoring center to use a combination of technologies for remote monitoring through analytics & perimeter protection.
2013
2013
Read More
Acquisition of the company Chartrand St-Germain. Start of operations center under the company name DCI Protection.
2014
2014
Read More
Acquisition of Chartrand St-Germain a security guarding company with a state of the art video monitoring center. Start of our operations center services under the company name DCI Protection.
2014
2014
Read More
Acquisition of Protectel a security guarding company.
2016
2016
Read More
DCI Security & DCI Protection are sold and services to end-users are discontinued.
2016
2016
Read More
Sirix is founded and the mission shifts. The company offers services exclusively to security partners.
Previous
Next

Sirix in numbers

0 +
connected devices
0 +
years experience
0 +
compatible manufacturers
why-sirix-women-expert

Roadmap to success

Your technology partner

Strategic security alliances will only become more vital as the digital era progresses, especially in the AI sector.

Finding the ideal company to collaborate with is the first step in every successful cooperation. We believe that there is 4 simple processes to keep your environment safe when dealing with live monitoring.

Would you like to learn more?

Please complete the form below to register your interest and download our corporate booklet.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Download the corporate booklet!

Please complete the form below to register your interest and download our corporate booklet.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Are you ready to get expert advice?

Please fill the form below and a member of our team will contact you.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Contact us

We would be glad to have you visit the operation center.

Headquarters

Please complete the following form. Our team of specialists will assess your request and respond as soon as possible.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Contact us

We would be glad to have you visit the operation center.

Headquarters

Please complete the following form. Our team of specialists will assess your request and respond as soon as possible.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Download the construction booklet!

Please complete the form below to register your interest and download the construction booklet.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.