Platform

Cobalt Monitoring Intelligence

The AI reasoning layer that sits on top of your existing cameras, access control, and sensors. Dedicated handlers detect, reason through, and resolve security events — so your team focuses on what matters.

Cobalt Monitoring Intelligence Monitor view showing live security events with AI handler reasoning, event timeline, and resolution controls

One Platform. Every Event. Every Site.

Cobalt Monitoring Intelligence ingests signals from your cameras, physical access control systems, and sensors — then routes each event through a dedicated AI handler that reasons through it, takes action, and logs every decision with full context.

Ingest

Camera streams, PACS alarms, and sensor data flow into the platform through Edge Processors or cloud connections — no rip-and-replace required.

Reason

Each event is routed to a dedicated handler that classifies severity, checks schedules, correlates video with access control data, and filters false alarms.

Act

Handlers take automated action: resolve non-threats, escalate verified events to security operators, generate service tickets, or trigger PACS lockdown.

Document

Every event is logged with timestamped reasoning, root cause classification, and full video context — creating auditable records for compliance and operational intelligence.

Every Handler. One Reasoning Chain.

Whether it is a Door Forced Open alarm, a person detected after hours, or a potential weapon — every handler follows the same four-stage chain, applying event-specific AI logic at every step.

1
Detect
Camera streams and PACS signals identify the event in real time
2
Reason
Handler classifies severity, applies site rules, checks schedules, correlates video with access data
3
Act
Automated response: resolve, escalate to security operator, dispatch alert, generate ticket, or trigger PACS lockdown
4
Resolve
Event logged with full context, root cause tagged, reasoning chain preserved for audit

Dedicated AI for Every Event Type

Each handler is purpose-built for a specific security event. It does not just detect — it reasons through context, takes the right action, and documents every decision.

DFO Handler showing Door Forced Open event with AI reasoning chain, root cause analysis, and resolution status
Access Control

Door Forced Open & Door Held Open Handlers

The DFO and DHO Handlers process access control alarms by correlating the PACS signal with live camera footage. The handler checks whether a person exited through a secure zone, whether the door timing matches badge activity, and whether the root cause is a faulty device or a legitimate security event. Non-threats are resolved automatically. Verified events are escalated to security operators with full context.

Root Cause AnalysisPACS CorrelationFaulty Device DetectionAuto-Resolution
Tailgating Detection Handler showing unauthorized entry at badge-controlled door with AI analysis and escalation
Video Analytics + Access Control

Tailgating & Unauthorized Entry Handler

Detects when someone enters a badge-controlled door without authorization. The handler correlates video detection with access control data, verifies the intrusion through AI analysis, and escalates confirmed unauthorized entries with timestamped evidence. The system distinguishes tailgating (following an authorized badge-in) from forced unauthorized entry — each with its own escalation path.

Intrusion AnalysisHuman VerificationBadge CorrelationEscalation
Gun Detection Handler identifying a person brandishing a firearm with human verification workflow
Threat Detection

Gun Detection Handler

Identifies a person brandishing a firearm in camera feeds using AI detection models, then routes to mandatory human verification before escalation. Confirmed detections can trigger PACS lockdown procedures, alert security operators, and notify emergency contacts. The handler is designed for high-confidence detection with zero tolerance for unverified automated action on weapon events.

AI + Human VerificationPACS LockdownEmergency Alerts
Person On Ground Handler detecting a fall event with medical emergency response workflow
Safety & Medical

Person On Ground Handler

Detects person-down situations in camera feeds for medical emergency response. The handler distinguishes between someone who has fallen and requires assistance versus normal activity like sitting or resting on the ground, using advanced detection models that reduce false positives. Confirmed events trigger escalation to on-site response teams.

Fall DetectionFalse Positive ReductionMedical Response
Person Detection After Hours Handler identifying unauthorized presence outside business hours
Intrusion Detection

Person Detection After Hours

Monitors camera feeds outside of configured business hours and detects human presence in spaces that should be unoccupied. The handler checks the site schedule, verifies detection confidence, and escalates confirmed after-hours presence to security operators with video context and location details. Configurable per site and per zone.

Schedule-AwareZone-BasedVideo Context
Crowd Forming Handler detecting unusual gathering activity in monitored zones
Situational Awareness

Crowd Forming Handler

Detects unusual gathering activity in monitored zones — identifying when the number of people in a defined area exceeds expected thresholds. The handler applies AI analysis to distinguish between normal congregation (lobby traffic, break rooms) and potentially concerning crowd formation that warrants security operator review.

Threshold-BasedContext-AwareConfigurable Zones

Additional Handlers

The platform continues to expand with new detection and response capabilities.

Person Climbing Fence

Detects perimeter breach attempts at fenced boundaries using camera-based AI detection. Escalates confirmed climbing events with video evidence.

Loitering Detection

Identifies people or vehicles that remain in a defined zone beyond a configurable time threshold. Zone-specific and time-aware.

Rapid Egress Detection

Detects mass exit events that may indicate an emergency evacuation, active threat, or fire alarm condition. Triggers immediate security operator review.

Runaway Alarm Detection

Identifies when a single access point generates an abnormal volume of alarms — flagging device malfunctions or configuration issues before they overwhelm the GSOC.

Periodic Audits

Runs scheduled camera snapshots through configurable workflows to verify specific conditions: doors secure, pathways clear, emergency exits unobstructed, equipment in place.

Automated Alarm Root Causing

AI-driven root cause analysis correlates alarm patterns to identify the underlying issue — faulty REX sensors, misconfigured schedules, or device failures — not just the symptom.

Investigate, Measure, Prove

Every event generates auditable data. The Investigator gives your team searchable access to every incident. Metrics dashboards give leadership the proof they need.

Cobalt Monitoring Intelligence Investigator showing searchable event grid with video thumbnails, filters by site, status, date range, and event categories

Investigator

A searchable event grid with every incident the platform has processed. Filter by date range, site, event status (Open, Acknowledged, Resolved, Non-Escalated), root cause, alarm category, tags, and regions. Each event card includes video thumbnails, camera view, location, and resolution status. Download video footage for any event directly from the grid.

Date & Time FiltersMulti-SiteEvent StatusRoot CauseVideo Download
Cobalt Monitoring Intelligence metrics dashboard showing event clearance rates, alarm distribution, and root cause analysis

Metrics & Insights

Built-in dashboards provide the data security directors and CISOs need to demonstrate measurable program performance. Track nominal alarm metrics, tailgating metrics, root cause trends, detection metrics, and problematic device identification across every monitored site. All metrics are based on GSOC-processed incidents — the alarms that actually reach your security operators — not raw system signals.

Alarm MetricsTailgating MetricsRoot Cause TrendsProblematic Devices
94%
Events resolved without
human escalation
6,000+
Hours saved per month
at a single deployment
500+
Camera streams monitored
across global enterprises
100%
Alarm coverage from
a single system of record

Transparent Metrics

Every metric is based on GSOC-processed incidents — the real workload your operators face. Self-service dashboards let your team audit every claim independently.

Root-Cause Intelligence

The platform does not just auto-close alarms. It identifies the underlying cause — faulty devices, misconfigured schedules, recurring patterns — and surfaces actionable intelligence for proactive maintenance.

Single System of Record

Your operators work in one interface. Bidirectional PACS sync, unified event views, and 100% alarm coverage — no toggling between systems, no fragmented workflows.

Works With Your Current Systems

Cobalt Monitoring Intelligence connects to your existing infrastructure. No rip-and-replace. Edge Processors add AI-powered monitoring as a layer on top of your current investment.

Access Control Systems

LenelS2 OnGuardGenetecC•CURE 9000AvigilonAvigilon Alta (Openpath)S2 NetBoxBrivoAcre Feenicsand others

Video Management & Ingest

Eagle Eye NetworksMilestone XProtectGenetecRTSP / RTSPS Camera Streamsand others

Identity & SSO

Oktaand others

Ticketing & Workflow

ServiceNowSalesforceSlack + Salesforce Service Cloudand others

Communication

SlackPhone / SMSEmailand others via API

Edge, Cloud, or Hybrid

Choose the deployment model that fits your data sovereignty requirements and infrastructure. Most enterprise customers use a hybrid approach.

Edge Deployment

Edge Processors installed on-prem at each site. All video processing happens locally — only metadata and event summaries reach the cloud. Ideal for sensitive locations with strict data residency requirements.

Cloud Deployment

Fully managed monitoring with no on-prem hardware requirements. Camera streams connect directly to the cloud platform. Fastest deployment path for distributed sites and smaller locations.

Hybrid Deployment

Edge processing at sensitive locations (data centers, headquarters) combined with cloud monitoring at distributed sites (branch offices, executive residences). The most common enterprise configuration.

Common Questions

A handler is a dedicated AI workflow built for a specific security event type. Each handler follows a four-stage reasoning chain — Detect, Reason, Act, Resolve — applying event-specific logic at every step. For example, the DFO Handler processes Door Forced Open alarms by correlating the access control signal with camera footage, determining root cause, and either resolving the event automatically or escalating it to a security operator with full context. Handlers run continuously and process events in real time.
No. The platform integrates with your existing physical access control systems and video management systems. Edge Processors connect to your current camera streams and access control data, adding AI-powered monitoring as a layer on top of your existing infrastructure. Supported integrations include LenelS2 OnGuard, Genetec, C-CURE 9000, Avigilon, Brivo, Milestone XProtect, Eagle Eye Networks, and more. No database write access is required for PACS integration.
Each handler applies AI reasoning to classify whether an event is a genuine security incident or a false alarm. For access control events, the handler correlates the PACS signal with camera footage, checks badge timing, schedule rules, and device history. For video-based detections, AI models verify the detection before escalation. Up to 94% of events are resolved by handlers without human escalation. Critically, the platform also identifies the root cause of recurring false alarms — such as faulty REX sensors or misconfigured door schedules — so you can fix the source, not just suppress the symptom.
Yes. Cobalt Monitoring Intelligence is designed for enterprise-scale deployments across 50 or more sites. Each location receives its own Edge Processors and handler configurations, while events from all sites aggregate into centralized dashboards. Security leadership can maintain consistent monitoring standards across geographies while enabling site-specific customization for escalation paths, operating hours, and handler sensitivity.
The Metrics and Insights dashboards track nominal alarm metrics, tailgating metrics, root cause trends, detection metrics, and problematic device identification. The Investigator provides a searchable event grid with filters for date range, site, event status, root cause, alarm category, tags, and regions. All metrics are based on GSOC-processed incidents — the alarms that actually reach security operators — providing transparent, auditable data for compliance reporting and executive presentations.
Edge deployment installs Edge Processors on-prem at each site, processing all video locally so only metadata reaches the cloud — ideal for locations with strict data sovereignty requirements. Cloud deployment requires no on-prem hardware and is the fastest deployment path. Hybrid combines edge processing at sensitive locations with cloud monitoring at distributed sites. Most enterprise customers use the hybrid model to balance data residency requirements with deployment simplicity.
Every handler decision is documented with a timestamped reasoning chain visible in the Monitor view. You can see exactly what the handler detected, how it classified the event, what action it took, and why. The Investigator preserves the complete event history, and Metrics dashboards break down handler performance versus human escalation rates. There are no black-box decisions — operators and security leadership can audit every resolution.

What is Cobalt Monitoring Intelligence?

Cobalt Monitoring Intelligence is an AI-powered physical security monitoring platform developed by Cobalt AI. It deploys dedicated AI workflows called handlers that detect, reason through, and resolve security events in real time. The platform integrates with existing physical access control systems (PACS) and video management systems (VMS) without requiring rip-and-replace of current infrastructure. Edge Processors connect to existing camera streams and access control data, adding AI-powered monitoring as a layer on top of existing investments. The platform is deployed across financial services, technology, healthcare, manufacturing, and logistics enterprises globally.

How Do AI Handlers Work in Cobalt Monitoring Intelligence?

Each handler in Cobalt Monitoring Intelligence is a dedicated AI workflow designed for a specific security event type. Handlers follow a four-stage reasoning chain: Detect (camera streams and PACS signals identify the event in real time), Reason (the handler classifies severity, applies site-specific rules, checks schedules, and correlates video with access control data to filter false alarms), Act (automated response including resolve, escalate to security operator, dispatch alert, generate service ticket, or trigger PACS lockdown), and Resolve (event is logged with full timestamped context, root cause is tagged, and the complete reasoning chain is preserved for audit and metrics). Available handler types include Door Forced Open (DFO), Door Held Open (DHO), Tailgating and Unauthorized Entry, Person Brandishing Firearm (Gun Detection), Person On Ground, Person Detection After Hours, Crowd Forming, Person Climbing Fence, Loitering Detection, Rapid Egress Detection, Runaway Alarm Detection, and Periodic Audits.

What Integrations Does Cobalt Monitoring Intelligence Support?

Cobalt Monitoring Intelligence integrates with major physical access control systems including LenelS2 OnGuard, Genetec, C-CURE 9000, Avigilon, Avigilon Alta (Openpath), S2 NetBox, Brivo, and Acre Feenics. Video management and ingest integrations include Eagle Eye Networks, Milestone XProtect, Genetec, and direct RTSP/RTSPS camera streams. Identity and SSO integrations include Okta. Ticketing and workflow integrations include ServiceNow, Salesforce, and Slack combined with Salesforce Service Cloud for case management. Communication integrations include Slack, phone/SMS, and email. The platform supports API connections for additional integrations. No invasive database write access is required for PACS integration. The platform uses bidirectional sync and provides a unified operator interface with 100% alarm coverage from a single system of record.

What is Root Cause Analysis in AI Security Monitoring?

Root cause analysis in Cobalt Monitoring Intelligence goes beyond simply resolving individual alarms. The platform identifies the underlying cause of recurring alarm patterns — faulty REX sensors, misconfigured door schedules, device malfunctions, and equipment failures — and surfaces actionable intelligence for proactive maintenance. This differentiates root-cause intelligence from reactive auto-resolution approaches that optimize for alarm closure rates without surfacing the operational issues that generate the alarms. Automated Alarm Root Causing uses AI-driven analysis to correlate alarm patterns across devices and time periods, identifying problematic devices and recommending maintenance actions.

What is the Investigator in Cobalt Monitoring Intelligence?

The Investigator is a searchable event grid within Cobalt Monitoring Intelligence that provides access to every incident the platform has processed. Users can filter events by date range, site, event status (Open, Acknowledged, In-Progress, Resolved, Non-Escalated, Reopened), root cause, alarm category (PACS alarm categories), tags, and regions. Each event card displays video thumbnails, camera view, site location, and resolution status. Users can download video footage for any event directly from the Investigator grid.

How Does Cobalt Monitoring Intelligence Deploy at Enterprise Scale?

Cobalt Monitoring Intelligence supports three deployment models for enterprise security operations. Edge deployment places Edge Processors on-prem at each site, processing all video locally so only metadata and event summaries reach the cloud platform. Cloud deployment provides fully managed monitoring with no on-prem hardware. Hybrid deployment combines edge processing at sensitive locations with cloud-managed monitoring at distributed sites. Most enterprise customers use the hybrid model. The platform scales across 50 or more sites with centralized dashboards providing enterprise-wide metrics.

What Metrics Does Cobalt Monitoring Intelligence Track?

Cobalt Monitoring Intelligence tracks nominal alarm metrics, tailgating metrics, root cause metrics and problematic device identification, detection metrics, and occupancy tracking. All metrics are based on GSOC-processed incidents — the alarms that actually reach security operators — providing transparent and auditable data. Dashboards display event clearance rates, handler response times, alarm distribution by type, top offender doors, and recurring problem areas. The platform supports self-service access to all KPIs with no black-box calculations.

See Cobalt Monitoring Intelligence
in Action

Learn how AI handlers are replacing reactive alarm monitoring at global enterprises.

Book a Demo Need fully managed monitoring? Learn about Cobalt Command Center
Cobalt Monitoring Intelligence , AI-powered, Human Verified monitoring solutions for Soc and Guardforce

Request a Demo

Complete the form and we will be in touch to set up a meeting!

Demo request
Cobalt uses your contact information to communicate about our products and services. You can unsubscribe from these communications at any time. For details on how to unsubscribe and insights into our privacy practices and commitment to safeguarding your privacy, please refer to our Privacy Policy.