Protect merchandise at

Outdoor Auctions

with video surveillance monitoring

Criminals Cost You Money

If it’s outside, it’s a target. Perimeter security can help but it isn’t enough to assure that your auction items are protected. Managed video surveillance solutions will cover your entire facility.

All Outdoor Auctions Benefit from Video Surveillance

Auto Auctions

Insurance companies are giving cost breaks when auto storage facilities are protected with remote video monitoring. 

Heavy Equipment Auctions


Before and during auction, heavy equipment for earthwork operations or large construction tasks must be monitored for theft and vandalism.  

Recreational Vehicle Auctions

Managed video surveillance will protect motorcycles, boats, and toy vehicles in your yard that are waiting for auction or pick up. 

Protect your auction items from thieves and vandals when you add remote video monitoring in your security solution.

Large Auction Items are Coveted by Thieves

Protect commercial vehicles and heavy equipment and from theft and vandalism with a video surveillance solution. Video monitoring will detect them within seconds.  

trucks

Trucks and Trailers

tractor

Agricultural Equipment

heavy construction

Machinery for Construction

Smaller Items at Auction Have Great Value

Tractors & Mowers

farm tractor

Smaller units are valuable but easier to steal

Small Utility Vehicles

all terrain vehicle

Sport utilities are in high demand on the black market

Recreational Vehicles

motorbike

Pastime pleasures are simple for thieves to re-sell

Small vehicles and UTVs can be stolen more discreetly and often become a target for crime rings.

Reports of Car Thefts Jumped as High as 53% in 2020

Managed Surveillance Solutions Offer Peace-of-Mind

Security cameras aren’t enough. Incorporate video surveillance monitoring to stop criminals from driving away with valuable inventory or causing damage to your facility. Choose visual only or soft voice audio to protect livestock when appropriate. 

Remote Video Monitoring

Protect your property after hours without sacrificing customer experience

Get swift 911 dispatch without triggering false alarms

Scare away trespassers before crime happens, with audio and visual deterrents

Video Monitoring Neutralizes Risk

audio

Audio and Visual Deterrents

to scare off intruders and stop crime

siren

When audio and visual deterrents are triggered to let intruders know they have been spotted they leave. In fact, 97% of the time unwelcome trespassers exit empty handed and without doing damage to your property. In the rare instance that they boldly remain on the premises, we notify the authorities for you. Choose visual only, or soft voice audio, to protect livestock when appropriate. 

Protecting Your Facility Protects Your Profitability

400M Annual Estimates Of Contstruction Equipment Theft

Theft and vandalism occur anytime a facility is not being actively monitored. A lack of merchandise in the auction equates to a lack of profitability. Can you afford this risk?

What is your ROI from video surveillance monitoring?

Use of Construction Site Monitoring & Remote Surveillance

light connection

Machine Learning Video Analysis

Identify, evaluate, and escalate threats automatically with the help of artificial intelligence

Remote Video Monitoring

Monitor security video continuously to prevent theft before it occurs 97% of the time

Audio & Visual Deterrents

Equip storage units with audible and visual deterrents - on new or existing equipment

Include video monitoring services in your auction facility’s security solution to deter theft and vandalism. 

Pro-Vigil’s Remote Surveillance

Our permanent, mobile and remote video monitoring offers solution choices for auction facilities to fill in any security gap. Benefits from using a Pro-Vigil solution include:

brain

AI Video Surveillance

Determine threat level with advanced software and notify authorities if necessary

audio

Audio Deterrent Services

Notify intruders with a loud voice warning that they have been spotted and authorities will be contacted

camera

Camera Health Monitoring

Automatically detects equipment issues, conducts trend analysis, fixes issues where possible, and alerts people when needed

phone

Dedicated Mobile App

Access remote video monitoring statistics, arming or disarming, and live feeds

bulb

Smart Search Capabilities

View footage quickly based on search terms or keywords

cloud 3

Cloud Based Surveillance

Provide secure access to data and minimize storage limitations

siren

Visual Deterrents

Deploy bright, flashing lights to alarm intruders that they have been spotted

connection dark

Machine Learning

Strengthen the accuracy of your security solution with smart video analysis

eye 2

Virtual Guards

Leverage remote personnel to review triggers from AI findings

The Speed of Remote Surveillance

Pro-Vigil’s remote video monitoring relies on AI video surveillance and machine learning video analysis to detect, deter, and dispatch in unmatched speed.

18

Detect

Remote surveillance flags unusual and unwanted activity with machine learning video analysis

30

Deter

Both audio and visual deterrents are activated after a virtual guard verifies the threat

2

Dispatch

When needed, 911 authorities are dispatched by your virtual guard

In less than two minutes remote video monitoring can help to identify a threat, verify it, and notify proper authorities if necessary. Choose video surveillance monitoring as complement to your security solution.

News for Security at Auction Grounds

In less than two minutes remote video monitoring can help to identify a threat,
verify it and notify proper authorities if necessary.

More in FAQ

No more posts to show

See how simple it can be to secure your business through remote video monitoring.

Privacy Policy

Pro-Vigil, Inc. (“Company,” “we,” “us,” “our”) respects your right to privacy. We are committed to protecting your privacy. Your continued use of any of our digital services – including but not limited to web sites, mobile apps, voice response services, and messaging services (collectively “Digital Services”) – and your submission of any information to us indicates that you have read, understand and agree to our Privacy Policy.

We have detailed our Privacy Policy so that you know how we collect and protect the information you decide to provide us.

This Privacy Policy will tell you:

  • What information is collected by us
  • How we may share information

WHAT INFORMATION DO WE COLLECT?

CUSTOMER INFORMATION

We receive and may keep information you gave us because you contact us through our Digital Services to request additional information from us. This information may include:

  • Your Name
  • Your Company Name
  • Your Telephone Number
  • Your Email / IP Address
  • Your Physical Mailing Address

Information may also include any other personal information or unique preference information you choose to provide to us in your communication.

If you engage us to provide services to you, we may request and you may provide the following information (either through our Digital Services or through other communications means):

  • First and last name
  • Mailing address
  • E-mail address
  • IP Address
  • Phone Number
  • Mobile Device information (including location services)
  • Service information (including subscription information/ use of services, etc.)
  • Subscription/service payment information
  • Other information requested through our services

AUTOMATIC INFORMATION

We want you to be aware that certain tools exist to help us service and recognize you. For your convenience, to help us personalize your experience or better serve your needs, we may receive and store certain types of information when you use our Digital Services. You may be familiar with the term “cookies”, which are unique alphanumeric identifiers. We may place cookies on your computer when your web browser accesses our web sites. We use this information to educate us on things such as how you navigate to and around our web sites, browsing and accessing content. If you choose, there are utilities available for purchase from independent software providers to install on your computer as well as tools/preferences you can choose through most web browsers to make web site visits anonymous. Of course, cookies let you have a more satisfying web site experience, so we recommend that you leave them turned on. We may also collect mobile device and app analytic data, subject to your applicable privacy and sharing settings on your mobile device(s).

ONCE INFORMATION IS RECEIVED, HOW IS IT USED AND SHARED?

USE OF INFORMATION

Generally, we use the information you provide us to perform the services for which such data was collected. Accordingly, we may use your information for a number of purposes including but not limited to the following:

  • To provide you with access to our products and services.
  • For service administration purposes, which means that we may contact you for reasons related to the service you have signed up for (e.g. to provide you with password reminders or to notify you regarding a particular service).
  • To contact you about a submission you have made via any of our Digital Services, including any content you provide.
  • To issue invoices, administer accounts, collect and process payments.
  • To send you e-mails, e-newsletters, personalized offers or other communications about our products and services.
  • To identify the number of visits (including via IP address logging) from different locations and also to block disruptive use.
  • To analyze and improve the services we offer
  • To stop disruptive or abusive behavior by our users (e.g. the posting or transmission of offensive, inappropriate or objectionable content on or to us).
  • On rare occasions, to disclose specific information upon governmental request, in response to a court order, when required by law, to enforce our policies, or to protect our or others’ rights, property, or safety. We may also share information with companies assisting in fraud protection or investigation. We do not provide information to these agencies or companies for their marketing or commercial purposes.
  • To create sanitized data sets and aggregate information collected our products and services (including Digital Services) which we use to develop and further advance our products, services, software, technology and/or refine and/or create our algorithms and to develop, publish or present reports, summaries, or product specifications based on, or including such sanitized data sets and aggregate information.

WITHIN OUR COMPANY AND WITH OUR SERVICE PROVIDERS

We may share information we collect from all points of contact within our organization (including any affiliates or subsidiaries). The information you give us and information about you may be combined with other personally identifiable information available from our records and other sources. We may share information with our service providers (including third party processors) operating on our behalf to provide services to our customers.

RIGHT TO TRANSFER

Should the Company choose to sell or transfer business assets, or to engage in a transaction where it is required to share or transfer your information, it is possible that the information we possess may be transferred as part of that transaction. We may decide to retain a copy of the information post sale or transfer.

THIRD PARTIES

Aside from the sharing and disclosures set forth above, we will not share your personally identifiable information with any third parties without your consent.

LINKS TO OTHER SITES

Our Web Site may offer links to other sites. Other sites have their own terms of use and privacy and security policies. If you choose to visit one of these sites, you should review the policies that govern that particular site.

HOW DO WE PROTECT CUSTOMER INFORMATION?

We use commercially reasonable security technology to comply with the provisions of this privacy policy. Although we make reasonable efforts to protect information from unauthorized use or alteration, we cannot and does not guarantee the security of all information and there is always a risk inherent in the electronic communication of information (including without limitation from unauthorized entry or use, telecommunication issues, hardware or software failure, and other factors).

APPLICATION OF THIS PRIVACY POLICY

This Privacy Policy applies to all information collected or submitted to us via any of our Digital Services. Other affiliated entities may obtain information independently from transactions and experiences with you or from other sources. This Privacy Policy does not pertain to that information.

YOUR CALIFORNIA PRIVACY RIGHTS

Under California’s “Shine the Light” law, California residents who provide personal information in obtaining products or services for personal, family or household use are entitled to request and obtain from us, once per calendar year, information about the customer information we shared, if any, with other businesses for their own direct marketing uses. If applicable, this information would include the categories of customer information and the names and addresses of those businesses with which we shared customer information fo