# Overview

Engineered for public safety missions and traffic speeds up to 120 mph, the Rekor Edge Max<sup>™</sup> system for ALPR is deployed on the roadside of bidirectional primary roads and highways. It captures and processes license plate and vehicle data on-device within a durable enclosure and automatically sends recognition data to the Rekor Scout<sup>®</sup> software platform.

### Recognize vehicles at long distances and across lanes

Rekor Edge Max is built using best-in-class hardware and packaged with our incredibly easy-to-use Rekor Scout software. The systems are able to capture license plates and vehicles that other companies miss. All processing is performed on the unit itself, meaning users are provided with alerts exactly when they need them — in real-time!

<figure><img src="/files/sL7jHlAKlnLcewS1q3Zv" alt=""><figcaption></figcaption></figure>

### Incredible license plate recognition accuracy

**How does the system work with live video of traffic?**\
\
Each Rekor Edge Max system contains an embedded Edge Processing Unit (EPU) that processes multiple streams of high-resolution video at once. Installed directly on the roadside, it delivers low-power computing in a compact unit, allowing us to accurately analyze license plates and vehicles from full-frame video without performing expensive processing in the cloud.\
\
**What happens after the video is processed?**\
\
After processing the raw video using our EPU, small bits of metadata containing actionable information are sent to the cloud via a low-bandwidth cellular connection. The data can then be easily accessed in Rekor Scout’s web-based dashboards.

<figure><img src="/files/xvpCn6clHeQeHHSo51Ko" alt=""><figcaption></figcaption></figure>

### Edge computing with hardware security at the frontlines

Our **non-intrusive video-based camera systems**, deployed at the roadside across highways, cities, and critical infrastructure, are designed to withstand both cyber and physical threats.

* **Advanced Intrusion Detection:** Edge systems include firewalls and anomaly detection to monitor for suspicious activity in real-time.
* **Access Control Mechanisms:** We employ multi-layered identity verification and strict access protocols to ensure devices are protected from unauthorized access​.
* **Routine Penetration Testing:** Every device undergoes rigorous third-party penetration testing to proactively address issues.
* **Fully NDAA & TAA Compliant:** Video-based camera systems meet stringent security standards, enabling use in government and federally funded projects with confidence.

<figure><img src="/files/3irCpcHz5prSwBRv4UnA" alt=""><figcaption></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.rekor.ai/rekor-edge-max-tm/rekor-edge-max-tm-for-alpr/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
