# Overview

Rekor Edge Max<sup>™</sup> is a fixed non-intrusive video-based camera system that captures up to six lanes of bidirectional high-speed roadway data and transforms it into holistic traffic insights accessible within the [Rekor Discover<sup>®</sup> platform](https://www.rekor.ai/software/discover).\
\
The system is perfect for continuous, long-term traffic studies and provides vehicle category classification, vehicle counts, and speed reports that adhere to TMG standards.

<figure><img src="/files/RTSVVzVKqH61gghRxuij" alt=""><figcaption></figcaption></figure>

### Capture and analyze traffic in real-time

**How does the system work with live video of traffic?**\
\
Each Rekor Edge Max system contains an embedded Edge Processing Unit (EPU) that processes multiple streams of high-resolution video at once. Installed directly on the roadside, it delivers low-power computing in a compact unit, allowing us to accurately analyze full-frame video without performing expensive processing in the cloud.\
\
**What happens after the video is processed?**\
\
After processing the raw video using our EPU, small bits of metadata containing actionable information are sent to the cloud via a cellular connection. The data can then be accessed through REST APIs, exported in a variety of TMG-friendly formats, or viewed with [Rekor Discover’s web-based dashboards](https://www.rekor.ai/software/discover).

<figure><img src="/files/QwdiGEoXrTNsoLeikxLY" alt=""><figcaption></figcaption></figure>

### Edge computing with hardware security at the frontlines

Our **non-intrusive video-based camera systems**, deployed at the roadside across highways, cities, and critical infrastructure, are designed to withstand both cyber and physical threats.

* **Advanced Intrusion Detection:** Edge systems include firewalls and anomaly detection to monitor for suspicious activity in real-time.
* **Access Control Mechanisms:** We employ multi-layered identity verification and strict access protocols to ensure devices are protected from unauthorized access​.
* **Routine Penetration Testing:** Every device undergoes rigorous third-party penetration testing to proactively address issues.
* **Fully NDAA & TAA Compliant:** Video-based camera systems meet stringent security standards, enabling use in government and federally funded projects with confidence.

<figure><img src="/files/3irCpcHz5prSwBRv4UnA" alt=""><figcaption></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.rekor.ai/rekor-edge-max-tm/rekor-edge-max-tm-for-ccs/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
