# Overview

Rekor Edge Max<sup>™</sup> is a fixed non-intrusive video-based camera system that captures up to six lanes of bidirectional high-speed roadway data and transforms it into holistic traffic insights accessible within the [Rekor Discover<sup>®</sup> platform](https://www.rekor.ai/software/discover).\
\
The system is perfect for continuous, long-term traffic studies and provides vehicle category classification, vehicle counts, and speed reports that adhere to TMG standards.

<figure><img src="https://914362148-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FExr5RmSsIypa7hIm1B9c%2Fuploads%2F4VmK6eBCyPERDegBbs96%2FMax%20Specs.jpg?alt=media&#x26;token=ba68c2f9-69f1-49e6-8482-b9acaad1ebe1" alt=""><figcaption></figcaption></figure>

### Capture and analyze traffic in real-time

**How does the system work with live video of traffic?**\
\
Each Rekor Edge Max system contains an embedded Edge Processing Unit (EPU) that processes multiple streams of high-resolution video at once. Installed directly on the roadside, it delivers low-power computing in a compact unit, allowing us to accurately analyze full-frame video without performing expensive processing in the cloud.\
\
**What happens after the video is processed?**\
\
After processing the raw video using our EPU, small bits of metadata containing actionable information are sent to the cloud via a cellular connection. The data can then be accessed through REST APIs, exported in a variety of TMG-friendly formats, or viewed with [Rekor Discover’s web-based dashboards](https://www.rekor.ai/software/discover).

<figure><img src="https://914362148-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FExr5RmSsIypa7hIm1B9c%2Fuploads%2FRJM0rsHtkSuBR1aoYnaK%2FMax%20System%20Diagram.jpg?alt=media&#x26;token=f6fe2673-103d-460c-a7ec-05624581e21a" alt=""><figcaption></figcaption></figure>

### Edge computing with hardware security at the frontlines

Our **non-intrusive video-based camera systems**, deployed at the roadside across highways, cities, and critical infrastructure, are designed to withstand both cyber and physical threats.

* **Advanced Intrusion Detection:** Edge systems include firewalls and anomaly detection to monitor for suspicious activity in real-time.
* **Access Control Mechanisms:** We employ multi-layered identity verification and strict access protocols to ensure devices are protected from unauthorized access​.
* **Routine Penetration Testing:** Every device undergoes rigorous third-party penetration testing to proactively address issues.
* **Fully NDAA & TAA Compliant:** Video-based camera systems meet stringent security standards, enabling use in government and federally funded projects with confidence.

<figure><img src="https://914362148-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FExr5RmSsIypa7hIm1B9c%2Fuploads%2FdnxjP6YzU1Tk3YvfmWGR%2FMax%20Components%20Graphic%20.jpg?alt=media&#x26;token=8f3ef002-698c-4e43-a085-6984a8f954cd" alt=""><figcaption></figcaption></figure>
