INTRUSION DETECTION SYSTEMS
Our world is facing ever-increasing security risks. These threats must be anticipated, identified and taken down with pinpoint accuracy. Critical facilities pose attractive top-of-the-line targets. As perpetrators devise new models of infiltration, security protocols need to adjust accordingly by offering reliable and trustworthy technology solutions.
Part number:
Supplier:
AETOS Holdings Pte LtdDescription
1) An intruder attempts to breach the perimeter by cutting or climbing the fence.
2) When the fence panel is disturbed, the nearest sensor will cause a change in its reflected colour and trigger an alert to the Operations Centre.
3) The nearest strategically placed camera on the perimeter is automatically activated to verify the intrusion.
4) The security response team is quickly activated and dispatched to the precise intrusion location. The entire process is monitored by the Operations Centre.
2) When the fence panel is disturbed, the nearest sensor will cause a change in its reflected colour and trigger an alert to the Operations Centre.
3) The nearest strategically placed camera on the perimeter is automatically activated to verify the intrusion.
4) The security response team is quickly activated and dispatched to the precise intrusion location. The entire process is monitored by the Operations Centre.
Specification
1. FIDS-Brochure.pdf