top of page

Security Systems

​

–EXTENDED PERIMETER

  • Systems used to detect/protect approaching threats.

  • Includes RVS and Barriers for waterways and open areas beyond the perimeter.
    –PERIMETER INTRUSION DETECTION (PIDS)

  • Systems used to secure the perimeter of the facility.

  • Includes fence detection, PE beams tied back to a panel and reported through the software. 
    –VIDEO SURVEILLANCE (CCTV)

  • Systems used to watch the facility.

  • Includes cameras, housings, mounts, monitors and software used for security and process control.
    –ACCESS CONTROL (ACS)

  • Systems used to secure the access to a facility or an area.

  • Includes locks, card readers, visitor/contractor badging, bio metric readers, and software for access authentication, asset tracking, mustering and site lock down.
    –COMMAND & CONTROL

  • Control center that brings all systems together on a single platform for event reporting and response.

bottom of page