![](https://static.wixstatic.com/media/11062b_6a134fc09ea34833a17d295e295ab517f000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_6a134fc09ea34833a17d295e295ab517f000.jpg)
![pacc-log-removebg-preview.png](https://static.wixstatic.com/media/c69f66_3271e4b47590460ea4d8e51dcc20c7b8~mv2.png/v1/fill/w_536,h_212,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/pacc-log-removebg-preview.png)
![30yrars-1.jpg](https://static.wixstatic.com/media/f8e217_3fecfdb34d104c578372281074e95a4d~mv2.jpg/v1/fill/w_264,h_253,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/30yrars-1.jpg)
30+ years on the road of succsess building right solutions
![unitel-logo-m-removebg-preview.png](https://static.wixstatic.com/media/c69f66_e1e4b6072de64283bbe353c11bd7aa28~mv2.png/v1/fill/w_257,h_159,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/unitel-logo-m-removebg-preview.png)
Security Systems
​
–EXTENDED PERIMETER
-
Systems used to detect/protect approaching threats.
-
Includes RVS and Barriers for waterways and open areas beyond the perimeter.
–PERIMETER INTRUSION DETECTION (PIDS) -
Systems used to secure the perimeter of the facility.
-
Includes fence detection, PE beams tied back to a panel and reported through the software.
–VIDEO SURVEILLANCE (CCTV) -
Systems used to watch the facility.
-
Includes cameras, housings, mounts, monitors and software used for security and process control.
–ACCESS CONTROL (ACS) -
Systems used to secure the access to a facility or an area.
-
Includes locks, card readers, visitor/contractor badging, bio metric readers, and software for access authentication, asset tracking, mustering and site lock down.
–COMMAND & CONTROL -
Control center that brings all systems together on a single platform for event reporting and response.