It’s no secret that only the best perimeter security options are needed for gas company security. That’s exactly what you will find with Integrated Security Corporation. We have state-of-the-art security systems to help mitigate risk in every situation.
Hydra security fence sensors use dual-detection technology that senses both short-range and passive infrared (PIR) signatures by searching for body heat from an approaching person, and an accelerometer detecting any vibration from physical activity actually on the fence. Requiring the detection of both events for an alarm allows Hydra to filter out false alarms.
Hydra is designed to account for stray objects hitting the fence or any extreme temperature variation. When a Hydra sensor detects a true disturbance on the fence, it immediately uses the wireless mesh network to communicate the alarm to the Hydra Gateway Board. The Hydra Gateway Board then triggers the Hydra Relay Module to alert the customer via their preferred notification technology.
The Infinity 2020 perimeter intrusion detection system turns a fence into a robust security solution. Infinity delivers unmatched accuracy, probability of detection and is coupled with an industry-leading low false alarm rate. It allows users to retain a high sensitivity setting on the sensor line without being overwhelmed with false alarms by filtering out transient disturbances like weather.
The Infinity 2020 GUI (graphic user interface) allows monitoring personnel to see the location of any alarm event. The GUI is based on web services, which provides easy connectivity to remote workstations without additional software and API access for easy integrations. Infinity incident reports can be exported to PDF or Excel allowing for easy data analysis.
The MWxPRO digital microwave protection sensors only start their work when a disturbance is noticed. Looking at the wave pattern generated while the disturbance is occurring, they decide if it is a real alarm or a nuisance event that can be ignored. Using “fuzzy logic,” the size, shape and rate of change of the observed signal are compared to hundreds of stored patterns corresponding to known alarm types. If there is a close match, an alarm is generated. Intruders walking, running or rolling will be caught. All disturbances, whether they are recognized as alarms, are date- and time-stamped and stored in the receiver for later analysis.