Intruder detector case studies

HAECO Automates Its Tool Control For Aircraft Maintenance, Repair And Overhaul (MRO) Services With Xerafy's RFID Solution

Hong Kong Aircraft Engineering Company (HAECO), one of the globally renowned independent aircraft engineering and maintenance companies, implemented a solution for full tool control and prevention of Foreign Object Detection (FOD) occurrences. HAECO selected Xerafy for its track record in the aviation industry, as well as the strong market experience and capabilities that the company has demonstrated in RFID tool control for MRO and FOD. MRO services HAECO provides maintenance, repair and ove...

Ajax Protects The Vernadsky Research Base With Fire Detectors And Fire Alarm Systems

In the spring of 2021, the Vernadsky Research Base, a Ukrainian Antarctic Station, was equipped with an Ajax security system featuring FireProtect and FireProtect Plus fire detectors. The Ajax equipment was delivered at a distance of 16 thousand kilometers that protects the scientific base in Antarctica. From this article, one will learn how to install a fire alarm system at a facility if that facility is a polar station. Presence of previous fire alarm There was, but no o...

Securiteam Designs Commercial Intrusion Solution For A Fortune 500 Company

The customer is involved in the distribution, warehousing, and shipping of retail merchandise for a Fortune 500 company.  As with most shipping/warehousing companies, they have a large lot that requires electronic, as well as manned, security to monitor activity within the perimeter of the property. Challenges with motion detection appliances A key element of the client’s perimeter security was dependent upon motion detection appliances connected to control that had been “jerr...

Digital Barriers’ Real-Time Surveillance And AI-Based Edge Analytics Solutions Help Counter The Rise In Rural Crime In Wales

Digital Barriers, a globally renowned provider of edge-intelligent surveillance and security technologies, reveals its collaboration with the Future Farms Cymru project, run by North Wales Police. Real-time surveillance solutions Digital Barriers has equipped a farm in North Wales with its real-time surveillance solutions, to demonstrate the role that sophisticated technologies can play in cutting the cost of rural crime, estimated by the National Farmers Union to have reached 54 million pound...

Abnormal Security Highlights The Key Points About The RFQ Attack Scam And How To Counter Such Cyber-Threats

In the RFQ cyber-attack, attackers disguise harmful malware as a ‘Request For Quote’ (RFQ), in order to encourage recipients to download dangerous files. This attack is an impersonation of a ‘Request For Quote’ (RFQ) from a legitimate, outside organization. The attack originates from the throwaway address - info@req-allparts.com, with the reply-to address - glennmauldin@zidnei.com. RFQ attack By using urgent language, the attacker attempts to coax the recipient to click...

ClanTect And ePm Sign Agreement To Offer Next-Gen Systems For The Detection Of Humans In Vehicles In The UAE

ClanTect and ePm have signed a partnership agreement for the sale and servicing of ClanTect’s next generation Motion Detection systems (also referred to as ‘heartbeat’ detection systems) for the United Arab Emirates (UAE). Detecting humans in vehicles ClanTect’s systems are used to detect the hidden presence of people inside vehicles and are deployed within a wide range of organizations in the Border Security, Prisons and Critical Infrastructure markets.  Customer...

Aiphone IS Series Video Intercom Installed To Enhance Visitor Management And Communications At The Congregation Beth Jacob

Ways to manage visitors and improve communications, while keeping doors to the Congregation Beth Jacob’s sanctuary and school locked. Aiphone IS Series video intercom Aiphone IS Series video intercom mounted just outside the main entry allows visitors to buzz one of four master stations. “Emergency communications and procedures are now embedded in our daily operations,” said Greg Sterling, Past President of the Congregation Beth Jacob. Enhancing safety against active shoote...

BIRD Aerosystems Secure Contract From Czech Republic Air Force For Delivery Of AMPS-MV Systems With Patented MACS

BIRD Aerosystems, the globally renowned developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information, and Observation (ASIO) solutions, has been awarded a new contract by the Czech Republic Air Force. Under the contract, BIRD Aerosystems will provide additional AMPS-MV systems with the patented MACS (Missile Approach Confirmation Sensor) for the Czech Air Force’s Mi-17 fleet. This project is a part of the overall modernization plan of the Czech Mi-17 tran...

Bosch Installs Intrusion Alarms At UNESCO World Heritage Site In China

Bosch Building Technologies has installed an intrusion alarm system at the UNESCO World Heritage Site: the Mausoleum of Qin Shihuangdi in the city of Xi'an, China. Several hundred TriTech motion detectors are deployed to protect the 16,300-square-foot museum against theft and damage. These detectors prevent costly and time-consuming false alarms under challenging environmental conditions while providing detection reliability of real alarms. Because of the highly efficient intrusion detection sy...

Interface Security Systems’ Managed Video Verified Alarm Services Helps El Pollo Loco Slash False Alarm Costs By 95%

Interface Security Systems, a renowned managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced that El Pollo Loco, one of the nation’s fastest-growing restaurant chains that specializes in fire-grilled chicken, is relying on Interface's managed video verified alarms and intrusion alarm monitoring to reliably detect intrusions and minimize false alarms. With Interface, El Pollo Loco saves sever...

Abnormal Security Highlights The Key Pointers Of ‘LinkedIn Identity Theft’ Attack Scam

In the ‘LinkedIn Identity Theft’ attack, the attacker impersonates a policy change notification from the company, LinkedIn, in order to steal highly confidential information, such as the victim’s social security number. ‘LinkedIn Identity Theft’ attack Cybercriminals constantly search for unique social engineering tactics, in order to dupe their victims. However, in this type of cyber-attack, attackers rely on the reputability and trust bestowed in social media an...