Intruder Detectors & Detection Systems (1,237)
Climax Hybrid Security System is a wired and wireless IP-based smart home security gateway with LTE capability. It provides a customizable and robust system which takes advantages of both kinds of technology for commercial and large home applications, offering a comprehensive solution, including home security, total visual monitoring solution, ZigBee / Z-Wave home automation, and energy management and bringing all-round convenience, comfort and safety. Scalable System Hybrid Security System can be expandable to 64 wired zones by installing zone expansion module. Besides, Hybrid Security System is compatible with HWC-1, Hardwire to Wireless Converter, providing flexibility for installations of a wide range of wired sensors and devices. Smart Automation Hybrid Security System incorporates ZigBee or Z-Wave devices to create an integrated, comprehensive smart automation system, able to adapt to your lifestyle habits and enhance security. Energy Management Hybrid Security System can integrate whole-premise energy meters to report how much electricity the entire household/facility uses and ZigBee/Z-Wave power meter switches to monitor the power consumption of individual home appliances. With this power-saving system you can develop a useful strategy to reduce energy consumption. World-leading 2-Km RF Range Hybrid Security System utilizes Climax’s groundbreaking Security@2km Wireless Technology that delivers RF communication range of 2 kilometers (1.5 miles), fast signal transmission, and relentless reliability. 24-Hour Emergency Monitoring Hybrid Security System can incorporate smoke/heat detectors, water sensors, air quality sensors, panic buttons, light and humidity sensors to protect user’s premises and property from damage cause by fire, heat, water, or air toxins. Total Visual Monitoring Solution Indoor/outdoor PIR cameras, PIR video cameras, and IP cameras can be incorporated in Hybrid Security System for visual verification and real-time visual monitoring. Remote and Mobile Control Hybrid Security System can be accessed anytime, anywhere, via Vesta Home 5 web portal or app.
Early detection with high mount sensors OPTEX’s core philosophy is to detect intrusion before individuals break into the property or building. Early warning and detection is the best way to prevent crime and QX Infinity series complements OPTEX’s extensive choice of short-range outdoor PIRs by bringing a family of compact outdoor detectors – PIR and dual-technology - providing 12m detection area, up to 120° in width. A particular benefit of this series is that the sensors are specifically designed to be installed at heights of up to 2.7m, discreetly fitting into any residential or commercial buildings while keeping safe out of the reach from vandals. Detection analysis to filter out false alarms The new Quad technology features a pyro element that has been redefined by OPTEX and supports a greater performance with a double layered detection in a compact design. The QXI series features improved Super Multi-Dimensional Analysis (SMDA) logic and Double Conductive Shielding for even more reliable sensing capabilities and greater tolerance against light and RFI. It allows for greater immunity against pets and can also be installed as a low mount PIR detector to create a ‘pet alley’ and further reduce the likelihood of nuisance alarms. Compact design and easy installation Installing the sensor has been made simple with an easy to open/close front cover. Other features include an Automatic Walk Test Mode, which automatically starts when the cover is closed and returns to normal mode after three minutes. For extra convenience, power to the wireless models can be shared through a common battery (CR123A) to the transmitter in the base of the device which can easily be swapped out/replaced when the need arises. The QXI series includes four models: Wired models - QXI-ST 120°, 12m, wired, standard- QXI-DT 120°, 12m, wired, dual-technology, with an anti-blocking feature to detect intruders attempting to deliberately mask the detector Battery-operated (wireless) models - QXI-R 120°, 12m, wireless, standard- QXI-RDT 120°, 12m, wireless, dual-technology The QXI series is the ideal solution to protect the approach to warehouse and commercial buildings, driveways, houses and gardens. The sensors will trigger both intruder alarms and CCTV.Add to Compare
Fiber-optic technology has proven to be extremely stable and reliable for fence PIDS, detecting intruders attempting to climb over, cut through, or crawl under a perimeter. And although the technology was previously considered prohibitive for small or medium-sized perimeters on the perception that it is too expensive and complicated to install, OPTEX, along with Fiber SenSys Inc, one of its group companies, has designed the RAPID REDFIBER series of affordable and easy-to-install kits, encouraging installers not to compromise on quality. The packaged systems, or kits, offer cost-effective and high-performance protection in two detection zones, ranging from 75m to 200m each, and also include all the necessary components needed for installation. Kit choices include two-channel Alarm Processing Units (APU), one including a PoE/IP module that is integrated with most Video Management Software (VMS) and PSIM platforms, the enclosure box, the pre-connected cable cut to fit 75m, 100m, 150m and 200m zones, the necessary ties to mount the cable on a perimeter, and calibration software. Ricky Miwa, Managing Director of OPTEX Europe, says the technology is highly resistant to extreme weather changes: “Fiber sensing cables are unaffected by harsh environments, including UV radiation, moisture, salt or lightning strikes, and distinguish between genuine intruders and nuisance alarms,” he says. The RAPID REDFIBER PoE module uses an event code that quickly transmits the alarm or event to the VMS software. As RAPID REDFIBER’s detection system sense an intrusion, the APU activates IP cameras to automatically record an event; whilst the VMS platform ensures any untoward activity can be acted upon immediately. “RAPID REDFIBER’s proven high performance rate and low maintenance costs combine to create a very low cost of ownership, making it a reliable and economical solution,” Ricky concludes.
DSC, part of the Security Products business unit of Tyco, redefines intrusion security with the introduction of PowerSeries Neo, a new scalable commercial and residential line of products which combines the flexibility of a modular, hardwired system with the simplicity of a wide range of compatible wireless devices. This brand new and exceptionally flexible platform leverages the superior capabilities of PowerG – the industry’s leading-edge wireless intrusion technology, making it the most comprehensive hybrid intrusion system in the market today. PowerSeries Neo also offers both ‘smart’ home and ‘smart’ business automation features with Alarm.com interactive services. With solutions for a full spectrum of installations, the PowerSeries Neo system offers a fully customizable system with a range of control panels and PowerG-enabled, easy to install wireless devices. At the core of the system are four control panels, ranging in capacity from 16 to 128 zones and two to eight partitions. Each panel starts with six or eight hardwired inputs, 2-4 hardwired outputs and PTSN communication on-board, with the capability for expansion, additional features and services. PowerSeries Neo offers a full range of optional cellular and/or IP communication methods in support of the industry’s transition away from traditional phone lines. Infused with industry-leading PowerG 2-way wireless communication, the system is able to hop between wireless frequency channels so that if one is jammed, it will move to a free frequency. This allows for seamless, reliable communication between the control panel and devices. In addition, PowerSeries Neo allows for devices to continuously measure the communication quality and automatically sets transmission power to the minimum required for reliable communication with the panel, thereby saving energy and battery life. Solid encryption technology offers an exceptionally high level of protection by guarding against digital attacks on the system. The PowerSeries Neo platform is also primed to reduce the incremental costs of false alarms by employing innovative, regionally compliant alarm verification solutions such as visual verification, two-way audio and sequential detection, while also offering additional RMR opportunities to dealers. WebSA, a professional end user application that manages multiple systems, gives users the ability to manage, monitor and control the functionality of their PowerSeries Neo security system through the use of user-friendly, intuitive interfaces accessed with real-time dashboards. A robust and feature rich platform, PowerSeries Neo is designed to reduce operational costs for dealers and provide ultimate reliability for end users. PowerSeries Neo offers a variety of control panels, a full suite of compatible PowerG- enabled wireless devices to include a PIR motion detector with integrated camera, repeaters and glass break sensors and a complete line of expansion modules, protecting the investment and ensuring growth in the future.
DSC Touch, an innovative smart panel which provides customers with home management and interactive security capabilities in an all-in-one, intuitive and easy to use interface. Uniquely based on Google's Android operating system and integrated with Alarm.com, DSC Touch employs WiFi, Bluetooth and Z-Wave technology for a completely wire-free install and 'all-in-one' wireless communications. 7 inch LCD resistive, single touch, 24bit RGB TouchScreen with 800 x 480 resolution Compatible with DSC 433Mhz One-way wireless products Dual-path connectivity with integrated WiFi and Cellular WiFi, Z-Wave, Bluetooth and Image Sensor radio connectivity for smart home automation Up to 242 role-based user codes (Dealer, Installer, Master, User, Guest, Duress) Remote services powered by Alarm.com Built-in front 0.3MP Fixed Focus camera for system Disarm and Alarm photos Contact app provides contact info of security provider and displays messages. Built-in siren Built-in two-way voice Software updates over WiFi and manually with a SD card Photo frame screensaver SD card slot for photos
A panel of experts. Next-generation security and comfort management. With innovative intrusion technology and lifestyle management, Interlogix™ control panels and keypads provide reliable and scalable protection for homes and businesses. Wired and wireless options are designed for simple installation and operation, delivering complete protection and lifestyle enhancement.
Security at your Fingertips PowerSeries high-quality, slim-profile keypads achieve a clean, unobtrusive look that homeowners welcome and installers will appreciate for their easy programming and installation. The keypads feature an input/output terminal that can be programmed to operate as a zone input, programmable output or as a low temperature sensor. The keypads also include adjustable backlit keys that address low-light situations and five programmable keys for simple one button activation of system functions. Easy To Use To simplify usage, the keypads feature five programmable keys for easy one-button activation of system functions. The default tasks assigned to the five function keys are stay arming, away arming, door chime, smoke detector reset and quick exit. With the quick exit function there’s no need to disarm and rearm the system every time an occupant leaves the house or lets the dog out, for example. Flexibility The keypads’ integrated temperature sensor can be programmed to activate when room temperature dips below 43° F (6° C) and restores at 47° F (8° C). Built-in logic prevents the panel from cycling in and out of alarm mode during minor temperature fluctuations, helping to reduce false alarms.) Wireless Convenience RF versions of the keypads are available. They include all of the same features as their hardwired equivalents and are able to support 32 wireless zones and 16 wireless keys without taking up a wireless zone slot.
IMPASSA is the newest, next generation wireless security system from DSC. IMPASSA comes with the defense and offense needed to protect the ‘king’ – the home and homeowner - including: An integrated HSPA (3G) cellular communicator. The flexibility of a distributed wireless system. 2-way audio communication. Defensive Strategy - Integrated Cellular Communicator As any good chess player knows, looking many moves ahead is critical for a checkmate. As more homeowners transition away from traditional phone lines towards VoIP (Voice over IP) or mobile wireless phones for communication, IMPASSA delivers alternate communication configurations including: HSPA (3G) Cellular communicator using the cellular network. Label library. In addition, IMPASSA includes a more traditional phone line communicator using the Plain Old Telephone Systems (POTS). The Flexibility of a Distributed Wireless System Because IMPASSA is a distributed wireless system, installers have the flexibility of positioning the panel away from the premise’s entry point. A WT5500 Wireless wire-free keypad can be installed near the entry point so that even if the premise is compromised, the main unit (the IMPASSA panel) cannot be located by the intruder and tampered with. For additional protection, 2-way wireless sirens can be installed away from the IMPASSA alarm system to further camouflage and protect its location. 2-Way Audio Communication for Ultimate Peace of Mind Sometimes even the ‘king’ needs advice, help or reassurance. IMPASSA delivers 2-way audio (VOX only or VOX and push-to-talk) alarm communication with the central monitoring station during alarm events for the homeowner’s peace of mind. With high-quality speakers and microphones, homeowners can easily talk directly to the central monitoring station as needed.
Get Control on the Go with the nuLinc Cellular Communicator and LinearLinc Mobile App Bring mobile control to any monitored security system quickly and easily with new Cellular technology from Linear: the nuLinc™ Wireless Communicator and the LinearLinc™ web-based Mobile App. Wireless Convenience for Users: Home or business owners get seamless, flexible control of their security systems via smart phones or computers with Internet access, from virtually anywhere … and at a significant savings! Profit Center for Dealers and Central Stations: Earn monthly revenues for system management and monitoring, while saving your accounts the cost of infrequently-used telephone lines. Fast Installation: Installs quickly, with no on-site configuration required. Compatible with Many Alarm Brands and Cell Networks: nuLinc instantly transforms hard-wired phone line alarm systems to cellular! Supporting most common security industry standard protocols, nuLinc and LinearLinc give you control on the go. For details, see your Linear distributor or sales rep, or visit www.linearcorp.com/linearlinc.
Seamlessly integrating multiple security elements, the NetworX™ system delivers optimum security for current and future needs of your home or small business. Particularly well-suited for new construction, NetworX offers a wide selection of hard-wired security elements including keypad, motion sensors, glassbreak detectors, smoke detectors and magnetic contacts. For added convenience, NetworX has extensive wireless capabilities backed by expert technicians experienced in optimal system design. This system also easily integrates with many third-party control systems such as home automation, lighting, HVAC and audio. Complete with cellular backup, NetworX represents one of the most advanced, expandable and reliable security solutions available. Control PanelsWith a track record of global security success, the NetworX™ product line includes a series of control panels that are universally compatible with all NX products and several GE wired and wireless accessories that can be scaled or modified to meet changing security requirements. The control panel functions as the “brains” of your security system, coordinating input from different sensors and transmitting alarm monitoring information to a central monitoring center. Fully versatile, these control panels accommodate a variety of integrated components that allow you to customize, and easily expand your system to meet your security requirements. All NetworX control panels have fire alarm verification capability to help prevent false alarms. NX-4The NX-4 control panel is a flexible, entry-level security system that features advanced technology for the detection of burglary, fire and environmental events. A cost-effective solution that is easy to install, the NX-4 is ideal for apartments, smaller homes and commercial environments. Equipped with the standard four hard-wired zones, the NX-4 can easily expand to eight fully programmable hard-wired zones, eight wireless zones or a combination of both. NX-6The NX-6 is a full-featured system designed to handle most medium-sized residential and commercial applications. Like all NetworX control panels, its modular design allows for complete integration of multiple systems within one enclosure. In addition to the features found on the NX-4 model, the NX-6 comes standard with six hard-wired zones and can easily expand to 12 fully programmable hard-wired zones, 16 wireless zones or a combination of both. NX-8 and NX-8EThe NX-8 and NX-8E represent the top-of-the-line systems for the most demanding home and commercial security needs. These feature-rich units include all the capabilities of the NX-6 model with options to accommodate an extensive number of keypads and users.
Copper Cop from Linear safeguards commercial air conditioning (HVAC) units from costly theft and destruction of copper condenser lines. This simple, two-part system – alarm interconnect box and cable harness -- triggers an alarm if the cables are tampered with, or an HVAC cover is removed. Ideal for environments especially vulnerable to theft: Unoccupied buildings Schools Single-Story Retail Buildings Places of Worship Rural and vacant facilities Cellular Network Facilities/Towers Remote Communication Centers Substation Outbuildings Field-Proven, Effective Theft Deterrence Installs quickly on HVAC unit exterior by any security contractor and is activated in minutes. No HVAC, Plumber‘s or Electrician’s license required. Ready to accept a wireless alarm transmitter or hard-wired connection to any security alarm panel. Bright yellow cable harness acts as a visual deterrent to would-be thieves. Does not trigger a false alarm even if fluctuations in refrigerant pressure or electrical power outages occur Learn more: Watch the Copper Cop Video here
MotionCam is a wireless motion detector with visual alarm verification for indoor use. It operates for up to 4 years on bundled batteries, detects movement at up to 12 meters, ignores animals, but recognizes a human move instantly. MotionCam works within Ajax security systems, connecting to a hub through the two secure radio protocols. The detector uses Jeweller to transmit alarms and events, and Wings to transmit photos. Wireless coverage may reach up 1,700 m line-of-sight. The infrared sensor of MotionCam detects intrusion into the secured premises by identifying moving objects with a temperature close to that of the human body. The temperature compensation function makes the detector effective inside premises with temperature ranging from 0 to +40°C. If placed and adjusted properly, MotionCam ignores pets. When movement is detected, the armed detector instantly transmits an alarm signal to the hub. The hub activates the connected sirens and notifies the user and the security company. MotionCam uses Jeweller radio protocol to transmit alarms and events to the hub. The built-in MotionCam camera can take from 1 to 5 shots with the resolution of 320×240 and up to 3 shots with the resolution of 640×480 pixels. A series of photos is displayed in the app as an animation, so the user is able to evaluate the unfolding of the event over time. Photos are available both in Ajax apps and on the Central Monitoring Station software of the security company. MotionCam uses Wings radio protocol to transmit photos to the hub. The detector features infrared illumination for shooting in the dark, which is activated only when triggering.Add to Compare
ReX expands the boundaries of the protected area. The range extender controls the system devices connected to it enabling the user to place them at a considerable distance from the hub — in a high-rise office, in a detached garage or in a large production plant — while maintaining a stable connection. ReX acts as a reliable link between the hub and Ajax devices. Depending on the requirements, all detectors or only some of them can operate via the intelligent range extender. While regular range extenders represent the weakest link in the security systems increasing the risk of losing the alarm signal during transmission, ReX takes the reliability and resilience of Ajax to a new level. After the hub, ReX is the second decision-making center. It integrates detectors into an autonomous group within the system. If the connection with the hub is interrupted for some reason, ReX will assume control: it will receive an alarm signal from the detector and activate the siren to attract attention to the incident and scare off the burglar.
PIR Detectors, Dual Technology Detectors, Infra Red Beams, 15 m m coverage, 14 degree o detection angle, Microwave, Dual Element Sensor, 15 m, Temperature Compensation, Sealed Optics, Anti-Masking, 1.2 m, Independant Floating Thresholds (IFT), Outdoor, Wall, 9 ~ 16 V DC, 13.8 V DC, 188 x 84 x 77, -30 ~ +70 C (-22 ~ +158 F)Add to Compare
PIR Detectors, Dual Technology Detectors, 10 m coverage, 10 o detection angle, Microwave, Pet Tolerance, Dual Element Sensor, Temperature Compensation, Sealed Optics, Wall, Ceiling, 1.8 ~ 2.4 m, Wall, Ceiling, 117 x 69 x 59, -10 ~ +40 C (14 ~ 104 F)Add to Compare
PIR Detectors, Dual Technology Detectors, Infra Red Beams, 15 m coverage, 85 degrees o detection angle, Dual Element Sensor, Temperature Compensation, Sealed Optics, 1.8 ~ 2.4 m, Yes, White Light Filter, Wall, ceiling, 117 x 69 x 50, -30 ~ +70 C (-22 ~ +158 F)Add to Compare
Browse Intruder Detectors & Detection Systems
- PIR Detectors
- Glassbreak Detectors
- Infra Red Beams
- Shock Sensor
- Pet Tolerance
Intruder detector products updated recently
The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centers have become even more critical to modern society. The processing and storage of information underpin the economy, characterized by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centers classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cyber Security Centre (NCSC), and the Centre for the Protection of National Infrastructure (CPNI). As land continues to surge in value, data center operators are often limited for choice, on where they place their sites and are increasingly forced to consider developed areas, close to other infrastructures, such as housing or industrial sites. Complex security needs One misconception when it comes to data centers is that physical security is straightforward One misconception when it comes to data centers is that physical security is straightforward. However, in practice, things are far more complex. On top of protecting the external perimeter, thought must also be given to factors, such as access control, hostile vehicle mitigation (HVM), protecting power infrastructure, as well as standby generators and localizing security devices to operate independently of the main data center. Face value How a site looks is more important than you may think. Specify security that appears too hostile risks blatantly advertising that you’re protecting a valuable target, ironically making it more interesting to opportunistic intruders. The heightened security that we recommend to clients for these types of sites, include 4 m high-security fences, coils of razor wire, CCTV, and floodlighting. When used together in an integrated approach, it’s easy to see how they make the site appear hostile against its surroundings. However, it must appear secure enough to give the client peace of mind that the site is adequately protected. Getting the balance right is crucial. So, how do you balance security, acoustics and aesthetics harmoniously? Security comes first These are essential facilities and as a result, they require appropriate security investment. Cutting corners leads to a greater long-term expense and increases the likelihood of highly disruptive attacks. Checkpoints Fortunately, guidance is available through independent accreditations and certifications, such as the Loss Prevention Certification Board’s (LPCB) LPS 1175 ratings, the PAS 68 HVM rating, CPNI approval, and the police initiative - Secured by Design (SBD). Thorough technical evaluation and quality audit These bodies employ thorough technical evaluation work and rigorous quality audit processes to ensure products deliver proven levels of protection. With untested security measures, you will not know whether a product works until an attack occurs. Specifying products accredited by established bodies removes this concern. High maintenance Simply installing security measures and hoping for the best will not guarantee 24/7 protection. Just as you would keep computer software and hardware updated, to provide the best level of protection for the data, physical security also needs to be well-maintained, in order to ensure it is providing optimum performance. Importance of testing physical security parameters Inspecting the fence line may seem obvious and straightforward, but it needs to be done regularly. From our experience, this is something that is frequently overlooked. The research we conducted revealed that 63% of companies never test their physical security. They should check the perimeter on both sides and look for any attempted breaches. Foliage, weather conditions or topography changes can also affect security integrity. Companies should also check all fixtures and fittings, looking for damage and corrosion, and clear any litter and debris away. Accessibility When considering access control, speed gates offer an excellent solution for data centres. How quickly a gate can open and close is essential, especially when access to the site is restricted. The consequences of access control equipment failing can be extremely serious, far over a minor irritation or inconvenience. Vehicle and pedestrian barriers, especially if automated, require special attention to maintain effective security and efficiency. Volume control Data centers don’t generally make the best neighbors. The noise created from their 24-hour operation can be considerable. HVAC systems, event-triggered security and fire alarms, HV substations, and vehicle traffic can quickly become unbearable for residents. Secure and soundproof perimeter As well as having excellent noise-reducing properties, timber is also a robust material for security fencing So, how do you create a secure and soundproof perimeter? Fortunately, through LPS 1175 certification and CPNI approval, it is possible to combine high-security performance and up to 28dB of noise reduction capabilities. As well as having excellent noise-reducing properties, timber is also a robust material for security fencing. Seamlessly locking thick timber boards create a flat face, making climbing difficult and the solid boards prevent lines of sight into the facility. For extra protection, steel mesh can either be added to one side of the fence or sandwiched between the timber boards, making it extremely difficult to break through. A fair façade A high-security timber fence can be both, aesthetically pleasing and disguise its security credentials. Its pleasant natural façade provides a foil to the stern steel bars and mesh, often seen with other high-security solutions. Of course, it’s still important that fencing serves its primary purposes, so make sure you refer to certifications, to establish a product’s security and acoustic performance. Better protected The value of data cannot be overstated. A breach can have severe consequences for public safety and the economy, leading to serious national security implications. Countering varied security threats Data centers are faced with an incredibly diverse range of threats, including activism, sabotage, trespass, and terrorism on a daily basis. It’s no wonder the government has taken an active role in assisting with their protection through the medium of the CPNI and NCSC. By working with government bodies such as the CPNI and certification boards like the LPCB, specifiers can access a vault of useful knowledge and advice. This will guide them to effective and quality products that are appropriate for their specific site in question, ensuring it’s kept safe and secure.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organized, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognize the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.
Related white papers
Market Report: Cannabis At A Glance
Optimize Your Business with Analytics and AI
Choosing the Right Storage Technology for Video SurveillanceDownload
Video Surveillance As A Service: Why Are Video Management Systems Migrating to the Cloud?Download
Top 5 Ways to Ensure Visitor Safety and SecurityDownload
exacqVision 21.09 WebinarDownload
- TiOC 2.0: Customizable Security Alarm System Made Possible By Dahua
- HAECO Automates Its Tool Control For Aircraft Maintenance, Repair And Overhaul (MRO) Services With Xerafy's RFID Solution
- Ajax Protects The Vernadsky Research Base With Fire Detectors And Fire Alarm Systems
- Securiteam Designs Commercial Intrusion Solution For A Fortune 500 Company