Harper’s inner range control system includes access control as well as the control and monitoring of other devices on the same network
Harper Chalice also intends to launch its new inner range control system and GUI

Harper Chalice Group Limited, the UK's leading manufacturer of electronic and electrified perimeter security systems, will be exhibiting at IFSEC.

The company manufactures the UK’s most secure, independently-tested electrified perimeter security systems and will be showcasing a number of new products.

New products on display will include: the PulseSecure PROTECTOR PS752 fully monitored double pole high and low voltage perimeter security system; the SA1000 seismic analyser; and innovations in the FenceSecure and WallSecure perimeter intrusion detection systems.

Importantly, Harper Chalice will also be launching the Inner Range control system and graphic user interface, which offers users significant benefits for the control and monitoring of PulseSecure and FenceSecure systems. The Inner Range system gives the option of very easily including access control and the control and monitoring of other devices on the same network either via conventional keypads or graphic user interface.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...