private residence complex security. technical solutions

Post on 08-Dec-2014

495 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

SIS Group offers complex security systems for your private residence. Perimeter security. Information security. Anty-spying technologies.

TRANSCRIPT

1

PRIVATE RESIDENCE COMPLEX SECURITY. Technical solutions

SIS Group International

Threat…

2

Possibility to purchase modern weapon

Criminal world having plenty of money

Severe competition

Busy local law enforcement bodies

3

As the experts put it: nowadays criminal acts

• are prepared at high professional level,

• usually have a system approach,• are often committed with

cruelty.

4

The security service must always be alert. We will equip them with modern technologies!

WHO will attack?

WHENwill attack?

HOWwill attack?

WHEREwill attack?

5

You suppose that you are safe?Wу will equip you security service with

the latest technologies.

6

SIS Group offers

Complex Technical Solution

for the security of your residence

Running peculiarities of the residence

Location of the residence

Environment peculiarities of the residence

Hardware

Software

7

2 security barriers at the approaches 1) Exterior perimeter protection2) Video surveillance with video analytics

Interior territory surveillance• Private zones

Construction safety• Rooms safety• Access restriction• Video surveillance

Complex technical solution for the security of your residence

8

Security barriers at the approaches

Video surveillance with video analytics

Perimeter safety

9

Interior territory surveillance

Construction safety

Безопасность на Внутренней территории

Private zones

10

Trespassing

theft

burglary

special appliances planting for further information retrieval

bodily injury

assassination

11

Solution:Video surveillance and perimeter defense

complex system

Video surveillance system

Infrared band reveals Cars at up to 5.5 km distance, People at up to 2 km distance.Visible band reveals Cars at up to 9 km distance, People at up to 7 km distance.

Video analysis – automatic recognition of certain objects (transport, people) and their movement patterns.

• does not depend on operator’s attention, • increases the quality of the Security service,• saves money on Security service staff.

Are used together

Rules out the “human factor”

12

Vehicle passage attempt

explosives transportation

undesired vehicles

passage

13

Solution:Car and its underbody examination

•Underbody picture displaying

•Front picture displaying

•Number plate

•Date and time(all the parameters are adjustable)

• Automatic image comparison for repetitively passing cars.

• Actual and archived images comparison for the same car.

14

Eavesdropping

commercial information

obtaining

personal information

obtaining

15

Solution:Debugging systems

Portable debugging system

• Reveals concealed electronic devices (radio and video transmitters, Infrared radiators) indoors, in telephones, on people, etc.

• Tests telephone and electricity sockets, cables, suspicious wires.

• Reveals sound leakage spots – ventilation, pipes, etc. • Fins a place to locate acoustic disturbance generator.

Non-linear debugging system• Detects even switched off devices.

Acoustic disturbance generator • Blocks any radio transmitters work. • Creates a zone, within which no information transfer is

possible.

16

Illegal observation

commercial information

obtaining

personal information

obtaining

17

Solution:Concealed video cameras detection

Optical lens infrared detector • Detects concealed cameras installed secretly in

furniture, walls, etc.• The device amplitude is up to 20 m, the most

efficient amplitude is up to 6 m.• Detects optical devices (cameras, binoculars,

scope sights) at large distance – up to 1 km. • The lens is located at the binocular screen.• The device can be used with different lighting –

at bright day and at dark night.

18

Unauthorized information retrieval

commercial information

obtaining

personal information

obtaining

hostile programs planting

19

Solution:Reliable data storage

• Data safety at hard disk failure, power supply cut, etc.

• Passwords system for authorized access.

• Intrusion-via-the-Internet protection: antivirus software, Firewall, etc.

• Encryption.

20

«Human factor»

negligence

necessity to process

much information

tiredness

21

Solution:Unbiased monitoring system

• All information record-keeping.

• Video analysis that provides unbiased information about the object under observation.

22

Integrated technical center

Security systems

Engineering systems

23

SIS Group guarantees

1. Consulting

2. Engineering

3. Design

4. Procurement

5. Assembling

6. System launching

24

SIS Group experience

23 companies in 7 countries worldwide

Customers in East and West Europe, Asia, Africa

25

Our aim is: Foresee criminal intensions

and prevent intrusion!

26

Contacts

Andrei Ponomarev Chief Business Development Officer

Managing company of SIS Group Internationalul. Odoyevskogo, 131220015, Minsk, Belarus

Phone: +375 (17) 259 13 09Fax:     +375 (17) 259 13 00Mobile: +375 (29) 7600209E-mail: andrei.ponomarev@sis.com.by

www.sis-group.com

top related