SlideShare a Scribd company logo
1 of 33
Download to read offline
Integrated Perimeter Protection Solution
Integrated Perimeter
Protection Solution
• Operational Capabilities
• Activities & Functions
• Intrusion Detection
• Site Access Control
• Data Fusion- Recognition
• Command & Control Center
• Special Security Subsystem
CONTENTS
Operational Capabilities
Integrated Perimeter
Protection Solution
Operational Capabilities
Integrated Perimeter
Protection Solution
Starting from the objectives and through the application of proven methodology, a set of
micro capabilities have been defined.
Operational
Cpabilities
Intrusion Detection
Site Access Control
Local Area Surveillance
Data Collection & Fusion
Real-time Command & Control
Activities & Functions
Integrated Perimeter
Protection Solution
Activities & Functions
Integrated Perimeter
Protection Solution
Intrusion Detection
Integrated Perimeter
Protection Solution
Intrusion Detection
Integrated Perimeter
Protection Solution
Protected
Area
Site Access Control
Active Barriers +
Intelligent CCTV
Perimeter
Fencing
Leakage Cable Intrusion Probe
E-fence
CCTV with intelligent video analysis
Other sensors
The system comprises:
Intrusion Detection
Integrated Perimeter
Protection Solution
03 04
02
01
Perimeter Control Subsystem
• Function:
• Early detecting suspicious behavior or individuals about the border
• Forestalling and averting the damage or threat in advance
• Deterring illegal entry
 Product:
• Video monitoring system
• Leakage cable intrusion
• probe
• E-fence
• Infrared sensor
• Other sensor
Intrusion Detection
Integrated Perimeter
Protection Solution
Leakage Cable
Intrusion Probe
Intrusion Detection
Integrated Perimeter
Protection Solution
E-Fence System
Intrusion Detection
Integrated Perimeter
Protection Solution
No. Features of intelligent analysis
1 Enter the area
2 Place and pick up items
3 Leave the area
4 hang about
5 Regional invasion
6 Staff gathering
7 Parking
8 Fast moving
9 Counting people
10 Auto tracking
11 Recognition of the car plate
Intelligent Video Analysis Application
Intrusion Detection
Intelligent Video Analysis Application
Into Region Suspicious objects People gathering ILLEGAL PARKING
Integrated Perimeter
Protection Solution
Intrusion Detection
Integrated Perimeter
Protection Solution
Intelligent Video Analysis Application
Target HOVERING Counting people Regional invasion Intelligent
tracking
Site Access Control
Integrated Perimeter
Protection Solution
Site Access Control
Integrated Perimeter
Protection Solution
People scanning
Article scanning
Identity recognition
Barriers
The system comprises:
Site Access Control improves security
filtering people and goods
entering and leaving a site.
Site Access Control
Integrated Perimeter
Protection Solution
Smart Card Fingerprint Scanner
Function:
• Generating alarm automatically
• Displaying alarm information
• Generating time and attendance report
• Identifying authorized/authorized person
• Realizing classification management
• Tracking the very important person
Facial recognition System
CCTV Surveillance System Security Checking Equipment
Site Access Control
Integrated Perimeter
Protection Solution
* Architecture Schematic Diagram
Card Reader
Access Control Server
Entrance N
electro-
mechanical lock
Access
Controller
Card Reader
electro-
mechanical lock
Access
Controller
Switch Switch
Entrance Management
Computer
Entrance 1
Management Center
On-site
management
computer
LAN
Entrance Control Subsystem
Site Access Control
Integrated Perimeter
Protection Solution
Entrance Control Subsystem
Products
Fix focus video camera
Double-inspect detector
Access card reader
Emergency button
Site Access Control
Integrated Perimeter
Protection Solution
CCTV Subsystem
* Architecture Schematic Diagram:
Site Access Control
Integrated Perimeter
Protection Solution
Outdoor Speed Dome Semi Dome IP Camera Auto Focusing Camera Indoor Speed Dome
01 02 03 04 05 06
Outdoor Speed Dome
CCTV Subsystem
Products
Data Fusion-Recognition
Integrated Perimeter
Protection Solution
In a high complexity environments, the ability to correctly interpret collected data is determinant to
effectively face threats maximizing potential alarm detection.
Data Fusion-Recognition
Integrated Perimeter
Protection Solution
Information coming from a single source is sometimes incomplete, uncertain and ambiguous. Correlation
techniques enable to minimize the probability of lacked threat detection and false alarms.
Sensors Information
Leakage cable
E-fence
CCTV
Other sensors
Nothing
Nothing
Target detected
Video information
Data
Fusion
Collection
Correlation
Alarm
Use case:
Step 1: a site to protect (e.g. a base) is provided
of several types of sensors.
Step 2: every sensor collects different type of
information.
Step 3: information are elaborated by Data
Fusion.
Step 4: information are correlated
Step 5: the correlation of the different
information enables to identify correctly a
potential threat (alarm).
2 3
4
5
Command & Control Center
Integrated Perimeter
Protection Solution
C2 design and implementation is critical to guarantee effective and efficiency of any security
and defense solution.
Command & Control Center
Integrated Perimeter
Protection Solution
The Command & Control Center (C2) enables the real-time monitoring of all systems sites
and the management of the system resources in order to guarantee security and safety.
The Command & Control Center is the logical central
point of a distributed security and defense
architecture.
Information is collected and correlated to enable total
control of the target system and the management of
all the available resource to face any crisis or
emergency.
Special Security Subsystem
Integrated Perimeter
Protection Solution
Special Security Subsystem
Integrated Perimeter
Protection Solution
Text here
Special
Security
Subsystem
Portable video
transmission system
Moored balloon
monitoring system
Guard tour system
Security check device
Guard Tour Subsystem
Integrated Perimeter
Protection Solution
• Function:
• Recording the information of guard tour time/person and some
common issues
• Evaluating the performance of security person
• Management of safe guard tour and polling
 Product:
• Guard tour machine
• Personnel card
• Information button
Guard Tour Subsystem
Integrated Perimeter
Protection Solution
Using the guard tour machine
to collect the information
Receive the information from
information button
Mobile High-definition Video Transmission
Integrated Perimeter
Protection Solution
• Mobile High-definition Video Transmission System (Portable) :
• Adopting several advanced technology of 3G and B3G
mobile communication system
• Realizing real-time collection
– and transmission of
– high-definition video
– image and sound
Ballon Monitoring and Surveillance
Integrated Perimeter
Protection Solution
Night Time Balloon Day Time
Wide Coverage
Better low altitude performance
Camera
Radar
More waning and reaction time
High mobility payload
SECURITY
Integrated security & defends system
Please contact us
for more detail
The Art Of Innovation.
www.hermesys.it

More Related Content

Similar to Integrated-perimeter-protection-solution.pdf

0 safety presentation master v1
0 safety presentation master v10 safety presentation master v1
0 safety presentation master v1confidencial
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxPelorusTechnologies
 
Lidar based PIDS Solution 20181206
Lidar based PIDS Solution 20181206Lidar based PIDS Solution 20181206
Lidar based PIDS Solution 20181206Guisun Han
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
ATM - Banking Proposal
ATM - Banking ProposalATM - Banking Proposal
ATM - Banking ProposalJogesh Makwana
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideGlen Yi
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochurewilnet40
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
SecureIoT MVI use case pitch presentation
SecureIoT MVI use case pitch presentationSecureIoT MVI use case pitch presentation
SecureIoT MVI use case pitch presentationMariza Konidi
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios
 
Access control system
Access control systemAccess control system
Access control systemMatrix COSEC
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record itVideoIQ
 

Similar to Integrated-perimeter-protection-solution.pdf (20)

0 safety presentation master v1
0 safety presentation master v10 safety presentation master v1
0 safety presentation master v1
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
 
Lidar based PIDS Solution 20181206
Lidar based PIDS Solution 20181206Lidar based PIDS Solution 20181206
Lidar based PIDS Solution 20181206
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
ATM - Banking Proposal
ATM - Banking ProposalATM - Banking Proposal
ATM - Banking Proposal
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochure
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
SecureIoT MVI use case pitch presentation
SecureIoT MVI use case pitch presentationSecureIoT MVI use case pitch presentation
SecureIoT MVI use case pitch presentation
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Access control system
Access control systemAccess control system
Access control system
 
Secure you
Secure you Secure you
Secure you
 
Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record it
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 

Recently uploaded

定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 

Recently uploaded (20)

定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 

Integrated-perimeter-protection-solution.pdf

  • 2. Integrated Perimeter Protection Solution • Operational Capabilities • Activities & Functions • Intrusion Detection • Site Access Control • Data Fusion- Recognition • Command & Control Center • Special Security Subsystem CONTENTS
  • 4. Operational Capabilities Integrated Perimeter Protection Solution Starting from the objectives and through the application of proven methodology, a set of micro capabilities have been defined. Operational Cpabilities Intrusion Detection Site Access Control Local Area Surveillance Data Collection & Fusion Real-time Command & Control
  • 5. Activities & Functions Integrated Perimeter Protection Solution
  • 6. Activities & Functions Integrated Perimeter Protection Solution
  • 8. Intrusion Detection Integrated Perimeter Protection Solution Protected Area Site Access Control Active Barriers + Intelligent CCTV Perimeter Fencing Leakage Cable Intrusion Probe E-fence CCTV with intelligent video analysis Other sensors The system comprises:
  • 9. Intrusion Detection Integrated Perimeter Protection Solution 03 04 02 01 Perimeter Control Subsystem • Function: • Early detecting suspicious behavior or individuals about the border • Forestalling and averting the damage or threat in advance • Deterring illegal entry  Product: • Video monitoring system • Leakage cable intrusion • probe • E-fence • Infrared sensor • Other sensor
  • 10. Intrusion Detection Integrated Perimeter Protection Solution Leakage Cable Intrusion Probe
  • 12. Intrusion Detection Integrated Perimeter Protection Solution No. Features of intelligent analysis 1 Enter the area 2 Place and pick up items 3 Leave the area 4 hang about 5 Regional invasion 6 Staff gathering 7 Parking 8 Fast moving 9 Counting people 10 Auto tracking 11 Recognition of the car plate Intelligent Video Analysis Application
  • 13. Intrusion Detection Intelligent Video Analysis Application Into Region Suspicious objects People gathering ILLEGAL PARKING Integrated Perimeter Protection Solution
  • 14. Intrusion Detection Integrated Perimeter Protection Solution Intelligent Video Analysis Application Target HOVERING Counting people Regional invasion Intelligent tracking
  • 15. Site Access Control Integrated Perimeter Protection Solution
  • 16. Site Access Control Integrated Perimeter Protection Solution People scanning Article scanning Identity recognition Barriers The system comprises: Site Access Control improves security filtering people and goods entering and leaving a site.
  • 17. Site Access Control Integrated Perimeter Protection Solution Smart Card Fingerprint Scanner Function: • Generating alarm automatically • Displaying alarm information • Generating time and attendance report • Identifying authorized/authorized person • Realizing classification management • Tracking the very important person Facial recognition System CCTV Surveillance System Security Checking Equipment
  • 18. Site Access Control Integrated Perimeter Protection Solution * Architecture Schematic Diagram Card Reader Access Control Server Entrance N electro- mechanical lock Access Controller Card Reader electro- mechanical lock Access Controller Switch Switch Entrance Management Computer Entrance 1 Management Center On-site management computer LAN Entrance Control Subsystem
  • 19. Site Access Control Integrated Perimeter Protection Solution Entrance Control Subsystem Products Fix focus video camera Double-inspect detector Access card reader Emergency button
  • 20. Site Access Control Integrated Perimeter Protection Solution CCTV Subsystem * Architecture Schematic Diagram:
  • 21. Site Access Control Integrated Perimeter Protection Solution Outdoor Speed Dome Semi Dome IP Camera Auto Focusing Camera Indoor Speed Dome 01 02 03 04 05 06 Outdoor Speed Dome CCTV Subsystem Products
  • 23. In a high complexity environments, the ability to correctly interpret collected data is determinant to effectively face threats maximizing potential alarm detection. Data Fusion-Recognition Integrated Perimeter Protection Solution Information coming from a single source is sometimes incomplete, uncertain and ambiguous. Correlation techniques enable to minimize the probability of lacked threat detection and false alarms. Sensors Information Leakage cable E-fence CCTV Other sensors Nothing Nothing Target detected Video information Data Fusion Collection Correlation Alarm Use case: Step 1: a site to protect (e.g. a base) is provided of several types of sensors. Step 2: every sensor collects different type of information. Step 3: information are elaborated by Data Fusion. Step 4: information are correlated Step 5: the correlation of the different information enables to identify correctly a potential threat (alarm). 2 3 4 5
  • 24. Command & Control Center Integrated Perimeter Protection Solution
  • 25. C2 design and implementation is critical to guarantee effective and efficiency of any security and defense solution. Command & Control Center Integrated Perimeter Protection Solution The Command & Control Center (C2) enables the real-time monitoring of all systems sites and the management of the system resources in order to guarantee security and safety. The Command & Control Center is the logical central point of a distributed security and defense architecture. Information is collected and correlated to enable total control of the target system and the management of all the available resource to face any crisis or emergency.
  • 26. Special Security Subsystem Integrated Perimeter Protection Solution
  • 27. Special Security Subsystem Integrated Perimeter Protection Solution Text here Special Security Subsystem Portable video transmission system Moored balloon monitoring system Guard tour system Security check device
  • 28. Guard Tour Subsystem Integrated Perimeter Protection Solution • Function: • Recording the information of guard tour time/person and some common issues • Evaluating the performance of security person • Management of safe guard tour and polling  Product: • Guard tour machine • Personnel card • Information button
  • 29. Guard Tour Subsystem Integrated Perimeter Protection Solution Using the guard tour machine to collect the information Receive the information from information button
  • 30. Mobile High-definition Video Transmission Integrated Perimeter Protection Solution • Mobile High-definition Video Transmission System (Portable) : • Adopting several advanced technology of 3G and B3G mobile communication system • Realizing real-time collection – and transmission of – high-definition video – image and sound
  • 31. Ballon Monitoring and Surveillance Integrated Perimeter Protection Solution Night Time Balloon Day Time Wide Coverage Better low altitude performance Camera Radar More waning and reaction time High mobility payload
  • 32. SECURITY Integrated security & defends system Please contact us for more detail
  • 33. The Art Of Innovation. www.hermesys.it