SlideShare a Scribd company logo
1 of 32
G–MAX Security Tech Ltd.
G-Max Security has been
Developing, Manufacturing
and Marketing the world's
most advanced and complete
line of Perimeter Intrusion
Detection Systems
G-MAX PRODUCTS
Fence Intrusion
Detection Systems
Solar Panels
Underground Intrusion
Detection Systems
Integrated Command &
Control Center
Underwater Intrusion
Detection Systems
Access Control System
Pipeline
Video& Safe City
Systems
Unique G-max System Unique G-max System Unique G-max System Unique G-max System
Unique G-max System Unique G-max System
Supersensor Intrusion
Detection Systems
Principle of operation
A unique sensor system to detect
movement, cutting or deformation
using 2 copper cables to analyze
changes in the flow of power.
Attributes
Sensor cable with high flexibility of
installation allowing installation on
almost any existing fence.
Supersensor Intrusion
Detection Systems
Operational Advantages
• Low maintenance
• Highly durable
• Flexible security solutions
against digging, jumping
• Ability to cover difficult areas
of protection
• In the case of sabotage the
sensor cable is simple to repair
• Very low false alarm rate
• Does not require a dedicated
fence, can be installed on almost
any existing fence
Supersensor Intrusion
Detection Systems
Additional Applications
• Create alert treading area
• Create excavation discovery
Zone
• The cable can be buried to
prevent tunnel digging
instead of concrete beam
Supersensor Intrusion
Detection Systems
Experience & Installations
Over 20 years of operational use
• U.S. federal prisons
• Hungarian army
• 2004 Summer Olympics - Greece
• Russia- Gazprom industrial facitilies
• Korean Ministry of Defense
• Research institutions in florida
• Other sites can be provided if
needed…
IVS-R123 Fence
Detection Systems
Principle of operation
Attributes
The IV Sensor is fastened to the
fence, sensing the vibration
electronic signals from the advance
sensors Transducers, (with no
moving parts.
Attributes
G-Max-IVS provides excellent
detection system with resolution of 3
meters (10 ft.).
IVS-R123 Fence
Detection Systems
Operational Advantages
• Locating resolution of 3 meters.
• Adjustable sensitivity per sensor.
• Software based zoning.
• Very low False Alarm Rate (FAR).
• Easy-to-install and integrate.
• Easy Linked to existing alarm panel.
• Adaptable to most types of existing
fences or wall.
• Detection and location of
simultaneous multiple intrusions
UPDS Underground
Intrusion Detection Systems
Principle of operation
Concealed sensor based on magnetic-
technology. "Virtual fence" armed
penetrate detection
(armed burglar or whit tools)
Attributes
The system creates a “virtual fence”
3 meters high and 3 meters depth. It
is based on mapping of the magnetic
flux of the Earth which is not affected
by the movement of animals and
changes or growth of vegetation
UPDS Underground
Intrusion Detection Systems
Operational Advantages
• Installation under any substrate:
soil, concrete, asphalt, water,
snow, ice, seawater
• Unaffected by animals,
vegetation, rain, snow, fog
• Highly durable
• Low false alarm rate
• Fully concealed & passive
• Simple to install
• Intrusion location & direction
• Low maintenance costs
UPDS Underground
Intrusion Detection Systems
Additional applications
Protective concrete walls with
additional 2 feet of virtual fence
by integrating the system into the
concrete casting or installing on
existing wall
UPDS Underground
Intrusion Detection Systems
Experience & Installations
Over 20 years of operational use
• US bases in Europe
• India Pakistan border
• 2004 Summer Olympics - Greece
• Leningrad NPP
• British Petroleum oil company
• US Air Force Base in Florida
• Other sites can be provided if
needed…
G-Sensor Seismic
Intrusion Detection Systems
Principle of operation
G-Max G-Sensor is an advanced
underground seismic intrusion
detection system, offers a reliable, cost
effective solution to intrusion detection
needs for different terrains.
G-Sensor Seismic
Intrusion Detection Systems
Operational Advantages
• Accurate detection to within just
few meters
• Adjustable sensitivity per sensor
• Software based zoning
• Very low False Alarm Rate (FAR)
• Easy-to-install and integrate
• Easy Linked to existing alarm panel
• Simple integration with security
management system
• Detection and location of
simultaneous multiple intrusions
Marine sensor Intrusion
Detection Systems
Principle of operation (First Defense Line )
Underwater magnetic system UPDS based
Operational Advantages
• Very low false alarm rate
• Intrusion location & direction
• Fully concealed & passive
• Detect on Shallow water & Divers who
dive near the canal wall
• Perfect perimeter security solution in
places that the sonar systems are
limited
Marine sensor Intrusion
Detection Systems
Principle of operation (Second Defense Line )
Based on SUPER SENSOR technology
Operational Advantages
• No false alarm
• Low maintenance costs
• Designed for medium- to high security risk
installations
• Any attempt to cut, lift, climb over, crawl under or
pass through the Sensor Cable-Net will trigger an
Alarm
• Perfect perimeter security solution for: Naval Bases,
Power Stations, Harbors and Ports, Offshore Oil Rigs,
Underwater pipelines and Cables and Aquaculture
and Beaches
Marine sensor Intrusion
Detection Systems
Experience & Installations
Over 20 years of operational use .
• Saint Petersburg port
• South Africa -Ministry of Defense
• G-8 in Russia
• Nuclear cooling channels
• Other sites can be provided if
needed…
PIPELINE SYSTEM
Principle of operation
Unique sensor system based on
UPDS magnetic technology,
Continuous Temperature Sensor and
an Acoustic sensor, to protect oil and
gas pipelines
Attributes
The system creates a “virtual
detection area” with a two meter
radius to detect excavation or
sabotage attempts. The system can
also detect leakage in an oil or gas
pipeline.
PIPELINE SYSTEM
Operational Advantages
• Unaffected by any substrate: soil,
concrete, asphalt, water, snow, ice,
seawater
• Unaffected by animals, vegetation,
rain, snow
• Highly durable
• Very low false alarm rate
• Fully concealed & passive
• Intrusion location
• Low maintenance costs
• Not affected by RF noise
Pipe Line 2 Zone of 200m
Solar panels protecting
Principle of operation
• Based on SUPER SENSE technology
• Any attempt to disconnect the
physical connection of the sensor
cable from the panels or tearing will
result in an alert
Attributes
Flexibility in sensor cable allows the
cable shielding three points - Arrival
key protection level 3, Give an alarm
at the beginning of the theft process
Solar panels protecting
Operational Advantages
• No false alarm
• Low maintenance costs
• High Installation life time
• There is no limit for repairs
• No problem replacing panels
Installations
• Solar farms Arison Group
• Solar farms Doral Group
• Nationwide deployment of solar farms
in kibbutzim
• Solar farms Amber Group
• Other sites can be provided if needed…
Integrated Command and
Control Center
Principle of operation
Computerized control room with high
operating flexibility, suitable for large
and small systems .
Attributes
The system controls and makes
integration of various systems such as
security events, video, access control,
in low benefit-cost.
Integrated Command and
Control Center
Operational Advantages
• High elasticity solution, the customer can
make changes in system configuration
• Allows integration with external systems.
• Simple operation with the possibility of
dictating the moves in events
• Cost-effective
Experience & Installations
Over 20 years of operational use .
• Cyprus- Dhekelia power station
• Chinese embassy site in Namibia
• 2004 Summer Olympics - Greece
• Austrian Air Force
• Other sites can be provided if needed…
G-Max CCTV Security
Solution
Analytical video systems
• All types of H.264 & MPEG-4 IP
Cameras, Megapixel and real time full
HD
• Stand alone and blades H.264 IP
Encoders and decoders
• External H.264 video compression rack
enclosure
• Robust, High Video Quality
• Products come fully equipped with our
unique Primary Video Analytics
package, giving customers an
introductory set of analytical functions
G-Max Safe City Security
Solution
Typical Safe City Post
• Wireless or wired
• Can be solar powered
• Video analytics , PTZ or fix cameras
• Public address system
• Microphone to listen to the scene
• Equipment connection option alert
earthquakes
• Control multiple panic buttons
• Remote operation of devices (signs…)
• Communication with smart systems
• Collecting events / data on site
G-Max Safe City Security
Solution
Video Analytics
Up to 4 cameras on post
• People running detection
• Points hot crowd detection
• Enter and exit
• Stopping detection
• Removable objects detection
• Counting people
• Parking in prohibited areas detection
• Fire and smoke detection
• PTZ auto tracking
• PTZ manual tracking
G-Max Access Control
Solution
Access Control Systems
• Modular controller design
• Handles up to 5,000/20,000 cardholders
• Expandability across thousands of doors
• Multiple proximity and magnetic strip access
control readers to choose from
• Real-time alarm & event monitoring
• Live CCTV alarm/event integration
Operational Advantages
• Semi on line & full on line
• TcpIp or serial
• Integrated system
Our systems protect hundreds
of sites worldwide
Power stations Prisons Oil refineries International
borders
Government
facilities
Airports Nuclear
stations
Pipeline Shoreline &
Marine
Many other
civil and
military
facilities.
World Wide Activity
THE END
Contact Us:
Phone- 972-8-8594664
Mobile- Sali- 972-54-6958888
web- http://www.outdoor-perimeter-security.com
Mail- Sali@g-max-security.com

More Related Content

What's hot

Fundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm SystemFundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm SystemSabrul Jamil
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12IPPAI
 
Presentation on a CCTV Security System.
Presentation on a CCTV Security System.Presentation on a CCTV Security System.
Presentation on a CCTV Security System.Istiaque Ahmed
 
Fire alarm , detection and suppression system
Fire alarm , detection and suppression systemFire alarm , detection and suppression system
Fire alarm , detection and suppression systemKamran Hassan
 
IP CCTV Introduction
IP CCTV IntroductionIP CCTV Introduction
IP CCTV Introductionmartynk
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSJithin Prasad
 
Fire detectors - Aspiratory smoke detector
Fire detectors - Aspiratory smoke detectorFire detectors - Aspiratory smoke detector
Fire detectors - Aspiratory smoke detectorKamran Hassan
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera PresentationBasith JM
 
Home security
Home securityHome security
Home securitynewaz30
 
very early smoke detection apparatus system - Vesda
very early smoke detection apparatus system - Vesdavery early smoke detection apparatus system - Vesda
very early smoke detection apparatus system - VesdaKamran Hassan
 
Vehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmVehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmanita maharjan
 
Fire Detection and Alarm Systems
Fire Detection and Alarm SystemsFire Detection and Alarm Systems
Fire Detection and Alarm SystemsJ.T.A.JONES
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video SurveillanceMihika Shah
 
Shri pps
Shri ppsShri pps
Shri ppslshri
 
Internet of Things - An Analysis of Smart Buildings
Internet of Things - An Analysis of Smart BuildingsInternet of Things - An Analysis of Smart Buildings
Internet of Things - An Analysis of Smart BuildingsGopalakrishnan Krishnan
 

What's hot (20)

Fundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm SystemFundamental training on Fire Detection & Alarm System
Fundamental training on Fire Detection & Alarm System
 
Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12Fft perimeter intrusion_detection_-_iaa_jan12
Fft perimeter intrusion_detection_-_iaa_jan12
 
Presentation on a CCTV Security System.
Presentation on a CCTV Security System.Presentation on a CCTV Security System.
Presentation on a CCTV Security System.
 
Smart Buildings & IoT
Smart Buildings & IoTSmart Buildings & IoT
Smart Buildings & IoT
 
Fire alarm , detection and suppression system
Fire alarm , detection and suppression systemFire alarm , detection and suppression system
Fire alarm , detection and suppression system
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
IP CCTV Introduction
IP CCTV IntroductionIP CCTV Introduction
IP CCTV Introduction
 
Accident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMSAccident messaging system using GPS,GSM and MEMS
Accident messaging system using GPS,GSM and MEMS
 
VESDA
VESDAVESDA
VESDA
 
Fire detectors - Aspiratory smoke detector
Fire detectors - Aspiratory smoke detectorFire detectors - Aspiratory smoke detector
Fire detectors - Aspiratory smoke detector
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Home security
Home securityHome security
Home security
 
very early smoke detection apparatus system - Vesda
very early smoke detection apparatus system - Vesdavery early smoke detection apparatus system - Vesda
very early smoke detection apparatus system - Vesda
 
Vehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsmVehicle tracking system using gps and gsm
Vehicle tracking system using gps and gsm
 
Fire Detection and Alarm Systems
Fire Detection and Alarm SystemsFire Detection and Alarm Systems
Fire Detection and Alarm Systems
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video Surveillance
 
Shri pps
Shri ppsShri pps
Shri pps
 
Internet of Things - An Analysis of Smart Buildings
Internet of Things - An Analysis of Smart BuildingsInternet of Things - An Analysis of Smart Buildings
Internet of Things - An Analysis of Smart Buildings
 
Surveillance Camera
Surveillance CameraSurveillance Camera
Surveillance Camera
 

Similar to Perimeter Intrusion Detection System | PIDS | GMAX

CorporateJan2016
CorporateJan2016CorporateJan2016
CorporateJan2016Mike Foley
 
Syngenta solar power fencing by blaze automation
Syngenta solar power fencing by blaze automationSyngenta solar power fencing by blaze automation
Syngenta solar power fencing by blaze automationBlaze_Hyd
 
Photovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant securityPhotovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant securityLeonardo ENERGY
 
Security telecoms 2015 short
Security telecoms 2015 shortSecurity telecoms 2015 short
Security telecoms 2015 shortJohn Jeffers
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutionsbappyni
 
Bits pilani solar power fencing by blaze automation
Bits pilani solar power fencing by blaze automationBits pilani solar power fencing by blaze automation
Bits pilani solar power fencing by blaze automationBlaze_Hyd
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusEngi Admi
 
Sunstone Technologies
Sunstone TechnologiesSunstone Technologies
Sunstone TechnologiesSimon Legrand
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemJoseph Garcia
 
Internet of Things - Feuerlabs, Omnisense and Silent Sensors
Internet of Things - Feuerlabs, Omnisense and Silent SensorsInternet of Things - Feuerlabs, Omnisense and Silent Sensors
Internet of Things - Feuerlabs, Omnisense and Silent SensorsMarcus Taylor
 
Secure and safe monitor ur hazard plant with Link-vue System
Secure and safe monitor ur hazard  plant  with Link-vue SystemSecure and safe monitor ur hazard  plant  with Link-vue System
Secure and safe monitor ur hazard plant with Link-vue SystemMahesh Chandra Manav
 
ENVIROMUX_GMV_PresentationV8_NL
ENVIROMUX_GMV_PresentationV8_NLENVIROMUX_GMV_PresentationV8_NL
ENVIROMUX_GMV_PresentationV8_NLAryo Swastiko
 
RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...
RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...
RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...RealTrac International
 
Perimeter control for prison
Perimeter control for prisonPerimeter control for prison
Perimeter control for prisonHafiza Abas
 
RDL//Vibe remote vibration monitoring system
RDL//Vibe remote vibration monitoring systemRDL//Vibe remote vibration monitoring system
RDL//Vibe remote vibration monitoring systemCaption Data Limited
 
Fire Alarm ... Design, Components, Applications
Fire Alarm ... Design, Components, ApplicationsFire Alarm ... Design, Components, Applications
Fire Alarm ... Design, Components, ApplicationsMohamed Gamal
 

Similar to Perimeter Intrusion Detection System | PIDS | GMAX (20)

CorporateJan2016
CorporateJan2016CorporateJan2016
CorporateJan2016
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 
Syngenta solar power fencing by blaze automation
Syngenta solar power fencing by blaze automationSyngenta solar power fencing by blaze automation
Syngenta solar power fencing by blaze automation
 
Photovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant securityPhotovoltaic Training Course - Module 3.4 - plant security
Photovoltaic Training Course - Module 3.4 - plant security
 
Security telecoms 2015 short
Security telecoms 2015 shortSecurity telecoms 2015 short
Security telecoms 2015 short
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutions
 
Bits pilani solar power fencing by blaze automation
Bits pilani solar power fencing by blaze automationBits pilani solar power fencing by blaze automation
Bits pilani solar power fencing by blaze automation
 
Mesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGeniusMesh Surveillance Camera | EnGenius
Mesh Surveillance Camera | EnGenius
 
Sunstone Technologies
Sunstone TechnologiesSunstone Technologies
Sunstone Technologies
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security System
 
Internet of Things - Feuerlabs, Omnisense and Silent Sensors
Internet of Things - Feuerlabs, Omnisense and Silent SensorsInternet of Things - Feuerlabs, Omnisense and Silent Sensors
Internet of Things - Feuerlabs, Omnisense and Silent Sensors
 
Secure and safe monitor ur hazard plant with Link-vue System
Secure and safe monitor ur hazard  plant  with Link-vue SystemSecure and safe monitor ur hazard  plant  with Link-vue System
Secure and safe monitor ur hazard plant with Link-vue System
 
ENVIROMUX_GMV_PresentationV8_NL
ENVIROMUX_GMV_PresentationV8_NLENVIROMUX_GMV_PresentationV8_NL
ENVIROMUX_GMV_PresentationV8_NL
 
Application oriented products by Leelavati Automation Pvt Ltd
Application oriented products by Leelavati Automation Pvt Ltd Application oriented products by Leelavati Automation Pvt Ltd
Application oriented products by Leelavati Automation Pvt Ltd
 
Wireless presentation
Wireless presentationWireless presentation
Wireless presentation
 
RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...
RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...
RealTrac Underground Mining the Scalable Safety and Monitoring System for Und...
 
GROUP-03.pptx
GROUP-03.pptxGROUP-03.pptx
GROUP-03.pptx
 
Perimeter control for prison
Perimeter control for prisonPerimeter control for prison
Perimeter control for prison
 
RDL//Vibe remote vibration monitoring system
RDL//Vibe remote vibration monitoring systemRDL//Vibe remote vibration monitoring system
RDL//Vibe remote vibration monitoring system
 
Fire Alarm ... Design, Components, Applications
Fire Alarm ... Design, Components, ApplicationsFire Alarm ... Design, Components, Applications
Fire Alarm ... Design, Components, Applications
 

Recently uploaded

Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Recently uploaded (20)

Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Perimeter Intrusion Detection System | PIDS | GMAX

  • 1. G–MAX Security Tech Ltd. G-Max Security has been Developing, Manufacturing and Marketing the world's most advanced and complete line of Perimeter Intrusion Detection Systems
  • 2. G-MAX PRODUCTS Fence Intrusion Detection Systems Solar Panels Underground Intrusion Detection Systems Integrated Command & Control Center Underwater Intrusion Detection Systems Access Control System Pipeline Video& Safe City Systems Unique G-max System Unique G-max System Unique G-max System Unique G-max System Unique G-max System Unique G-max System
  • 3. Supersensor Intrusion Detection Systems Principle of operation A unique sensor system to detect movement, cutting or deformation using 2 copper cables to analyze changes in the flow of power. Attributes Sensor cable with high flexibility of installation allowing installation on almost any existing fence.
  • 4. Supersensor Intrusion Detection Systems Operational Advantages • Low maintenance • Highly durable • Flexible security solutions against digging, jumping • Ability to cover difficult areas of protection • In the case of sabotage the sensor cable is simple to repair • Very low false alarm rate • Does not require a dedicated fence, can be installed on almost any existing fence
  • 5. Supersensor Intrusion Detection Systems Additional Applications • Create alert treading area • Create excavation discovery Zone • The cable can be buried to prevent tunnel digging instead of concrete beam
  • 6. Supersensor Intrusion Detection Systems Experience & Installations Over 20 years of operational use • U.S. federal prisons • Hungarian army • 2004 Summer Olympics - Greece • Russia- Gazprom industrial facitilies • Korean Ministry of Defense • Research institutions in florida • Other sites can be provided if needed…
  • 7. IVS-R123 Fence Detection Systems Principle of operation Attributes The IV Sensor is fastened to the fence, sensing the vibration electronic signals from the advance sensors Transducers, (with no moving parts. Attributes G-Max-IVS provides excellent detection system with resolution of 3 meters (10 ft.).
  • 8. IVS-R123 Fence Detection Systems Operational Advantages • Locating resolution of 3 meters. • Adjustable sensitivity per sensor. • Software based zoning. • Very low False Alarm Rate (FAR). • Easy-to-install and integrate. • Easy Linked to existing alarm panel. • Adaptable to most types of existing fences or wall. • Detection and location of simultaneous multiple intrusions
  • 9. UPDS Underground Intrusion Detection Systems Principle of operation Concealed sensor based on magnetic- technology. "Virtual fence" armed penetrate detection (armed burglar or whit tools) Attributes The system creates a “virtual fence” 3 meters high and 3 meters depth. It is based on mapping of the magnetic flux of the Earth which is not affected by the movement of animals and changes or growth of vegetation
  • 10. UPDS Underground Intrusion Detection Systems Operational Advantages • Installation under any substrate: soil, concrete, asphalt, water, snow, ice, seawater • Unaffected by animals, vegetation, rain, snow, fog • Highly durable • Low false alarm rate • Fully concealed & passive • Simple to install • Intrusion location & direction • Low maintenance costs
  • 11. UPDS Underground Intrusion Detection Systems Additional applications Protective concrete walls with additional 2 feet of virtual fence by integrating the system into the concrete casting or installing on existing wall
  • 12. UPDS Underground Intrusion Detection Systems Experience & Installations Over 20 years of operational use • US bases in Europe • India Pakistan border • 2004 Summer Olympics - Greece • Leningrad NPP • British Petroleum oil company • US Air Force Base in Florida • Other sites can be provided if needed…
  • 13. G-Sensor Seismic Intrusion Detection Systems Principle of operation G-Max G-Sensor is an advanced underground seismic intrusion detection system, offers a reliable, cost effective solution to intrusion detection needs for different terrains.
  • 14. G-Sensor Seismic Intrusion Detection Systems Operational Advantages • Accurate detection to within just few meters • Adjustable sensitivity per sensor • Software based zoning • Very low False Alarm Rate (FAR) • Easy-to-install and integrate • Easy Linked to existing alarm panel • Simple integration with security management system • Detection and location of simultaneous multiple intrusions
  • 15. Marine sensor Intrusion Detection Systems Principle of operation (First Defense Line ) Underwater magnetic system UPDS based Operational Advantages • Very low false alarm rate • Intrusion location & direction • Fully concealed & passive • Detect on Shallow water & Divers who dive near the canal wall • Perfect perimeter security solution in places that the sonar systems are limited
  • 16. Marine sensor Intrusion Detection Systems Principle of operation (Second Defense Line ) Based on SUPER SENSOR technology Operational Advantages • No false alarm • Low maintenance costs • Designed for medium- to high security risk installations • Any attempt to cut, lift, climb over, crawl under or pass through the Sensor Cable-Net will trigger an Alarm • Perfect perimeter security solution for: Naval Bases, Power Stations, Harbors and Ports, Offshore Oil Rigs, Underwater pipelines and Cables and Aquaculture and Beaches
  • 17. Marine sensor Intrusion Detection Systems Experience & Installations Over 20 years of operational use . • Saint Petersburg port • South Africa -Ministry of Defense • G-8 in Russia • Nuclear cooling channels • Other sites can be provided if needed…
  • 18. PIPELINE SYSTEM Principle of operation Unique sensor system based on UPDS magnetic technology, Continuous Temperature Sensor and an Acoustic sensor, to protect oil and gas pipelines Attributes The system creates a “virtual detection area” with a two meter radius to detect excavation or sabotage attempts. The system can also detect leakage in an oil or gas pipeline.
  • 19. PIPELINE SYSTEM Operational Advantages • Unaffected by any substrate: soil, concrete, asphalt, water, snow, ice, seawater • Unaffected by animals, vegetation, rain, snow • Highly durable • Very low false alarm rate • Fully concealed & passive • Intrusion location • Low maintenance costs • Not affected by RF noise
  • 20. Pipe Line 2 Zone of 200m
  • 21. Solar panels protecting Principle of operation • Based on SUPER SENSE technology • Any attempt to disconnect the physical connection of the sensor cable from the panels or tearing will result in an alert Attributes Flexibility in sensor cable allows the cable shielding three points - Arrival key protection level 3, Give an alarm at the beginning of the theft process
  • 22. Solar panels protecting Operational Advantages • No false alarm • Low maintenance costs • High Installation life time • There is no limit for repairs • No problem replacing panels Installations • Solar farms Arison Group • Solar farms Doral Group • Nationwide deployment of solar farms in kibbutzim • Solar farms Amber Group • Other sites can be provided if needed…
  • 23. Integrated Command and Control Center Principle of operation Computerized control room with high operating flexibility, suitable for large and small systems . Attributes The system controls and makes integration of various systems such as security events, video, access control, in low benefit-cost.
  • 24. Integrated Command and Control Center Operational Advantages • High elasticity solution, the customer can make changes in system configuration • Allows integration with external systems. • Simple operation with the possibility of dictating the moves in events • Cost-effective Experience & Installations Over 20 years of operational use . • Cyprus- Dhekelia power station • Chinese embassy site in Namibia • 2004 Summer Olympics - Greece • Austrian Air Force • Other sites can be provided if needed…
  • 25. G-Max CCTV Security Solution Analytical video systems • All types of H.264 & MPEG-4 IP Cameras, Megapixel and real time full HD • Stand alone and blades H.264 IP Encoders and decoders • External H.264 video compression rack enclosure • Robust, High Video Quality • Products come fully equipped with our unique Primary Video Analytics package, giving customers an introductory set of analytical functions
  • 26. G-Max Safe City Security Solution Typical Safe City Post • Wireless or wired • Can be solar powered • Video analytics , PTZ or fix cameras • Public address system • Microphone to listen to the scene • Equipment connection option alert earthquakes • Control multiple panic buttons • Remote operation of devices (signs…) • Communication with smart systems • Collecting events / data on site
  • 27. G-Max Safe City Security Solution Video Analytics Up to 4 cameras on post • People running detection • Points hot crowd detection • Enter and exit • Stopping detection • Removable objects detection • Counting people • Parking in prohibited areas detection • Fire and smoke detection • PTZ auto tracking • PTZ manual tracking
  • 28. G-Max Access Control Solution Access Control Systems • Modular controller design • Handles up to 5,000/20,000 cardholders • Expandability across thousands of doors • Multiple proximity and magnetic strip access control readers to choose from • Real-time alarm & event monitoring • Live CCTV alarm/event integration Operational Advantages • Semi on line & full on line • TcpIp or serial • Integrated system
  • 29.
  • 30. Our systems protect hundreds of sites worldwide Power stations Prisons Oil refineries International borders Government facilities Airports Nuclear stations Pipeline Shoreline & Marine Many other civil and military facilities.
  • 32. THE END Contact Us: Phone- 972-8-8594664 Mobile- Sali- 972-54-6958888 web- http://www.outdoor-perimeter-security.com Mail- Sali@g-max-security.com