SlideShare a Scribd company logo
ww.lixodex.com
ALWAYS KNOW
Lixodex provides layered wireless security information
throughout a dome in the private coverage area on
mobile phones and computer consoles, this means
receiving security information while in the security area or
while being somewhere else (on your mobile phone).
Security information is collected from multiple sensor
layers, including fence mounted intrusion sensors, field
distributed PIR (Passive Infrared) sensors that detect
movement on pathways - behind buildings etc., beams
(including infrared and laser), trip wires and GPS trackers
attached to assets inside the private coverage area and
outside using GSM tracking.
OVERVIEW
Lixodex © 2019 Lixodex © 2019
All sensors are installed according to GPS coordinates
allowing the Lixodex system to display their location on
Google Maps and Google Satellite Maps, indicating the
exact location of any alarm location, and can be easily
integrated with remote cameras and wireless surveillance
hubs to form a complete integrated surveillance solution
for visual confirmation of targets.
 
OVERVIEW (CONTINUED)
Lixodex © 2019
FENCE
Makes use of sensors and algorithms to detect movement on fences or any asset that should remain stationary. Fence
sensors are battery powered and can be installed anywhere, inside the coverage of the gateway radio, and then moved to
another location as part of a tactical plan, or, they can remain in the same location for years.
PASSIVE INFRARED
PIR works with batteries and connects to Lixodex Cloud server through the internet, this makes it easy to install PIR in
any place, inside the coverage of the gateway radio, and then move them. to the next place as part of a tactical
monitoring program, or, they can stay in the same location for years.
BEAM
Our innovative power-efficient wireless platform also has the intelligence to monitor different beam based systems and
connect them into the Google Maps based information system, collecting and displaying beam detected security
breach occurances.
TRIP WIRE
An extremely practical way of detecting movement along footpaths, monitor gates, keep tabs on items across the security area that should
not be moved or removed.
LIXODEX SENSORS
Lixodex © 2019
TRACK
Tracking assets across the security area could include the tracking of valuables such Televisions or the tracking of vehicles
that are used across the security campus, including golf carts, lawn maintenance equipment etc.
Passive Infrared Tactical Format
Trip Wire Tactical Format
SYSTEM COMPONENTS
The Lixodex system consists of the following components:
CLOUD BASED
SERVER
The Lixodex cloud based
hosted server displays
alarms on Google maps
while managing access
and security.
GATEWAYS
Our System connects through the internet to the
Lixodex Cloud based server on the one side making
use of ethernet, wifi, mobile data or satellite links; and
to the Lixodex sensors spread over the width and
breadth of the security area using a RF star topology. 
Multiple gateways assist in covering all parts of even
difficult terrain.
Gateways are powered through 220V, 12 volt or solar
power.
SENSORS
Lixodex sensors are RF
connected to Lixodex
Gateways, use wireless RF
communication and a
choice of long life
batteries..
Lixodex © 2019
INTEGRATION
Connecting With Other Systems
Lixodex has Programming Interfaces that allows the sending and receiving of
information to and from Lixodex and other security systems already employed.
Phone And Computer Access
Lixodex provides sensors monitors fences and assets against  unwanted intrusions and
movement in your residential estate, business park or farm.
 
Alarms are displayed on your mobile phone where you can see where unwanted
intrusions or movements take place using Google map satellite view.
Lixodex collects alarm conditions on a Cloud based server allowing you to view maps
and alarms from anywhere in the world while making use of a secure internet
connection.
The gateway radio that connects Lixodex sensor with the internet provides distance
coverage of up to 2 kilometers in urban built up areas and up to 10 km in open rural
areas.
Lixodex © 2019
LIXODEX PERMANENT AND TACTICAL DEPLOYMENT
Lixodex intrusion detection and surveillance systems are used for security monitoring
around permanent sites, semi-permanent sites, and mobile tactical deployments.  
This means that besides fixed installations, sensors and gateways can be quickly
deployed and then easily moved to another location where a threat needs to be
detected and deterred.
The system provides for wide terrain and perimeter intrusion detection, terrain
movement assessment, and surveillance using RF communication devices.
Lixodex © 2019
KEY BENEFITS
Our systems were designed with quality, and easy of use
and mind. The Lixodex system is intuitive, easy to install
and low maintenance.
- Early detection of intrusions and unwanted movement.
- A system that is customisable.
- Stringent Quality Assurance.
- Ease of installation.
- Cost Effective for both small and large applications.
- Simple and easy to use.
- Suitable for high security applications.
- Field proven reliability even in difficult environments. 
- Low nuisance alarm rate.
- Low maintenance.
Lixodex © 2019
Our team is made up of seasoned, South African
electronic engineers, with years in the security industry
which includes:
Experience since 1995 in designing and implementing
security systems for the South African Navy and Arms
Depots for the SADF. 
Our team have also developed a fiber optic perimeter
sensing solution. Our expert opinion is that these systems
are too expensive for most applications.
THE LIXODEX TEAM
Lixodex © 2019
ww.lixodex.co.za
TALK TO US
CONTACT US
083 407 6037
065 810 1874
THOMAS@LIXODEX.CO.ZA

More Related Content

What's hot

Presentation1
Presentation1Presentation1
Presentation1
Kp Gupta
 
border security using gsm
border security using gsmborder security using gsm
border security using gsmbharath naidu
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_webLorenzo Beccacece
 
E shri cctv pps
E shri cctv ppsE shri cctv pps
E shri cctv ppslshri
 
Vedard alarm company newsletter
Vedard alarm company newsletterVedard alarm company newsletter
Vedard alarm company newsletter
Vedard Security Alarm System Store
 
Ruckus Wireless ZoneDirector 5000 Product Card
Ruckus Wireless ZoneDirector 5000 Product CardRuckus Wireless ZoneDirector 5000 Product Card
Ruckus Wireless ZoneDirector 5000 Product Card
Purdicom
 
Bss seminar ppt
Bss seminar pptBss seminar ppt
Bss seminar ppt
mangal das
 
Wardriving 101
Wardriving 101Wardriving 101
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
Will Hatcher
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security System
Joseph Garcia
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
Sigfox
 
Ruckus Wireless ZoneDirector 3000 Product Card
Ruckus Wireless ZoneDirector 3000 Product CardRuckus Wireless ZoneDirector 3000 Product Card
Ruckus Wireless ZoneDirector 3000 Product Card
Purdicom
 
Emptyprop
EmptypropEmptyprop
Emptyprop
Ray Burnell
 
nquiring minds
nquiring mindsnquiring minds
nquiring minds
IoTUK
 
ConnectiKR0N - Presentation
ConnectiKR0N - PresentationConnectiKR0N - Presentation
ConnectiKR0N - Presentation
PROBOTEK
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
Mel Savich
 
Economical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guardEconomical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guard
Erin Qiu
 
Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505
Axis Communications
 

What's hot (20)

Presentation1
Presentation1Presentation1
Presentation1
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
sicurit_product_overview_web
sicurit_product_overview_websicurit_product_overview_web
sicurit_product_overview_web
 
E shri cctv pps
E shri cctv ppsE shri cctv pps
E shri cctv pps
 
Vedard alarm company newsletter
Vedard alarm company newsletterVedard alarm company newsletter
Vedard alarm company newsletter
 
Ruckus Wireless ZoneDirector 5000 Product Card
Ruckus Wireless ZoneDirector 5000 Product CardRuckus Wireless ZoneDirector 5000 Product Card
Ruckus Wireless ZoneDirector 5000 Product Card
 
Bss seminar ppt
Bss seminar pptBss seminar ppt
Bss seminar ppt
 
Wardriving 101
Wardriving 101Wardriving 101
Wardriving 101
 
Iuwne10 S05 L06
Iuwne10 S05 L06Iuwne10 S05 L06
Iuwne10 S05 L06
 
Wardriving
WardrivingWardriving
Wardriving
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security System
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Ruckus Wireless ZoneDirector 3000 Product Card
Ruckus Wireless ZoneDirector 3000 Product CardRuckus Wireless ZoneDirector 3000 Product Card
Ruckus Wireless ZoneDirector 3000 Product Card
 
Emptyprop
EmptypropEmptyprop
Emptyprop
 
nquiring minds
nquiring mindsnquiring minds
nquiring minds
 
ConnectiKR0N - Presentation
ConnectiKR0N - PresentationConnectiKR0N - Presentation
ConnectiKR0N - Presentation
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
Economical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guardEconomical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guard
 
Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505Flyer Axis Lte4G_Sierra_Wireless_1505
Flyer Axis Lte4G_Sierra_Wireless_1505
 

Similar to Lixodex Outdoor Grounds Security System

Technology Q&A - IIOT
Technology Q&A - IIOTTechnology Q&A - IIOT
Technology Q&A - IIOT
Dr. Shivananda Koteshwar
 
Meshcom Modules Brochure
Meshcom Modules BrochureMeshcom Modules Brochure
Meshcom Modules Brochure
Teppo-Heikki Saari
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
ESD Networks India
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
ESD Networks India
 
Emerging technology io t in cloud
Emerging technology io t in cloudEmerging technology io t in cloud
Emerging technology io t in cloud
owatheowais
 
Low power interconnectivity
Low power interconnectivity Low power interconnectivity
Low power interconnectivity
The European GNSS Agency (GSA)
 
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGIMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
cscpconf
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
TELKOMNIKA JOURNAL
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile Intelligence
Richard Blech
 
ROK Homeland Security 2013
ROK Homeland Security 2013 ROK Homeland Security 2013
ROK Homeland Security 2013
Stuart Furnival
 
Know The Various Indoor Positioning System Types.pptx
Know The Various Indoor Positioning System Types.pptxKnow The Various Indoor Positioning System Types.pptx
Know The Various Indoor Positioning System Types.pptx
UbiTrack UK
 
Indoor Positioning Systems and Positioning System Analytics Help Your Business
Indoor Positioning Systems and Positioning System Analytics Help Your BusinessIndoor Positioning Systems and Positioning System Analytics Help Your Business
Indoor Positioning Systems and Positioning System Analytics Help Your Business
UbiTrack UK
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
IRJET Journal
 
IRJET- Indoor Positioning System
IRJET-  	  Indoor Positioning SystemIRJET-  	  Indoor Positioning System
IRJET- Indoor Positioning System
IRJET Journal
 
Proximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceProximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceRichard Blech
 
Remote surveillance of enclosed and open architectures using unmanned vehicl...
Remote surveillance of enclosed and open architectures using  unmanned vehicl...Remote surveillance of enclosed and open architectures using  unmanned vehicl...
Remote surveillance of enclosed and open architectures using unmanned vehicl...
International Journal of Reconfigurable and Embedded Systems
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
Mudassar Mehmud
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
Glen Yi
 
Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALS
Alex Vishwa
 
Smart home technology LaTeX paper
Smart home technology LaTeX paperSmart home technology LaTeX paper
Smart home technology LaTeX paper
MdAlAmin187
 

Similar to Lixodex Outdoor Grounds Security System (20)

Technology Q&A - IIOT
Technology Q&A - IIOTTechnology Q&A - IIOT
Technology Q&A - IIOT
 
Meshcom Modules Brochure
Meshcom Modules BrochureMeshcom Modules Brochure
Meshcom Modules Brochure
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
 
Emerging technology io t in cloud
Emerging technology io t in cloudEmerging technology io t in cloud
Emerging technology io t in cloud
 
Low power interconnectivity
Low power interconnectivity Low power interconnectivity
Low power interconnectivity
 
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGIMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile Intelligence
 
ROK Homeland Security 2013
ROK Homeland Security 2013 ROK Homeland Security 2013
ROK Homeland Security 2013
 
Know The Various Indoor Positioning System Types.pptx
Know The Various Indoor Positioning System Types.pptxKnow The Various Indoor Positioning System Types.pptx
Know The Various Indoor Positioning System Types.pptx
 
Indoor Positioning Systems and Positioning System Analytics Help Your Business
Indoor Positioning Systems and Positioning System Analytics Help Your BusinessIndoor Positioning Systems and Positioning System Analytics Help Your Business
Indoor Positioning Systems and Positioning System Analytics Help Your Business
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
 
IRJET- Indoor Positioning System
IRJET-  	  Indoor Positioning SystemIRJET-  	  Indoor Positioning System
IRJET- Indoor Positioning System
 
Proximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceProximity LLC Mobile Intelligence
Proximity LLC Mobile Intelligence
 
Remote surveillance of enclosed and open architectures using unmanned vehicl...
Remote surveillance of enclosed and open architectures using  unmanned vehicl...Remote surveillance of enclosed and open architectures using  unmanned vehicl...
Remote surveillance of enclosed and open architectures using unmanned vehicl...
 
Aca presentation arm_
Aca presentation arm_Aca presentation arm_
Aca presentation arm_
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
 
Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALS
 
Smart home technology LaTeX paper
Smart home technology LaTeX paperSmart home technology LaTeX paper
Smart home technology LaTeX paper
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Lixodex Outdoor Grounds Security System

  • 2. Lixodex provides layered wireless security information throughout a dome in the private coverage area on mobile phones and computer consoles, this means receiving security information while in the security area or while being somewhere else (on your mobile phone). Security information is collected from multiple sensor layers, including fence mounted intrusion sensors, field distributed PIR (Passive Infrared) sensors that detect movement on pathways - behind buildings etc., beams (including infrared and laser), trip wires and GPS trackers attached to assets inside the private coverage area and outside using GSM tracking. OVERVIEW Lixodex © 2019 Lixodex © 2019
  • 3. All sensors are installed according to GPS coordinates allowing the Lixodex system to display their location on Google Maps and Google Satellite Maps, indicating the exact location of any alarm location, and can be easily integrated with remote cameras and wireless surveillance hubs to form a complete integrated surveillance solution for visual confirmation of targets.   OVERVIEW (CONTINUED) Lixodex © 2019
  • 4. FENCE Makes use of sensors and algorithms to detect movement on fences or any asset that should remain stationary. Fence sensors are battery powered and can be installed anywhere, inside the coverage of the gateway radio, and then moved to another location as part of a tactical plan, or, they can remain in the same location for years. PASSIVE INFRARED PIR works with batteries and connects to Lixodex Cloud server through the internet, this makes it easy to install PIR in any place, inside the coverage of the gateway radio, and then move them. to the next place as part of a tactical monitoring program, or, they can stay in the same location for years. BEAM Our innovative power-efficient wireless platform also has the intelligence to monitor different beam based systems and connect them into the Google Maps based information system, collecting and displaying beam detected security breach occurances. TRIP WIRE An extremely practical way of detecting movement along footpaths, monitor gates, keep tabs on items across the security area that should not be moved or removed. LIXODEX SENSORS Lixodex © 2019 TRACK Tracking assets across the security area could include the tracking of valuables such Televisions or the tracking of vehicles that are used across the security campus, including golf carts, lawn maintenance equipment etc. Passive Infrared Tactical Format Trip Wire Tactical Format
  • 5. SYSTEM COMPONENTS The Lixodex system consists of the following components: CLOUD BASED SERVER The Lixodex cloud based hosted server displays alarms on Google maps while managing access and security. GATEWAYS Our System connects through the internet to the Lixodex Cloud based server on the one side making use of ethernet, wifi, mobile data or satellite links; and to the Lixodex sensors spread over the width and breadth of the security area using a RF star topology.  Multiple gateways assist in covering all parts of even difficult terrain. Gateways are powered through 220V, 12 volt or solar power. SENSORS Lixodex sensors are RF connected to Lixodex Gateways, use wireless RF communication and a choice of long life batteries.. Lixodex © 2019
  • 6. INTEGRATION Connecting With Other Systems Lixodex has Programming Interfaces that allows the sending and receiving of information to and from Lixodex and other security systems already employed. Phone And Computer Access Lixodex provides sensors monitors fences and assets against  unwanted intrusions and movement in your residential estate, business park or farm.   Alarms are displayed on your mobile phone where you can see where unwanted intrusions or movements take place using Google map satellite view. Lixodex collects alarm conditions on a Cloud based server allowing you to view maps and alarms from anywhere in the world while making use of a secure internet connection. The gateway radio that connects Lixodex sensor with the internet provides distance coverage of up to 2 kilometers in urban built up areas and up to 10 km in open rural areas. Lixodex © 2019
  • 7. LIXODEX PERMANENT AND TACTICAL DEPLOYMENT Lixodex intrusion detection and surveillance systems are used for security monitoring around permanent sites, semi-permanent sites, and mobile tactical deployments.   This means that besides fixed installations, sensors and gateways can be quickly deployed and then easily moved to another location where a threat needs to be detected and deterred. The system provides for wide terrain and perimeter intrusion detection, terrain movement assessment, and surveillance using RF communication devices. Lixodex © 2019
  • 8. KEY BENEFITS Our systems were designed with quality, and easy of use and mind. The Lixodex system is intuitive, easy to install and low maintenance. - Early detection of intrusions and unwanted movement. - A system that is customisable. - Stringent Quality Assurance. - Ease of installation. - Cost Effective for both small and large applications. - Simple and easy to use. - Suitable for high security applications. - Field proven reliability even in difficult environments.  - Low nuisance alarm rate. - Low maintenance. Lixodex © 2019
  • 9. Our team is made up of seasoned, South African electronic engineers, with years in the security industry which includes: Experience since 1995 in designing and implementing security systems for the South African Navy and Arms Depots for the SADF.  Our team have also developed a fiber optic perimeter sensing solution. Our expert opinion is that these systems are too expensive for most applications. THE LIXODEX TEAM Lixodex © 2019
  • 10. ww.lixodex.co.za TALK TO US CONTACT US 083 407 6037 065 810 1874 THOMAS@LIXODEX.CO.ZA