Security Design

Solutions by Design

Perimeter Intrusion Detection Systems for Facilities

Thermal Imaging Video

Thermal Imaging Garbage Dump Fire

Heat signatures are detected and identified at a long distance away from the forward edge of your physical perimeter, providing your team with the tool necessary to identify, asses and respond if required. In conjunction with other systems, it can be used as your perimeter intrusion detection system. Yes this is a compost pile, but the camera found the fire before a fire a actually broke out. This technology can detect leaks and other anomolies.

Volumetric Microwave


Microwave sensors generate an electromagnetic (RF) field between transmitter and receiver, creating an invisible volumetric detection zone. When an intruder enters the detection zone, changes to the field are registered and an alarm occurs.

Direct Burial Cable

Direct Burial Cable

TheMost Common Technologies

Magnetic Field
Passive, Covert, Terrain Following,Volumetric

Ported or Leaky Coax
Active,Covert,Terrain Following,Volumetric

Fibre Optic
Passive, Covert,Terrain Following,Line Detection

Fence Mounted

Fence Mounted Sensors

The Most Common Technologies

Disturbance Sensing
Passive,Visible,Terrain Following,Line Detection

Magnetic Field
Passive,Visible,Terrain Following, Line Detection

Ported or Leaky Coax
Active,Visible, Terrain Following, Volumetric

Fibre Optic
Passive,Visible, Covert,Terrain Following,Line Detection

Photo Beam 

Visible  Photo Beams

Photo Beam
Active Infrared, Visible, Line of Sight, Line Detection

Seismic Sensors

Buried Seismic Detection

The Most  Common Technologies

Passive, Covert, Terrain Following,Line Following

Fibre Optic
Passive,Covert,Terrain Following,Line Detection

Older Technologies

Fine wire/ lacing
Window foil

The above technologies are been forgotten by the majority of the industry, but work when installed and serviced properly

Vibration Sensors

Vibration Sensors

There are a number of different types of surface mounted seismic detectors  or vibrations sensors on the market. Some work well, others not so well. Our go to technology is http://www.terminusproducts.com

Accoustic Detection

Intrusion is detected where no sound is supposed to be.

Locating sounds that we do not want in our environment

Acoustic Detection Algorithms integrated with video analytics

All of the above technologies work very well, but not alone, they must be part of a multi layered approach to security to be effective. Finding a solution that actually fits your needs is critical.