RK Telesystem offers multi-layer security & surveillance solutions to protect borders and boundaries of any house, factory, campuses, wildlife parks, plants, base camps and government organization compounds.We focus on pertinent choke points and deploy smart-surveillance solutions that are cost-effective ,technologically advanced,rapidly deployable and multi-layer solution utilizing multiple technologies.
Border/Boundaries Protection Solution
- Covert sensors and cameras to deter intrusion
- Set up invisible fencing for unfenced borders
- Day & night, real-time detection & monitoring of any breach
- Secure riverine and marshy borders with a layered defense system
- Aerial surveillance capability
- Gain visual advantage over enemy at hostile borders
- Remotely survey choke points for infiltration in mountainous or desert borders
Sensors across the border
Long-range Surveillance Systems
- Quick to install, long-range cameras and radars
- Designed to work in complex surveillance applications
- Laser range finder to locate long-range targets
- Automatic data analysis
- Day & night operation
- GPS & digital magnetic compass for geo-location
Perimeter Intrusion Detection Systems (PIDS) are systems used in an external environment to detect the presence of an intruder attempting to breach a perimeter.RK Telesystem offers effective and reliable, state-of-the-art perimeter security on a global scale for industrial, commercial and civil applications.From government buildings to correctional facilities, ancient monuments to royal palaces, electrical substations to nuclear power plants, police compounds, airports, basecamps, shipyards, car manufacturers, museums, wildlife parks and more, our perimeter security systems currently protect a large and increasingly diverse range of facilities.
- Invisible fence to protect against perimeter tampering
- Quick and easy installation on pole, fence, wall or virtual wall
- Motion cameras and unattended ground sensors to detect perimeter breach
- Captures attempts to pole vault and fence climbing
- Night-time illumination to detect intrusion in low-light
- Detects all kind of tampering and intrusion attempts – climbing, cutting, pole vault etc.
Barrier-Mounted – Fence Intrusion Detection System
PIDS deployed on or in conjunction with a fence or other physical barrier (e.g. DAS cable or other motion sensors mounted on a fence).
Ground-based or Below-ground
PIDS deployed below ground (again a DAS cable can be used or pressure sensitive cable or electromagnetic field). These do not require a physical barrier.
PIDS deployed above ground that do not need to be installed on or in conjunction with a physical barrier (e.g. bistatic microwave link).
PIDS that are designed for temporary deployment; for example, to protect a mobile asset. Typically this would cover military applications and again DAS sensing technology has been very successfully deployed in these environments.
Perimeter Security Solutions Selection Guide
When deciding on the specification and selection of any PIDS system the following factors must be taken into consideration:
- Landscape, flora, fauna and topographical features
- Integration with other types of equipment or systems
- Climatic conditions
- Local regulations
- Presence (or lack of) physical barrier and robustness against threats
- Duration of required deployment (rapidly deployable PIDS)
- Response force arrangements
- Personnel on site
All of these factors will affect the key choices made by an organisation and there are also other-point to consider including:
- Whether a line of site technology is appropriate (e.g. radio wave based technology or camera based systems). For instance, are there any undulations in the ground surface? Undulations occurring over the distance of a metre and up to several tens of metres can shield the presence of an intruder from some detection technologies, particularly in the case of microwave systems, visual cameras and active or passive infrared.
- Does the detection system needs to be covert (buried or hidden)?
- Are there specific electromagnetic interference issues that will affect specific technologies or are there requirements for the technology to be intrinsically safe (e.g on oil rigs or process plants)?
- Is there existing infrastructure to mount the system or whether it will be part of a new build?
- How does the system integrate with the overall security strategy.? What constitutes an alarm and what action is taken in the event of an alarm (audio alarm, visual alarm or a combination)?
In some scenarios, particularly where perimeters are large or the asset is critical, the asset owner may choose to use multiple technologies and integrate the respective monitoring systems through a centralized control system (e.g. Video cameras combined with DAS, where the cameras slew to the specific event when an alert is raised.)
Perimeter Intrusion Detection System using Distributed Acoustic Sensing
Distributed Acoustic Sensing systems can monitor the acoustic signals along the length of the fiber optic cable and are able to classify the acoustic signatures and pinpoint the location of an intrusion event to typically within 5 m.
The distributed acoustic sensing system consists of an interrogation unit with the relevant optoelectronic components (laser source(s), detectors and associated processing hardware, firmware and software) to monitor a length of optical fiber cable which can be run outside, on and inside the perimeter. These DAS systems have different distance capabilities ranging from 5 km to 100 km. The examples below show how a single system can be configured to monitor inside, outside and on the perimeter itself.
Contact Us to know more about our 3 Layer and/or 5 Layer Perimeter Security Solutions.We can offer wireless and wireline connectivity to various sensors, and cameras and do video analytics software configuration to send alerts/alarms via sms/email/mobile app notifications.