Perimeter Security Sensor

Perimeter Security Sensor

The Perimeter Security Sensor Solution is made up of one or many Security Sensors. Each Perimeter Security Sensor contains a high powered computing platform running IoT IntraCore software. Customers can quickly change the sensor modules to modify or expand the Perimeter Security Sensor’s capabilities.

Security Sensors can be static or mobile. A sensor can be installed in a permanent location, and covered in different “skins” making them unnoticeable, part of the natural habitat or bulletproof. A Perimeter Security Sensor can also be completely mobile — ground team can simply drop sensors where they are needed and walk away.

Wide range of detection capabilities with sensor fusion the solution relies on a wide range of sensors that can be setup to detect motion, vibration, sound, smells, gases, balance, temperature, radiation, electrical voltage, or almost any combination thereof.

Each Security Sensor contains a power-efficient multi-core computing platform running Security Sensor IoT IntraCore software. IntraCore uses a novel cognitive behavior fusion engine to process sensor data coming in through the individual sensors. A series of complex algorithms collect, manipulate, and populate a “prior knowledge repository” with real-time findings from the sensor network. Each sensor type is configured and integrated into IntraCore.

Perimeter Security Sensor

Urban Security Sensor - Mesh System

The Perimeter Security Sensor form a mesh network, so that each sensor can act as an independent router. The mesh network is self-healing and self-managed: if one sensor breaks down or if a connection goes bad, the network can still operate.

The Security Sensors automatically configure themselves according to the availability and proximity of bandwidth, storage, and so on. The network is more robust, thanks to dynamic connections between sensors that enable packets to use multiple routes through the network.

The system can also operate in remote areas without cell service and deliver data in real time to a central command via our relationship with Iridium Satellite Network.

Perimeter Security Sensor

Urban Security Sensor - Redundancy

If your site loses connectivity, the Perimeter Security Sensor solution continues to monitor sensor levels, and still issues necessary alerts locally for any thresholds that are crossed.

The Perimeter Security Sensor solution can also operate outside the power grid. Sensors can be powered by battery and solar increasing overall system reliability.

The Security Sensor IoT platform means you can build a high degree of redundancy into your safety and monitoring, simply by adding more sensors as you require.

Cost-Efficient Connectivity

Cost-efficient connectivity through M2M/Fog computing

The Perimeter Security Sensor provides connectivity thanks to “fog” computing capabilities that streamline data for delivery. The IoT IntraCore processes sensor data, and delivers only metadata over a network — private cloud or internet — to a central location such as headquarters.

Off-the-shelf components ensure the longevity of your solution, and make upgrades and maintenance more cost-efficient.

Quick Installation
The Security Sensor Solution is a plug-and-play solution that takes, on average, less than one day to install.

Customized to your needs
All Security Sensor Technologies solutions are customized to your needs. We provide the integrations so you don’t have to worry about making all the devices, software, and databases work together.

Advanced Research Capabilities – Purpose-Built VMS

Perimeter Security Sensor’s embedded server provides a single secure web interface where users can search for sensor and video data based on alarm events. Employees can search using any combination of filters such as alarm type, sensor input, camera name, time, license plates, Wireless MAC Addresses, etc.

The Perimeter Security Sensor solution provides intelligent reporting. The Perimeter Security Sensor can build OLAP data cubes to increase data mining efficiency and reporting response times.

End users can access their data through a variety of ways: view or download from the web interface, transfer over Local Area Network, download on a USB device, or third party integration using the API.

Robust Protection From Intrusions and Attacks

The Perimer Security Sensor Solution maintains high standards to ensure the security of your solution.

  • Industry-standard AES-256 TLS encryption with 2048-bit RSA keys on all cones. Any data that is transferred off the system is encrypted. Options for other types of encryption are available.
  • The entire cone,including all IoT sensors, are protected by a firewall. All unnecesary firewall ports are always closed off.
  • Factory default usernames and passwords are never used.
  • All stored passwords are hashed.
  • We perform continuous security and performance patches.
  • Disk encryption and remote wiping capabilities provided if required.
  • Proximity sensors can be setup to detect intrusion.