To protect critical infrastructure facilities and operations, security operators need fully integrated command and control solutions. These security systems need to provide operators with efficient, reliable and comprehensive oversight over their sites, during both normal and emergency situations. That’s why our command and control solutions are trusted every day by numerous critical infrastructure industries, including the majority of nuclear sites in the United States, railroads and government and military facilities.
Our set of core software applications perform critical functions such as:
- Data acquisition
- Data processing
- Supervisory control
- Intrusion detection
- Personnel and vehicle access control
- Video management
- Biometric integration
- Information storage and retrieval
- Report generation functions for physical security information management
Cybersecurity is built into our system from the very beginning, by addressing realistic threat vectors with a defense-in-depth strategy. All of our solutions are designed to enable our customers to meet both regulatory and customer-specific requirements.
The command and control user interface incorporates a geographic information system (GIS) graphics engine that enables users to create and update graphics live on the production system and monitor potential threats in real time. Built-in workflows simplify system configuration for all critical parameters. Privileged access to certain application functions provides clear access boundaries for users and administrators.
With integrated physical access control solutions, facilities can deploy advanced biometrics, personnel badging, vehicle control, personal identity verification, intelligent access controllers and various card access solutions. Using our Integrated Enterprise Badging System (IEBS) system users can easily create, modify and print badge data and images.
Keep an eye on your operations using our intelligent IP video surveillance solutions. These solutions include a range of surveillance capabilities, including live monitoring, real-time alerts, redundant video archiving and video analysis. Our virtual video wall puts you in total control of the content your operations views. Utilizing selectable content with standard commercial PCs, you can choose from video switching, automatic alarm video call-up, real-time viewing and event-based retrieval and playback.
Perimeter intrusion detection
Using open architecture intrusion solutions, we integrate and support a host of state-of-the-art sensors, including:
- Digital link microwaves
- Digital infrareds
- Microphonic cable
- Fiber optic sensing cable
- Ported coaxial
- Electrostatic volumetric
- Taut wire
We provide additional service options (such as crime prevention) through environmental design, technology trade studies, infrastructure evaluation and design, network architecture evaluation and design, unit and population testing, full system deployment and installation, training and life cycle maintenance.
Our communications solutions enable security operators to respond to threats quickly and efficiently. Communication paths, such as mobile radios and intercom systems, are continuously monitored to ensure availability around the clock.