Intruder Detection, Tracking, Monitoring and Lighting

Detection and Tracking is a fundamental part of modern electronic security. Intruder Detection Systems (IDS) and Perimeter Intruder Detection Systems (PIDS) form the main part of the CPNI detect philosophy. These should be supported by CCTV to aid with the detection task and to assist in the tracking and monitoring of a situation.

  • IDS are detection systems within a building
  • PIDS are detections systems around the perimeter of a site

Where a detection system will primarily provide notification that an individual has passed a given point, door or fence line, tracking technologies can enable a site to track an intruder across a site following an initial perimeter breach.

All perimeter systems, whether providing delay (a fence), detection (a PIDS) or deterrence and detection (CCTV) should be supported by good quality lighting. This will enable sites to gain the maximum benefit from their detection systems and support a response to an attack.

Security Management Systems (SMS) combine electronic security products with the aim of providing the control room with a richer picture about the site and about any attacks. SMS potentially link a number of different systems which may include:

  • IDS
  • PIDS
  • CCTV
  • Automatic Access Control Systems
  • Mapping systems
  • CCTV

    CCTV is one of the main stays of a modern security system. Its primary focus is to act as a verification system for other security measures.

    More Information

  • Perimeter Intrusion Detection

    Perimeter Intruder Detection Systems (PIDS) act as a technology force multiplier, they keep a constant watch on a site’s perimeter and offer the opportunity for early detection of an attack.

    More Information

  • Security Lighting

    Security lighting plays an important part of any site’s security regime. Good quality and well planned lighting will assist your guard force

    More Information

  • Tracking Systems

    A tracking system can assist and aid the response force following initial detection of intrusion.

    More Information