-Switches: Core, Distribution, Access
-Wireless Access Points
-Passive & Active components
-Optimum and verified design
-Most suitable components for the design
-UTP, Fiber, FTTX, Coax and Special Cabling
-Switches, Routers, Access Points, Industrial Equipments
-After Sales Support (SLA) up to 24/7
-Systems used to detect/protect approaching threats.
-Includes RVS and Barriers for waterways and open areas beyond the perimeter.
PERIMETER INTRUSION DETECTION (PIDS)
-Systems used to secure the perimeter of the facility.
-Includes fence detection, PE beams tied back to a panel and reported through the software
VIDEO SURVEILLANCE (CCTV)
-Systems used to watch the facility.
-Includes cameras, housings, mounts, monitors and software used for security and process control.
ACCESS CONTROL (ACS)
-Systems used to secure the access to a facility or an area.
-Includes locks, card readers, visitor/contractor badging, biometric readers, and software for access authentication, asset tracking, mustering and site lockdown.
COMMAND & CONTROL
-Control center that brings all systems together on a single platform for event reporting and response.