Xtralis Intruder Detectors & Detection Systems (23)
Display modules provide real-time indication of the status of a VESDA detector. They have a 20-segment vertical bar graph display, a 2 digit numeric display, an audible sounder, clear alarm and fault indicators. They also have 4 push button keys to control the detector and the mode of the display. The Display Module can be mounted into a detector unit, a remote mounting box or a 19in sub rack. Several displays can be configured to display information from a single detector in multiple locations. Voltage: 18 ~ 30 VDC. Dimensions: 140 x 150 x 85. Operating Temp ºC: 0 ~ 39.Add to Compare
The ICAM IFT-P detector is an air-sampling system with an alarm sensitivity range from 0.001% to 20% obscuration/m (0.0003% to 6.10% obscuration/ft). This detector is classified as a 'very early warning smoke detector' that can reliably detect fire at an early stage, and low to high concentrations of smoke over an area of up to 2000 square metres. The detector is configurable for a variety of environments, providing an ideal fire detection solution for telecommunications and IT facilities, and heavy industrial environments such as chemical plants, factories, warehouses and mining facilities.Add to Compare
The VESDA VLC detector has been tested and certified to provide all the benefits of aspirating smoke detection, including very early warning in marine environments. 800 square metres coverage. IP30 rated. Interfaces via relays only. Event logging for up to 12,000 events. Weight: 1.9 kg.Add to Compare
The VESDA VLC detector has been tested and certified to provide all the benefits of aspirating smoke detection, including very early warning in marine environments. 800 square metres coverage. IP30 rated. Interfaces via relays and VESDAnet (VN). Event logging for up to 12,000 events. Weight: 1.9 kg.Add to Compare
The VESDA VLP detector is the central element of the VESDA ASD product range. Using unique detection principles, the VLP has an alarm sensitivity range of 0.005%-20% obscuration/m (0.0015%-6.25% obscuration/ft). The VLP is classed as a "Very Early Warning Smoke Detector", which means that it detects fire at the earliest possible stage and reliably measures very low to extremely high concentrations of smoke.Add to Compare
The VLS draws air from all sectors in use. If the smoke level reaches the Adaptive Scan Threshold, the VLS quickly scans each pipe to identify which pipe is carrying smoke. If more than one pipe is transporting smoke, the sector with the highest smoke concentration is designated as the First Alarm Sector (FAS). Once Fast Scan is completed and the FAS identified, the VLS continues to closely monitor all four sectors (pipes) to monitor fire growth and maintain full protection of the area.Add to Compare
VESDA VFT-15 detectors are multi-channel microbore air-sampling systems with an alarm sensitivity range from 0.001% to 20% obscuration/m (0.0003% to 6.10% obscuration/ft). These detectors are classified as 'very early warning smoke detectors' and can reliably detect fire at an early stage, and low to high concentrations of smoke. As a multi-channel system, the VFT detector is able to divide a protected space into sampling sectors, enabling the localisation of a fire for faster incident response.Add to Compare
VESDA ECO by Xtralis provides protection from both fire and gas threats in powerful yet cost-effective configurations to provide point, zone or total-area coverage in battery-charging rooms, underground utility tunnels, boiler rooms, warehouses, manufacturing facilities, parking garages, transportation centers, and a variety of other applications. IP65 rated. Weight: 250 g.Add to Compare
The Xtralis ICAM IAS-1 single channel air-sampling smoke detection system provides a flexible solution to meet the unique needs of numerous applications including industrial spaces such as cable tunnels, the tamper-proof and unobtrusive requirements of special accommodation, or can simply be used to replace spot (point) detectors in office environments. IP65 rated.Add to Compare
The Xtralis ICAM IAS-2 dual channel air-sampling smoke detection system provides a flexible solution to meet the unique needs of numerous applications including industrial spaces such as cable tunnels, the tamper-proof and unobtrusive requirements of special accommodation, or can simply be used to replace spot (point) detectors in office environments. IP65 rated.Add to Compare
The ICAM IFT-1 detector is an air-sampling system with an alarm sensitivity range from 0.001% to 20% obscuration/m (0.0003% to 6.10% obscuration/ft). This detector is classified as a 'very early warning smoke detector' and can reliably detect fire at an early stage, and low to high concentrations of smoke over an area of 2000 square metres. The detector is configurable for a variety of environments, providing an ideal fire detection solution for power stations, telecommunications and IT facilities, clean rooms, warehouses, cold storage, harsh and hazardous areas, historic buildings and museums.Add to Compare
The ICAM IFT-4 detector is multi-channel large bore air sampling system with an alarm sensitivity range from 0.001% to 20% obscuration/m (0.0003% to 6.10% obscuration/ft). This detector is classified as a 'very early warning smoke detector' and can reliably detect fire at an early stage, and low to high concentrations of smoke. As a multi-channel system, the IFT detector is able to divide a protected space into sampling sectors, enabling the localisation of a fire for faster incident response. The detectors are configurable for a variety of environments, providing ideal fire detection solutions for power stations, telecommunications and IT facilities, clean rooms, warehouses, cold storage, harsh and hazardous areas, historic buildings, museums, prison cells and technical cabinets.Add to Compare
The ICAM IFT-46detector is multi-channel large bore air sampling system with an alarm sensitivity range from 0.001% to 20% obscuration/m (0.0003% to 6.10% obscuration/ft). This detector is classified as a 'very early warning smoke detector' and can reliably detect fire at an early stage, and low to high concentrations of smoke. As a multi-channel system, the IFT detector is able to divide a protected space into sampling sectors, enabling the localisation of a fire for faster incident response. The detectors are configurable for a variety of environments, providing ideal fire detection solutions for power stations, telecommunications and IT facilities, clean rooms, warehouses, cold storage, harsh and hazardous areas, historic buildings, museums, prison cells and technical cabinetsAdd to Compare
Alarm sensitivity range from 0.001% to 20% obscuration/m (0.0003% to 6.10% obscuration/ft). Classified as a 'very early warning smoke detectors' and can reliably detect fire at an early stage, and low to high concentrations of smoke. As a multi-channel system, the IFT-15 detector is able to divide a protected space into sampling sectors, enabling the localisation of a fire for faster incident response. The detectors are configurable for a variety of environments, providing ideal fire detection solutions for cabinets, EDP rooms, prisons, historic houses, custody suites, museums and art galleries.Add to Compare
Browse Intruder Detectors & Detection Systems
- PIR Detectors
- Glassbreak Detectors
- Infra Red Beams
- Shock Sensor
- Pet Tolerance
Intruder detector products updated recently
Today’s organisations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimising disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarise and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labelled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customised and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimise disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.
The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centres have become even more critical to modern society. The processing and storage of information underpin the economy, characterised by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centres classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cyber Security Centre (NCSC), and the Centre for the Protection of National Infrastructure (CPNI). As land continues to surge in value, data centre operators are often limited for choice, on where they place their sites and are increasingly forced to consider developed areas, close to other infrastructures, such as housing or industrial sites. Complex security needs One misconception when it comes to data centres is that physical security is straightforward One misconception when it comes to data centres is that physical security is straightforward. However, in practice, things are far more complex. On top of protecting the external perimeter, thought must also be given to factors, such as access control, hostile vehicle mitigation (HVM), protecting power infrastructure, as well as standby generators and localising security devices to operate independently of the main data centre. Face value How a site looks is more important than you may think. Specify security that appears too hostile risks blatantly advertising that you’re protecting a valuable target, ironically making it more interesting to opportunistic intruders. The heightened security that we recommend to clients for these types of sites, include 4 m high-security fences, coils of razor wire, CCTV, and floodlighting. When used together in an integrated approach, it’s easy to see how they make the site appear hostile against its surroundings. However, it must appear secure enough to give the client peace of mind that the site is adequately protected. Getting the balance right is crucial. So, how do you balance security, acoustics and aesthetics harmoniously? Security comes first These are essential facilities and as a result, they require appropriate security investment. Cutting corners leads to a greater long-term expense and increases the likelihood of highly disruptive attacks. Checkpoints Fortunately, guidance is available through independent accreditations and certifications, such as the Loss Prevention Certification Board’s (LPCB) LPS 1175 ratings, the PAS 68 HVM rating, CPNI approval, and the police initiative - Secured by Design (SBD). Thorough technical evaluation and quality audit These bodies employ thorough technical evaluation work and rigorous quality audit processes to ensure products deliver proven levels of protection. With untested security measures, you will not know whether a product works until an attack occurs. Specifying products accredited by established bodies removes this concern. High maintenance Simply installing security measures and hoping for the best will not guarantee 24/7 protection. Just as you would keep computer software and hardware updated, to provide the best level of protection for the data, physical security also needs to be well-maintained, in order to ensure it is providing optimum performance. Importance of testing physical security parameters Inspecting the fence line may seem obvious and straightforward, but it needs to be done regularly. From our experience, this is something that is frequently overlooked. The research we conducted revealed that 63% of companies never test their physical security. They should check the perimeter on both sides and look for any attempted breaches. Foliage, weather conditions or topography changes can also affect security integrity. Companies should also check all fixtures and fittings, looking for damage and corrosion, and clear any litter and debris away. Accessibility When considering access control, speed gates offer an excellent solution for data centres. How quickly a gate can open and close is essential, especially when access to the site is restricted. The consequences of access control equipment failing can be extremely serious, far over a minor irritation or inconvenience. Vehicle and pedestrian barriers, especially if automated, require special attention to maintain effective security and efficiency. Volume control Data centres don’t generally make the best neighbours. The noise created from their 24-hour operation can be considerable. HVAC systems, event-triggered security and fire alarms, HV substations, and vehicle traffic can quickly become unbearable for residents. Secure and soundproof perimeter As well as having excellent noise-reducing properties, timber is also a robust material for security fencing So, how do you create a secure and soundproof perimeter? Fortunately, through LPS 1175 certification and CPNI approval, it is possible to combine high-security performance and up to 28dB of noise reduction capabilities. As well as having excellent noise-reducing properties, timber is also a robust material for security fencing. Seamlessly locking thick timber boards create a flat face, making climbing difficult and the solid boards prevent lines of sight into the facility. For extra protection, steel mesh can either be added to one side of the fence or sandwiched between the timber boards, making it extremely difficult to break through. A fair façade A high-security timber fence can be both, aesthetically pleasing and disguise its security credentials. Its pleasant natural façade provides a foil to the stern steel bars and mesh, often seen with other high-security solutions. Of course, it’s still important that fencing serves its primary purposes, so make sure you refer to certifications, to establish a product’s security and acoustic performance. Better protected The value of data cannot be overstated. A breach can have severe consequences for public safety and the economy, leading to serious national security implications. Countering varied security threats Data centres are faced with an incredibly diverse range of threats, including activism, sabotage, trespass, and terrorism on a daily basis. It’s no wonder the government has taken an active role in assisting with their protection through the medium of the CPNI and NCSC. By working with government bodies such as the CPNI and certification boards like the LPCB, specifiers can access a vault of useful knowledge and advice. This will guide them to effective and quality products that are appropriate for their specific site in question, ensuring it’s kept safe and secure.
Honeywell has announced that the company is launching the Pro-Watch 5.5, the latest iteration of its Pro-Watch Integrated Security Suite. The Honeywell Pro-Watch Integrated Security Suite is a software platform that is designed for enterprise and critical infrastructure markets, to help protect people and property, optimise productivity, and ensure compliance with industry regulations, all while helping to reduce operational costs. Honeywell Pro-Watch Intelligent Command Pro-Watch 5.5 upgrade enables operators to respond rapidly and effectively to alarms or incidents Honeywell Pro-Watch Intelligent Command, a user interface that allows organisations to construct a security system with total situational awareness, via the seamless integration of video and access control solutions, can now be upgraded to Pro-Watch 5.5. The Pro-Watch 5.5 upgrade enables operators to respond rapidly and effectively to alarms or incidents, by providing actionable intelligence, including a unified alarm view with maps and associated video, which includes the Standard Operating Procedures (SOPs) to be followed, thereby enhancing compliance with advanced reporting, and reducing security risks. Key benefits and features of the Pro-Watch 5.5 include allowing users to: Improve situational awareness: It provides a unified view of alarms and maps, incident workflows, and a space/area builder, in order to create logical zones and group-based, multi-site views. Upgrade integration with cyber security and data privacy: It integrates a new PW7K controller, enhances cyber security with Open Supervised Device Protocol (OSDP) and improves data privacy with selective masking. Enhance compliance: It enhances compliance with advanced reporting and reduces security risks, through an SOP process, and end-to-end TLS 1.2 encryption, and guided alarm/incident response. Increase productivity and system uptime: It improves operator efficiency with intuitive controls for effective incident management and simplifies maintenance with remote bulk camera firmware upgrade, and camera password changes capabilities, which includes specific non-Honeywell cameras. Pro-Watch Video Management System (VMS) R700 Honeywell is also launching the Pro-Watch Video Management System (VMS) R700 Honeywell is also launching the Pro-Watch Video Management System (VMS) R700, the latest iteration of its feature-rich and user-friendly video management software platform. Pro-Watch VMS R700 controls video subsystems, to collect, manage and present video, in a clear and concise manner. Honeywell’s Pro-Watch VMS R700 also intelligently determines the capabilities of each subsystem, across various sites, allowing video management of digital video devices, through a unified configuration and viewer. Key benefits and features of Pro-Watch VMS R700 include allowing users to: Enhance productivity: It allows users to access video footage and respond to alarms, via mobile app – anytime, anywhere. New video core features: It reduces solution cost with advanced GPU video rendering, salvo sequences, 64-bits optimised recording engine and optimised server deployments. Provide emerging technology support: It works with H.265 smart video compression codec, multi-imager and fish-eye cameras. Improve situational awareness: It provides multiple camera views in web clients, new integrations with artificial intelligence (AI) and analytics systems, and geographic information system (GIS) online maps. Integrate with Honeywell Series 70 AI cameras: It integrates natively with current and future Honeywell cameras for edge analytics and annotations, for licence plate recognition, intelligent video analytics and object classifications video analytics. Honeywell Pro-Watch Integrated Security Suite Pro-Watch Video Management System (VMS) R700 is part of the Honeywell Pro-Watch Integrated Security Suite, a software platform, which is specially designed for enterprise and critical infrastructure markets, to help protect people and property, optimise productivity and ensure compliance with industry regulations, all while helping to reduce operational costs. To enhance situational awareness, Honeywell’s Pro-Watch VMS R700 easily integrates with Honeywell Pro-Watch Intelligent Command, a web-based user interface that provides organisations the ability to construct a security system with total situational awareness, in order to better protect people, property and assets.
Soloinsight Inc., a workflow automation platform company, will be featured at this year’s CREtech event in New York City. The company’s CEO, Carter Kennedy, will be a panelist for the show’s ‘The Ever-Evolving and Future of Access Control’ session on Wednesday, October 13th at 11 am EST. As a company that was recently awarded the Security Industry Association’s (SIA) new product showcase award in the hosted solutions/managed services category, Soloinsight is no stranger to innovating in the commercial real estate and access control industries. Workflow automation platform Soloinsight has integrated with some of the biggest names in the access control and visitor identity spaces Their product, CloudGate, is a visitor identity and access management (VIAM) platform that delivers unprecedented security and an intuitive guest and host experience at multiple locations via the cloud, on-prem, or hybrid infrastructures. Since the introduction of CloudGate, Soloinsight has integrated with some of the biggest names in the access control and visitor identity spaces, such as Johnson Controls, LenelS2, and Honeywell, to deliver a secure and seamless security workflow automation platform. With a platform that touches nearly every point in visitor and access management — from its mobile concierge technology, self-service kiosks, and turnstile integrations, Soloinsight is poised to be a game-changer in the commercial real estate industry. “We are excited to partner with access control manufacturers and property management companies to alleviate these challenges and advance their access control systems to the next level.” - President and CTO, Farhan Masood.
Alarm Man is one of the most trusted security solution providers that offer dedicated services in areas of North Carolina and has been the pioneer in the domain since its establishment in 1980. This family-owned and the locally based company offers state-of-the-art security systems to residential and business establishments alike. Hence, be it for fire alarms in Cary and Raleigh, North Carolina or security and surveillance systems, Alarm Man of NC, is the most trusted name in the whole of North Carolina. HD cameras The range of services offered by Alarm Man of NC includes installation, repair, and maintenance of security systems, monitoring devices, HD cameras, and CCTV, fire alarms, and more. Alarm Man is also an authorised dealer of Honeywell, and their technicians and professionals have vast knowledge in the effective handling of all their products. They specialise in carrying out seamless installations without disrupting the schedules of the property owners The system installations done by their professional technicians are done in a manner that they do not take up much space on the walls and are totally in sync with the overall look and feel of the space. Their skilled professionals have the due experience and knowledge to meet all the code requirements while installing the security systems. They specialise in carrying out seamless installations without disrupting the schedules of the property owners. Honeywell's Total Connect Alarm Man of NC looks forward to satisfying its clients by ensuring maximum security to their residential property and businesses so that one can live life carefreely. They also offer medical alert systems part of Honeywell's Total Connect so aging relatives can get quick help in an emergency. The security systems in Raleigh and Cary, North Carolina are designed in a manner that they can create awareness of mishaps just at the right time. Besides, the services provided by this company are just a call away from the clients. One has to dial 919-682-3379 to have a word with them.
Related white papers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Connected video technology for safe citiesDownload
Webcast: Access control integration increases security while reducing costsDownload
‘We want to become better known for access control’ - Q&A with Bosch Building Technologies’ Gregor Schlechtriem
- Vanderbilt provides SPC system to enhance access control system at the Maritime Culture Center
- TiOC 2.0: Customisable security alarm system made possible by Dahua
- HAECO automates its tool control for aircraft maintenance, repair and overhaul (MRO) services with Xerafy's RFID solution
- Ajax protects the Vernadsky Research Base with fire detectors and fire alarm systems