Senstar's newest generation microwave - µltraWave™ at IFSEC 2011
Senstar's newest generation microwave - µltraWave™ at IFSEC 2011

Senstar Corporation, a world-leader in outdoor perimeter security technology and products, introduced its newest generation microwave – µltraWave™, an all-digital volumetric sensor that provides advanced warning to security forces of unwanted intrusions.µltraWave combines advanced electronics with Senstar’s decades of experience in outdoor perimeter security sensors to deliver superior performance in perimeter protection. Key benefits of this new sensor include ease of use, powerful networking capabilities and long-term reliability. “As we celebrate our 30th anniversary in 2011, Senstar is proud of the fact that we are investing to enhance our technologies and products for the demands of today,” said Brian Rich, President, Senstar Corporation.“As the market leader in outdoor perimeter intrusion detection products, we bring increased value to our customers with µltraWave – easier installation and set up, remote monitoring and calibration, long term support of the electronics, the reliability of digital circuitry and a clear migration path from our current microwave products into the next generation,” Rich added. µltraWave’s sophisticated detection algorithms look for specific responses that discriminate real intrusions from environmental effects. It comes with a Windows-based software configuration tool with intuitive screens. Calibration is streamlined with minimal settings and sensor response data can be viewed and recorded in real-time to evaluate sensor Probability of detection (Pd) and Nuisance Alarm Rates (NAR).Highly stable RF sources allow for 10 operating channels, allowing even the densest concentration of microwaves. µltraWave works with Senstar’s Silver Network™ that unleashes the benefits of reliable alarm communication, remote setup and diagnostics using the same Windows® screens as used at the processor, and a flexible IP/Ethernet interface to the Security Management System (SMS). µltraWave now adds microwave sensor compatibility to the same network as Senstar’s other new generation sensors: the OmniTrax® buried cable sensor, the FlexPS™ fence sensor and the X-Field® electrostatic sensor. While the MPS-4100, and other previous generation microwave products will continue to be supported, µltraWave will become the choice for new sites as well as expansions, upgrades and replacement of existing systems.Comparably priced with Senstar’s analogue volumetric microwave sensors, µltraWave is an ideal solution for commercial and industrial sites, the petrochemical industry, correctional facilities, military bases, critical infrastructure sites, airports and VIP installations.

Add to Compare
Senstar's latest perimeter protection products: FlexPS and FlexPI
Senstar's latest perimeter protection products: FlexPS and FlexPI

At the ISC West tradeshow Senstar  will showcase its latest perimeter protection solution. Amongst the products in the spot light were the Flex PS - Sentstar's next generation of fence - mounted sensor that combines the best of two proven technologies into one, and FlexPI- an intrusion detection sensor for the protection of unsupervised building interiors.FlexPS key features:FlexPS™ Advanced digital signal processing allows it to adapt to a wide variety of fence types. FlexPS builds upon Senstar's wealth of experience with its Intelli-FLEX and FPS fence sensors to deliver a sensor that is simple to install, provides networking capability for remote alarm reporting and configuration, and works reliably in the most extreme environments.Like its predecessors, FlexPS gives advanced warning of unwanted intrusions at the perimeter and is easily installed on most fences by attaching its lightweight sensor cable to the fence fabric with cable ties. The FlexPS processor is outdoor rated and easily post mounted or fixed to any convenient supporting surface. Alarms can be reported locally at the processor via relays or communicated to a central location using an optional networking capability. For extreme protection, the Armour-Flex™sensor cable adds a flexible steel conduit outer jacket to the standard cable.FlePI key features:  FlexPI™ adapts Senstar's proven microphonic cable technology to the specialized requirements of indoor security applications.   FlexPI can function with a wide range of surfaces and materials when protecting structures such as walls, ceilings, roofs, stock cages, floors and pipes. It is easily integrated into most existing alarm systems.

Add to Compare

Browse Intruder Detectors & Detection Systems

  • Infra Red Beams
  • Yes
  • PIR Detectors
  • Yes
  • Glassbreak Detectors
  • Yes
  • Shock Sensor
  • Yes
  • Pet Tolerance
  • Yes

Intruder detectors - Expert commentary

We need to talk about intelligent enclosure protection
We need to talk about intelligent enclosure protection

Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data centre world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realise that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.

Remote Monitoring technology: Tackling South Africa’s cable theft problem
Remote Monitoring technology: Tackling South Africa’s cable theft problem

For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organised, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognise the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.

Trends and challenges we will see in the AI-driven security space in 2021
Trends and challenges we will see in the AI-driven security space in 2021

For decades, the nature of global safety has been evolving. From physical security threats like large-scale terrorist attacks and lone actor stabbings to chemical threats such as the Salisbury poisonings and even microbiological threats such as COVID-19, new challenges are constantly arising and the threat landscape we operate in today is constantly changing. Compounding the complexity of the security issues is the complexity and nature of attacks. With the economic downturn, there is the traditional rise in theft, violence and other crimes. Compound this with unmanned businesses and work-at-home staff, and there is a perfect storm for a rise in security threats. Artificial intelligence (AI) and specifically the branch of AI known as machine learning (ML), was already causing widespread disruption in many industries, including the security industry. AI has been a driving force to replace labour-based business models with integrated data and actionable intelligence that is context-aware. It has become apparent that AI will play a big part in the ongoing fight against both pandemics such as COVID-19, as well as other threats that we may face in the future. With all of this in mind, 2021 is poised to be a big year for AI growth. While AI is going to continue to impact our lives in dozens of ways, from smart sensors to face mask compliance detection, the following reflects a few top trends and challenges that I have my eye on for 2021 as we close out this year. The rise of smart city investments One such example is the increasing development of smart cities and how AI can be leveraged to build safe communities. To date, we’ve seen an increase in the number of smart city programmes around the globe; cities that are beginning to deploy innovative technologies for the management and ease of life services. Compounding the complexity of the security issues is the complexity and nature of attacks Typical development of a city includes standard infrastructure - roads, schools, power, water, transportation. Now, internet, data and AI capabilities are part of the standard infrastructure requirements for all new developments. AI promises to deliver increased efficiencies with the infrastructure that will accommodate growing populations while reducing our impact on the environment, resources, and communities. Global cities now account for more than half of the world’s population, and the United Nations projects the number to balloon to 68% by mid-century. Owing to both demographic shifts and overall population growth, that means that around 2.5 billion people could be added to urban areas by the middle of the century, predicts the UN Department of Economic and Social Affairs (DESA). With an increase in population has come an increase in global spending on smart city initiatives to drive down the impact of growing urban concentration. Global spending on smart city initiatives is expected to total nearly $124 billion this year, an increase of 18.9% over 2019, according to IDC's Worldwide Semiannual Smart Cities Spending Guide, while Singapore, Tokyo, London and New York as the big spenders - expected to spend more than $1 billion in 2020. Using AI-driven technology to create safer public and private spaces Today, security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments to protect the population in a more efficient, and accurate manner. As we look ahead to the future of public safety, it’s clear that new AI technology can dramatically improve the effectiveness of today’s physical security space. One such deployment is the use of video object recognition/computer vision software that can be integrated into existing video monitoring security (VMS) systems. These enhanced VMS systems can be deployed both inside and outside of buildings to identify risks and flag threats, such weapons, aggressive behaviours, theft, and safety compliance. This helps to minimise the impact of a breach by an early alert to onsite security in real-time to the location and nature of the potential threat, allowing them to intervene before a loss occurs. These same AI-enabled video solutions can similarly be used to provide advanced business operations in retail, logistics, and manufacturing organisations. Multi-sensor security solutions Also, targeted magnetic and radar sensor technologies, concealed in everyday objects like planter boxes or inside walls, can now scan individuals and bags entering a building for concealed threat objects. Using AI/machine learning, these two sensor solutions combined can identify metal content on the body and bag and match the item to a catalogue of threat items, such as guns, rifles, knives and bombs. Security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments Without this advanced multi-sensor solution, it becomes nearly impossible to discover a weapon on a person's body before it appears in an assailant’s hands. This multi-sensor solution allows for touchless, unobtrusive access to a building, but allows for immediate notification to onsite security when a concealed threat is detected. The hidden technology thus empowers security staff to intercept threats before they evolve into a wider scale attack, while also maintaining the privacy and civil liberties of the public, unless, of course, they are carrying a concealed weapon or pose a physical threat. With the advent of sophisticated surveillance and technological innovation, a level of caution must be exerted. Despite the ongoing global debate, there remains little regulation about the use of AI technologies in today’s physical security space. One thing is certain; it must be deployed in the right place, at the right time, with the right privacy and civil liberty protection objectives. People don’t want to be protected by omnipresent, obstructive and overbearing security systems that infringe on their privacy and civil liberties. They want a proper balance between security and their current way of life, one that must be fused together. Technology and tracing COVID-19 Machine learning-based technologies are playing a substantial role in the response to the COVID-19 pandemic. Traditionally, the key purpose of surveillance systems has been to detect and deter threats, including the detection of visible and hidden weapons and abnormal behaviour. While this, of course, remains a primary focus, today we are seeing how surveillance systems defend against new invisible threats, as well as rapidly automate the process of contact-tracing to capture and contain a virus before it spreads. Again, the ability to track and trace through parsing algorithms that can manage through enormous amounts of data provides a highly scalable and rapid response mechanism to control the spread of threats. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact Although the threat may not be visible, it is just as destructive. By incorporating AI into existing technologies, government, healthcare and security professionals can monitor public spaces and environments through the combined use of digital and thermal video surveillance cameras and video management systems); just one of the solutions being explored. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact. By Using AI-powered video analytic software, businesses can monitor face masks, social distancing and large gathering compliance and also detect elevated body temperature. Critically, technology must be capable of both identifying and tracking the virus but also be unobtrusive. An unobtrusive system that is adaptable enough to be deployed across a range of environments where the public gathers in enclosed spaces is necessary to be effective. Security in 2021 Technology has proven itself to be a valuable ally in times of crisis. For smart cities, the use of innovative AI/machine learning technologies will help optimise security solutions in areas that are brimming with potential. As we look ahead to the future of security in a world that is impacted by such a wide range of threats, from physical to chemical to microbiological, it’s clear that new technologies, specifically AI can dramatically improve the effectiveness of security systems and help us to better defend against a wide spectrum of threats. Technology has a huge role to play in making our communities safe in 2021 and beyond, but for security systems to be effective, they must not be oppressive or obstructive. This will ensure they have the full support of the public - the key to success.

Latest Senstar news

Senstar launches their Symphony common operating platform with sensor fusion engine for security management
Senstar launches their Symphony common operating platform with sensor fusion engine for security management

Senstar, a pioneer in video management and perimeter intrusion detection solutions, announces the launch of its Senstar Symphony common operating platform with sensor fusion engine, a modular solution for security management and data intelligence. In addition to being an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. “What truly sets Senstar Symphony apart from other systems is its sensor fusion engine,” said Chief Technology Officer Jeremy Weese. Perimeter intrusion detection “By intelligently combining low-level sensor data with video analytics, the sensor fusion engine achieves the highest levels of performance, far beyond that of the individual devices. Senstar Symphony seamlessly incorporates sensor fusion, event algorithms, and rule-based actions to provide unmatched capabilities, flexibility, and performance.” The platform offers per device licencing, so organisations only pay for what they need The modular design of the platform allows each function – video management, video analytics, security management, access control, and perimeter intrusion detection – to be used on its own as a world-class solution and to coexist with third-party systems. As an organisation grows and needs evolve, operations can be streamlined by adding functions into the platform. The platform offers per device licencing, so organisations only pay for what they need, with the option to add licenses at any time. As well, the same Senstar Symphony software runs on all servers, making it easy to expand computing resources simply by adding additional hardware. Video management software Finally, with built-in server and database redundancy, Senstar Symphony eliminates the need for expensive Microsoft Clustering solutions normally required when deploying high-availability systems. “With its sensor fusion engine and modular design, the Senstar Symphony Common Operating Platform allows us to truly differentiate as we focus on delivering solutions for customers around the world in utilities, logistics, corrections, and oil and gas markets,” said Managing Director Fabien Haubert. “Senstar is pleased to continue to push the envelope to enhance the effectiveness of security technology while simplifying deployment and day-to-day operations.” The Senstar Symphony common operating platform is the latest expansion of the Senstar Symphony video management software, a solution in the security industry for close to 20 years.

Genetec employed by retail powerhouse The Very Group to safeguard its new purpose-built fulfilment centre
Genetec employed by retail powerhouse The Very Group to safeguard its new purpose-built fulfilment centre

The Very Group is the UK’s largest integrated digital retailer and financial services provider. It offers 1,900 brands to its four million customers. Due to the company’s growth, it built a new state-of-the-art fulfilment centre - close to one million square feet - to centralise operations and drive efficiency. The Very Group has historically operated from three fulfilment centres in the north of England. Due to the business’ growth, it needed a new, purpose-built and automated facility in a central, well connected location; that could accommodate all one-man fulfilment and returns operations on one site, and that provided room for continued expansion. The space offered by the new site in the East Midlands means that The Very Group can process more orders and use new technology to make the business more responsive, reducing the time it takes to get products to customers. Support business growth The site’s position in the East Midlands, adjacent to the M1 and East Midlands Airport, with its own rail freight terminal, will enable the business to increase its cut-off time for next day delivery to midnight from 7pm, and explore the introduction of same day delivery in the future. A crucial aspect of the new hub was security - with the need to not only secure the site and the stock inside, but implement solutions which would benefit the wider business too. The Very Group required a platform which could provide the business-wide value it was seeking The Very Group required a platform which could unite operations and provide the business-wide value it was seeking. The company approached Grantfen, initially on a consultancy basis, to guide the organisation on the route it should be taking and the technologies that could support its ambition. Grantfen quickly recognised the scope of The Very Group’s ambitions for a platform that was easy-to-use and that could bring together information from hundreds of different sensors and technologies. Incorporating video surveillance It put forward a comprehensive solution built on the Genetec Security Center unified platform. Incorporating video surveillance and analytics, access control, automatic number plate recognition and integration with other key business systems, this allowed The Very Group to deploy best of breed technologies from a range of vendors including HID Global, Axis Communications and SenStar. Perhaps the most important solution needed was tracking who was coming in and out of the building - with such a large workforce, combined with inbound and outbound deliveries, the facility has hundreds of people inside at any one time. Previously, security manually searched people selected at random. However, thanks to the robust Genetec software development kit, and Grantfen’s specialist development expertise, The Very Group has been able to adapt the solution and write its own code in order to use the access control system to implement truly random searches. Number plate recognition This has involved getting permission to hold employee data, but again, thanks to the new system brought together by Security Center, the data is housed safely. Moving from three fulfilment centres into one, consolidated facility meant a change in operations for The Very Group, and security needed to mirror this evolution. Therefore, with the volume of traffic coming in and out of the site increasing, The Very Group implemented automatic number plate recognition (ANPR). Heavy goods vehicles could be monitored coming in and out of the site, enabling those in the diary to enter and exit the grounds in an efficient manner. Plus, with timestamps now able to show when vehicles entered or exited the grounds, it helped with yard management and traffic flow, with Security Center able to generate reports on how traffic is moving around the yard. Employees are able to take advantage too - with the ANPR recognising them and seamlessly letting them into the car park. Health and safety standards The opening of Skygate, our new fulfilment centre, means a new era for the group" This enhanced integration has benefitted other areas of the business too. The CCTV control room is now able to monitor fulfilment centre flow, looking at movements such as trailers, to help maximise efficiencies and ensure high health and safety standards. Dean Cooper, Head of Security at The Very Group, commented: “The opening of Skygate, our new fulfilment centre, means a new era for the group. We are a digitally-led business, and the fact we are now able to enhance operations and yield more value from security functions is going to help us operationally. Genetec and Grantfen have played a huge part in accelerating our sophistication in this area, and I look forward to how we can gain increasing insights from all the technology has to offer.” Deep integration and analytics While the roll-out has been relatively recent, the positive effects are already being felt across the business. This has led to future plans about what else could be introduced - all underpinned by Genetec Security Centre. “Genetec Security Centre is helping to improve inter-departmental collaboration thanks to its reporting functions, alongside benefiting operations and ensuring the security of the facility. We are an ambitious business, and as we grow we need a system that will continue to evolve with our requirements. Genetec enables this, and alongside its deep integration and leading analytics, we look forward to continuing the partnership over years to come”, concluded Cooper.

Senstar appoints Alain Grinbaum as Senior Sales Director, West Europe and Middle East
Senstar appoints Alain Grinbaum as Senior Sales Director, West Europe and Middle East

Senstar, a front-runner in video management and perimeter intrusion detection solutions, is pleased to introduce Alain Grinbaum as Senior Sales Director. Based in Paris, France, Mr. Grinbaum has assumed direct responsibility for Senstar’s sales functions in that country, as well as Italy, Benelux, the United Kingdom, South Africa, and the Middle East. Fulfilling customer needs “Senstar offers complete and sophisticated security solutions on their own and/or in combination to provide increased capabilities and options,” said Mr. Grinbaum. “I am pleased to be joining a company with such a strong commitment to fulfilling customer needs with top-quality technologies, services, and support.” Security background Mr. Grinbaum brings a strong security background to Senstar, spending several years as an entrepreneur in the industry, as well as holding senior roles with Aasset Security and Hanwha Techwin Europe. “Mr. Grinbaum is an excellent addition to the Senstar team,” said Managing Director Fabien Haubert. “His strong knowledge of IP security solutions and extensive experience in the critical infrastructure, logistics, transportation, and retail vertical markets make him a great fit to lead Senstar’s sales efforts in Western Europe and the Middle East.”

Related white papers

Market Report: Cannabis at a glance

Optimise your business with analytics and AI