Ajax Intruder Detectors & Detection Systems (11)
Small wireless detector that notifies of glass being broken by intruders. It is installed at a distance of 9 m from the window and filters events that cause false alarms about breakage. Principle of operation Detects broken glass using an electret microphone, which registers the sound of impact against the glass and of the glass falling. Features Two-factor detection of broken glass prevents false alarms caused by thunder, dogs barking and noise from passing trucks. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
Wireless motion detector that notifies the owner of the first signs of home or office intrusion. The detector is fastened to the wall in front of the doors and other places likely of intruder entry. Principle of operation The device detects human presence by IR level using a passive IR sensor. The data received is digitally processed in order to prevent false alarms. Features The device automatically increases or decreases the sensor sensitivity in order to accurately detect motion during hot and cold weather. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
Wireless outdoor motion detector with intelligent protection against false alarms. The device operates at low temperatures and is protected against dust and splashes. Accurately detects people LISA turns MotionProtect Outdoor into a formidable barrier for intruders. The digital algorithm accurately identifies the movement of a person while ignoring animals, swaying of trees and plants as well as birds and insects that land on the detector. Prevents intrusions invisible with the naked eye The MotionProtect Outdoor features the maximum possible protection for outdoor detectors. The anti-masking function, which in on around the clock by default, detects installation of barriers, pasting over, application of paint or transparent coating on one or two lenses. The integrated tamper alarms if the dust- and moisture-proof detector body is opened. Grade 3 anti-masking Detects painting and pasting of the detector Protection against unauthorized opening Ready to operate straight out the box MotionProtect Outdoor comes with pre-installed battery, so you do not need to disassemble it. The detector can be connected to the hub by one click in the mobile application. It can be mounted at a height of 0.8 to 1.3 meters on the SmartBracket in just a few minutes. Although the complete battery life is 5 years, it is possible to connect external power supply.Add to Compare
Wireless motion detector with microwave sensor that notifies the owner of first signs of home or office intrusion. Designed for rooms with air conditioners, fireplaces and where there is a likelihood of light flickering, glare and reflections. Principle of operation Detects human presence by temperature difference with background thermal radiation. The microwave sensor prevents false alarms caused by complex interference. Features Designed for operation in rooms with fireplaces and air conditioners. Detects and ignores draughts, movement of curtains and blinds, and light flickering, glare and reflections. Installation and set up Ready to operate straight out the box. The battery is already installed inside, therefore there is no need to disassemble the detector. It can be mounted in just a few minutes using the SmartBracket mount.Add to Compare
Wireless combined motion and glass break detector. The device helps to secure the room from intruders entering through doors and windows, and monitors the current state of the glass. Principle of operation The device combines the functions of two detectors — motion detector and glass break detector. It detects motion in the room at a distance of up to 12 m and registers broken glass at a distance of up to 9 m from the window. Features The device detects motion even in hot climates by means of temperature compensation. It filters false alarms caused by thunder, dogs barking or the sound of passing trucks. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutesAdd to Compare
Wireless opening detector notifies of first signs of intrusion into the room through the door or window. It is installed even on roof windows which can be left open when leaving the house. Principle of operation The device detects the door or window being opened by means of British-made hi-end reed switches on which the magnetic field acts. It can operate in the transmitter mode, sending a signal from the wired sensor to the hub. Features The device protects even windows left open for ventilation. The accelerometer registers changes in vertical slope angle, bangs or vibration and sends an alarm to the hub. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
Wireless flood detector detects first signs of leakage within milliseconds. It is installed without using tools. Principle of operation The device detects first signs of flooding as soon as water gets on one of the four pairs of contacts on the bottom of the detector. Features The device has IP65 enclosure protection, meaning it is completely protected against dust and moisture. Installation and set up It can be installed in just one minute. The detector only has to be placed on the floor under a washing machine, dishwasher, bathtub or heating radiator.Add to Compare
Wireless opening detector that notifies of first signs of room intrusion by means of a broken door or window. It can be mounted on all types of doors including a metal base. Principle of operation The device detects the door or window being opened by means of British-made hi-end reed switches on which the magnetic field acts. It can operate in the transmitter mode, sending a signal from the wired sensor to the hub. Features The device consists of two modules — detector and magnet. The set includes two magnets: the big magnet is installed at a distance of up to 2 cm, and the small magnet up to 1 cm. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
Wireless fire detector with temperature sensor that monitors security in the room twenty four hours a day and immediately notifies of smoke and sharp jumps in temperature. Principle of operation The device detects smoke by means of a camera with photoelectric sensor. If no smoke is emitted, the additional detector registers temperature increase in the room. Features It can operate independently from the hub, emitting a fire alarm by means of a built-in siren. Several detectors indicate an alarm simultaneously. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
Wireless fire detector with temperature and carbon oxide sensors that monitors security in the room twenty four hours a day and immediately notifies of dangerous CO levels, smoke and sharp jumps in temperature. Principle of operation The device detects smoke by means of a camera with a photoelectric sensor. An additional chemical element detects carbon oxide and raises the alarm. Features It can operate independently from the hub, emitting a fire alarm by means of a built-in siren. Several detectors indicate an alarm simultaneously. Installation and set up Ready to operate straight out the box: the battery is already installed, therefore there is no need to disassemble the detector. With one click, it can be connected to the hub in the mobile application. It can be mounted on the SmartBracket in just a few minutes.Add to Compare
MotionCam is a wireless motion detector with visual alarm verification for indoor use. It operates for up to 4 years on bundled batteries, detects movement at up to 12 meters, ignores animals, but recognizes a human move instantly. MotionCam works within Ajax security systems, connecting to a hub through the two secure radio protocols. The detector uses Jeweller to transmit alarms and events, and Wings to transmit photos. Wireless coverage may reach up 1,700 m line-of-sight. The infrared sensor of MotionCam detects intrusion into the secured premises by identifying moving objects with a temperature close to that of the human body. The temperature compensation function makes the detector effective inside premises with temperature ranging from 0 to +40°C. If placed and adjusted properly, MotionCam ignores pets. When movement is detected, the armed detector instantly transmits an alarm signal to the hub. The hub activates the connected sirens and notifies the user and the security company. MotionCam uses Jeweller radio protocol to transmit alarms and events to the hub. The built-in MotionCam camera can take from 1 to 5 shots with the resolution of 320×240 and up to 3 shots with the resolution of 640×480 pixels. A series of photos is displayed in the app as an animation, so the user is able to evaluate the unfolding of the event over time. Photos are available both in Ajax apps and on the Central Monitoring Station software of the security company. MotionCam uses Wings radio protocol to transmit photos to the hub. The detector features infrared illumination for shooting in the dark, which is activated only when triggering.Add to Compare
Browse Intruder Detectors & Detection Systems
- PIR Detectors
- Glassbreak Detectors
- Shock Sensor
- Pet Tolerance
- Infra Red Beams
Intruder detector products updated recently
Today’s organisations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimising disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarise and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labelled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customised and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimise disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.
The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centres have become even more critical to modern society. The processing and storage of information underpin the economy, characterised by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centres classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cyber Security Centre (NCSC), and the Centre for the Protection of National Infrastructure (CPNI). As land continues to surge in value, data centre operators are often limited for choice, on where they place their sites and are increasingly forced to consider developed areas, close to other infrastructures, such as housing or industrial sites. Complex security needs One misconception when it comes to data centres is that physical security is straightforward One misconception when it comes to data centres is that physical security is straightforward. However, in practice, things are far more complex. On top of protecting the external perimeter, thought must also be given to factors, such as access control, hostile vehicle mitigation (HVM), protecting power infrastructure, as well as standby generators and localising security devices to operate independently of the main data centre. Face value How a site looks is more important than you may think. Specify security that appears too hostile risks blatantly advertising that you’re protecting a valuable target, ironically making it more interesting to opportunistic intruders. The heightened security that we recommend to clients for these types of sites, include 4 m high-security fences, coils of razor wire, CCTV, and floodlighting. When used together in an integrated approach, it’s easy to see how they make the site appear hostile against its surroundings. However, it must appear secure enough to give the client peace of mind that the site is adequately protected. Getting the balance right is crucial. So, how do you balance security, acoustics and aesthetics harmoniously? Security comes first These are essential facilities and as a result, they require appropriate security investment. Cutting corners leads to a greater long-term expense and increases the likelihood of highly disruptive attacks. Checkpoints Fortunately, guidance is available through independent accreditations and certifications, such as the Loss Prevention Certification Board’s (LPCB) LPS 1175 ratings, the PAS 68 HVM rating, CPNI approval, and the police initiative - Secured by Design (SBD). Thorough technical evaluation and quality audit These bodies employ thorough technical evaluation work and rigorous quality audit processes to ensure products deliver proven levels of protection. With untested security measures, you will not know whether a product works until an attack occurs. Specifying products accredited by established bodies removes this concern. High maintenance Simply installing security measures and hoping for the best will not guarantee 24/7 protection. Just as you would keep computer software and hardware updated, to provide the best level of protection for the data, physical security also needs to be well-maintained, in order to ensure it is providing optimum performance. Importance of testing physical security parameters Inspecting the fence line may seem obvious and straightforward, but it needs to be done regularly. From our experience, this is something that is frequently overlooked. The research we conducted revealed that 63% of companies never test their physical security. They should check the perimeter on both sides and look for any attempted breaches. Foliage, weather conditions or topography changes can also affect security integrity. Companies should also check all fixtures and fittings, looking for damage and corrosion, and clear any litter and debris away. Accessibility When considering access control, speed gates offer an excellent solution for data centres. How quickly a gate can open and close is essential, especially when access to the site is restricted. The consequences of access control equipment failing can be extremely serious, far over a minor irritation or inconvenience. Vehicle and pedestrian barriers, especially if automated, require special attention to maintain effective security and efficiency. Volume control Data centres don’t generally make the best neighbours. The noise created from their 24-hour operation can be considerable. HVAC systems, event-triggered security and fire alarms, HV substations, and vehicle traffic can quickly become unbearable for residents. Secure and soundproof perimeter As well as having excellent noise-reducing properties, timber is also a robust material for security fencing So, how do you create a secure and soundproof perimeter? Fortunately, through LPS 1175 certification and CPNI approval, it is possible to combine high-security performance and up to 28dB of noise reduction capabilities. As well as having excellent noise-reducing properties, timber is also a robust material for security fencing. Seamlessly locking thick timber boards create a flat face, making climbing difficult and the solid boards prevent lines of sight into the facility. For extra protection, steel mesh can either be added to one side of the fence or sandwiched between the timber boards, making it extremely difficult to break through. A fair façade A high-security timber fence can be both, aesthetically pleasing and disguise its security credentials. Its pleasant natural façade provides a foil to the stern steel bars and mesh, often seen with other high-security solutions. Of course, it’s still important that fencing serves its primary purposes, so make sure you refer to certifications, to establish a product’s security and acoustic performance. Better protected The value of data cannot be overstated. A breach can have severe consequences for public safety and the economy, leading to serious national security implications. Countering varied security threats Data centres are faced with an incredibly diverse range of threats, including activism, sabotage, trespass, and terrorism on a daily basis. It’s no wonder the government has taken an active role in assisting with their protection through the medium of the CPNI and NCSC. By working with government bodies such as the CPNI and certification boards like the LPCB, specifiers can access a vault of useful knowledge and advice. This will guide them to effective and quality products that are appropriate for their specific site in question, ensuring it’s kept safe and secure.
On May 20 at 12:00 p.m. EEST, Ajax Systems will hold a big virtual presentation of new products. Partners and users will be able to see the new devices that the company has been working on lately and learn everything about them. Ajax Special Event 2021 This time, the show will be broadcasted in 13 languages, including English, Spanish, Italian, Turkish, French, German, Dutch, Arabic, Portuguese, Polish, Romanian, Ukrainian, and Russian. Attendees will also have the opportunity to choose their preference of language, before the presentation starts. The Ajax Special Event is completely free to attend. In order not to miss the presentation, interested individuals can register online on the official website and add the event to their calendar. Hub 2 Plus with LTE support and MultiTransmitter It will be the second Special Event by Ajax Systems. Last year, the company presented a vast range of new features, ranging from two-factor authentication to the much sought-after data import functionality from one hub to another. In addition, Ajax team introduced the new Hub 2 Plus with LTE support and the MultiTransmitter, a module for renovation of old wired alarms, which lets integrating wired detectors into the Ajax system and controlling them via the app.
The Croatian defender and UEFA Cup winner Darijo Srna will become the brand ambassador of the Ukrainian security systems manufacturer Ajax Systems in Croatia. The slogan of the campaign is “Ajax. My defence tactics.” “Darijo is a world football legend and a real superstar in Croatia. His brand ambassador status will bring further momentum to the Ajax promotion in the Adriatic market,” Ajax Systems CMO, Valentine Hrytsenko. “I have a smart Ajax security system at home, and now even when I am at training camps or on long trips I can rest assured that my home and my loved ones are well-protected. It’s convenient that the system is controlled with an app on my smartphone — this allows me to manage the household security from anywhere in the world,” Darijo Srna. Darijo’s recommendations As part of the campaign launch, a series of digital activities was scheduled as well as exclusive merchandise and materials were prepared for Ajax B2B partners. The main campaign goal is to enhance and consolidate the company’s standing in the Adriatic region. In addition to being an Ajax user himself, in the past Darijo also recommended the system to his former teammate Paulo Fonseca, the ex-coach of Shakhtar, whose home was robbed. After the incident, an Ajax system was sent to Fonseca to Italy as a gift: it was installed in his home for protection against any possible accidents. The Adriatic market Ajax Systems entered the Adriatic market in 2017. One of the most important achievements of the company on the market is its partnership with Alarm Automatika, the largest distributor of security equipment in the region. The global goal of Ajax is to become the #1 brand in its segment. To make professional security comfortable for users and give installers the opportunity to work with user-friendly, innovative equipment that has no compromises on reliability.
Ajax Systems, a smart security systems developer, has acquired the engineering team of Concepter, a design and product development studio. The Concepter developers will become members of various R&D teams at Ajax Systems and will work on new devices. "We’ve added the Concepter developers to the Ajax Systems team to boost our growth and engineering capabilities. The Concepter specialists have plenty of experience in handling complex custom projects. We’re excited that they will continue creating cool products with us. Our global goal is to find talent and create a new engineering elite in the country. We want to double our R&D by the end of the year”, states Aleksandr Konotopskyi, CEO at Ajax Systems. Engineering capabilities The Concepter team is one of the best in Ukraine and is very complimentary of Ajax Systems" The company is actively seeking such engineering teams. The Ajax technology stack includes Embedded C, Python, RTOS, Java, Kotlin, Swift, Objective C, STMicroelectronics, Texas Instruments. “The Concepter team is one of the best in Ukraine at building the hardware and is very complimentary of Ajax Systems. I’m sure that the engineering capabilities of Ajax Systems will be greatly enhanced by the Concepter. As for me, I plan to focus on investments at SMRK in the future. The Concepter brand will continue to exist, but it will be handled by a different team”, says Vlad Tislenko, CEO at Concepter. Consults product startups Recently, Ajax Systems announced the opening of a new R&D office in Vinnytsia. The company’s other two R&D offices are located in Kharkiv and Kyiv. Concepter is a Ukrainian studio that creates its own gadgets and also promotes and consults product startups. Concepter has over 20 products in its portfolio, including the world-famous Nect, iBlazr 2, Nuka, and iGlam. Also, the studio has won the prestigious international awards Red Dot Design Award, Best of CES, etc.
Related white papers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
Empowering cameras with AIDownload
The rise of ethical facial recognitionDownload
Connected video technology for safe citiesDownload
Webcast: Access control integration increases security while reducing costsDownload
‘We want to become better known for access control’ - Q&A with Bosch Building Technologies’ Gregor Schlechtriem
- Vanderbilt provides SPC system to enhance access control system at the Maritime Culture Center
- TiOC 2.0: Customisable security alarm system made possible by Dahua
- HAECO automates its tool control for aircraft maintenance, repair and overhaul (MRO) services with Xerafy's RFID solution
- Ajax protects the Vernadsky Research Base with fire detectors and fire alarm systems