Industrial & commercial security applications - Case studies
Reliance Group's revenue is equivalent to 3.5% of India's GDP. The Group contributes nearly 10% of the country's indirect tax revenues and over 6% of India's exports. Reliance continues to go from strength to strength with Cardax as its integration platform.From late 1999 to 2002 Reliance Infocomm built the backbone for a digital India - 60,000 kilometres of fibre optic backbone, crisscrossing the entire country.The Reliance Group, founded by Dhirubhai H. Ambani (1932-2002), is India's lar...
Zoom lenses from Rainbow CCTV have recently been installed at the Monroe Power Plant on the shores of Lake Erie in Michigan.This 3,000-megawatt facility run by DTE Energy is America’s fourth largest coal-fired plant and is at the forefront of President Bush’s initiatives for clean coal technology. The site has been visited by the President who addressed staff and local community leaders about ongoing work to modernize the electricity grid, create conditions for job growth and ensure...
ANSTO manages high and medium security areas on the one system platform, Cardax FT.ANSTO's visionOur vision is to benefit all Australians and the international community through the innovative applications of nuclear science and technology and for ANSTO to be recognised as a leader in selected fields of expertise.For the future, ANSTO is interested in the direction biometrics is taking, in particular, iris scanning. With the Cardax FT platform, ANSTO knows it will be possible to integrate biomet...
We rely on them every day. Every day, they rely on PowerFence™ systems from Gallagher Security Management Systems."The fence system is safe. Gallagher Security Management Systems' Code of Practice exceeds installation codes of practice which currently exist around the world."The ChallengeGallagher technology has successfully secured hundreds of utilities sites across Europe, USA, Africa, Australia, New Zealand and Asia.Utilities are critical infrastructures that affect us all. Ke...
One system, one card
DownloadEnhancing physical access control using a self-service model
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadHow to implement a physical security strategy with privacy in mind
Download