Senstar’s strategy towards integration makes the selection of sensor products easy for security integrators
All the sensors are networked and integrated via StarNet, which serves a local PIDS SMS

Senstar Corporation announced recently that it has begun the delivery of a multi-layered Perimeter Intrusion Detection System (PIDS) for two new maximum security prisons in Latin America.

The core solution for both prisons is built around Senstar's sensors:

  • IntelliFiber fence mounted fiber-optic sensors;
  • Omnitrax buried cable as a covert detection layer between fences;
  • μltraWave microwave sensor as a virtual fence and gap filler, and;
  • Several third party hybrid MW/IR detectors.

All the sensors are networked and integrated via StarNet, which serves a local PIDS SMS (Security Management System), into a third party larger scope Command and Control system.

“Senstar’s strategy towards integration makes the selection of our sensor products easy for security integrators,” said Jonathan Murray, Marketing Director. “PIDS projects usually require a multilayered approach, so having a wide product range, supported by powerful integration tools gives integrators flexibility to tailor full security solutions.”

 

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...