Senstar, a global provider of perimeter intrusion detection and video management solutions, is pleased to announce it has achieved General Services Administration (GSA) approval.

The GSA is the purchasing department of the U.S. Government and GSA approval is a status used for organisations that have been accepted to sell to federal, state, and local agencies. Through the GSA Advantage (an on-line catalog, information, and ordering system) government customers have the ability to quickly search, compare and order products and services which best meet their needs.

Total solutions for law enforcement

Senstar products are now available in GSA Schedule 84 - Total Solutions for Law Enforcement, Security, Facilities Management, Fire, Rescue, Clothing, Marine Craft and Emergency/Disaster Response.

Senstar has been protecting assets for the US Government for many years and GSA approval is recognition that our products have been reliable and effective,” said Kristen Cory, VP of Sales of North America. “Accessing Senstar products has just become easier for our US government customers, and we look forward to new and continued partnerships.” Find Senstar products under contract 47QSWA20D001P. Contract is valid until November 20, 2024.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...