SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

How the Ajax security systems protect the works of world artists during the war

How the Ajax security systems protect the works of world artists during the war
Contact company
Contact Ajax Systems
icon Add as a preferred source Download PDF version
Related Links
  • Ajax protect's mushroom farm's greenhouses and preserves the crop

Art spaces with valuable exhibits are always a challenge for the security industry.

Mobile constructions, architectural features, and a great number of visitors require flexible solutions for complex protection.

Module of temporality (MOT) 

Module of temporality (MOT) is a 417 m2 exhibition space. It consists of 27 metal containers.

There are paintings, sculptures, installations, and audiovisual works of 28 artists from 10 countries inside the containers. The exhibition is devoted to the theme of Russian aggression against Ukraine.

Relocation of art space

Unlike classical museums, MOT containers are situated right in the middle of the square in the centre of Kyiv.

The exhibition doors are open to the general public 7 days a week for three months. After that, the art space will be taken apart and then put back together in a new location.

Ajax security system

Challenge

Protection of the exhibits and metal constructions with the possibility of relocation of the security system.
  • Organising a stable radio signal:

The signal is additionally weakened by metal objects inside the space

All walls and slabs are made of metal. This material screens and weakens the radio signal. On top of that, the signal is additionally weakened by metal objects inside the space.

Thus, to provide a powerful radio signal, engineers needed to calculate the exact number and optimal location of all detectors and range extenders at the site.

  • Providing mobility for relocation:

MOT exhibition is planned to be presented in different countries. However, to relocate it, organisers have to dismantle all constructions together with the security system.

The location of containers may change, yet, despite all changes, the security system should provide a stable radio signal.

Ajax security system

Ajax security system has been trusted to protect them against damage, theft, or flooding"

“The fundament of our project is an international exhibition for which many artists created and provided works devoted to the theme of temporality. Even though it is unusual for each of them to present their works in a country that is at war and where it is impossible to insure the works of art, they entrusted us with their precious paintings, installations, and sculptures."

"The Ajax security system has been trusted to protect them against damage, theft, or flooding, allowing the team of the project to monitor the space day and night and even remotely control the devices.”

Team don’t Take Fake 

Why Ajax

  • Safety: Powerful radio signal under any circumstances using Jeweller radio communication technology. Detectors will work stably using range extenders if the distance between the containers increases.
  • Mobility: In case of exhibition relocation and re-installation, the security system will keep the same settings and will not need a new configuration.
  • Comfort. Being able to control the security system from a smartphone allows the MOT team to quickly activate or deactivate the system without turning to specialists.
  • Design: The room is equipped with LightSwitch devices, which are organically combined with the design of the art space.

Painting and installation

Solution

  • Hub 2 Plus

Installation engineers used a control panel Hub 2 Plus. This model can support a far greater number of security devices and user groups.

The reception staff, office staff, and hall wardens use a wireless touch keypad KeyPad Plus to enter the exhibition’s territory and office space. It is not necessary for staff to have an Ajax app, it is enough to know the code.

  • ReX 2

Ajax’s engineers installed range extenders in a way that allows all 62 detectors to receive the same stable radio signal

To increase the strength of a signal, 2 range extenders ReX 2 were installed on different exhibition floors.

Ajax’s engineers installed range extenders in a way that allows all 62 detectors to receive the same stable radio signal.

  • DoorProtect Plus and CombiProtect detectors

25 DoorProtect Plus detectors were used to protect windows and doors. The detectors were installed on windows and glass constructions.

Moreover, 12 CombiProtect detectors, which detect motion and glass break, were placed inside the premises.

Hub 2 Plus

  • StreetSiren

If any of the detectors are triggered, the StreetSiren, which is attached to the outer part of one of the containers, activates.

Organisers also use a third-party CCTV system that has been integrated into the Ajax application.

  • Smart LightSwitch switches

Organisers control the lighting through the Ajax app and use automation scenarios

20 smart LightSwitch switches, 2 two-gang, and 18 one-gang switches were used to adjust the light inside the premises.

Organisers control the lighting through the Ajax app and use automation scenarios for smart lighting.

  • LeaksProtect detectors

Besides the exhibition area, there is an office, a reception, a boiler room, and a restroom in the MOT territory.

Sanitary areas have been equipped with two LeaksProtect detectors for leak detection.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Remote video surveillance
  • Electronic security systems
  • Residential security systems
  • Office security systems
  • Retail security systems
  • Shop security systems
  • Library security systems
  • Construction security systems
  • Campus security systems
  • Office security
  • Airport security
  • Application security
  • Physical security
  • Industrial security
  • Remote security
  • Mall security
  • Hotel security
  • Hospital security
  • Aviation security
  • Prison security
  • Commercial security
  • Perimeter security
  • Casino security
  • Factory security
  • Private sector security
  • Public sector security
  • Shopping centre security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Voice recognition systems
  • Vehicle tracking
  • Video analytics
  • Remote video monitoring
  • Metal detectors
  • Stadium security
  • Security seals
  • Building security
  • Facility security
  • Security training
  • School security
  • Institute security
  • Public security
  • Industrial security systems
  • Retail security
  • Wireless security
  • Door security
  • Security software
  • Security service
  • Hybrid security
  • Museum surveillance
  • Museum security
  • Beach security
  • Green security
  • IP security solutions
  • Security communication
  • Event security
  • Cyber security
  • Border Security
  • Corporate Security
  • Outdoor Security
  • Indoor Security
  • Home Security Systems
  • Fingerprint Locks
  • Data Security
  • Network Video Recorders
  • Warning Devices
  • Oil & Gas Security
  • Security Assessments
  • Cloud security
  • Video surveillance
  • Related links
  • Ajax Intruder alarm communicators
  • Ajax Intruder alarm system control panels & accessories
  • Ajax Intruder detectors
  • Ajax Intruder warning devices
  • Related categories
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • Intruder alarm communicators
  • Intruder warning devices
  • CCTV cameras
  • Digital video recorders (DVRs)
  • Electronic locking devices
  • IP cameras
  • Network video recorders (NVRs)
  • Video signal devices & accessories
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Hotels, Leisure & Entertainment
About this page

"Ajax security systems protect the works of world artists in MOT" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from Ajax Systems.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec