Upon detection, intrusion information is sent directly to patrol vehicles, operation centers or security forces. Each sensor location has a specific address, enabling personnel to respond to that location or situation as it develops.
Quickly and easily deploy sensor networks that act as a long or short term force multiplier for monitoring critical infrastructures and remote areas.
System deployments for local, state and federal applications are available.
Monitor suspect activity in your target area using an array of common devices including Google Maps, text messages, emails and pagers. Capture sensor activity over long periods of time for backup, analysis and reporting. Easily share data among departments and organizations.