SlideShare une entreprise Scribd logo
1  sur  26
SIS Group International




PRIVATE RESIDENCE
COMPLEX SECURITY.
 Technical solutions
                               1
Threat…



Severe competition




Criminal world having plenty of money



Possibility to purchase modern weapon



Busy local law enforcement bodies




                                              2
As the experts put it: nowadays
criminal acts

• are prepared at high professional
  level,
• usually have a system approach,
• are often committed with
  cruelty.




                                      3
The security service must always be alert.
        We will equip them with modern technologies!



                 WHO
               will attack?


                                WHERE
 WHEN
                               will attack?
will attack?


                   HOW
                will attack?




                                                    4
You suppose that you are safe?
Wу will equip you security service with
               the latest technologies.




                                      5
SIS Group offers




Running peculiarities
of the residence
                                                   Hardware
                        Complex Technical
Environment                  Solution
peculiarities of the
residence                 for the security
                         of your residence
                                                   Software
Location of the
residence




                                                              6
Complex technical solution
                       for the security of your residence


2 security barriers at the approaches
1) Exterior perimeter protection
2) Video surveillance with video analytics

Interior territory surveillance
• Private zones


Construction safety
• Rooms safety
• Access restriction
• Video surveillance




                                                        7
Security barriers at the approaches


                   Perimeter safety




            Video surveillance with
                video analytics



                                      8
Interior territory surveillance

Private zones        Construction safety




                            Безопасность на
                            Внутренней территории




                                                9
Trespassing




          10
Solution:
                       Video surveillance and perimeter defense
                                                complex system
Video surveillance system

                          Infrared band reveals
                           Cars at up to 5.5 km distance,
                           People at up to 2 km distance.      Are used
                          Visible band reveals                  together
                           Cars at up to 9 km distance,
                           People at up to 7 km distance.



 Video analysis – automatic recognition of certain objects (transport, people)
and their movement patterns.

• does not depend on operator’s attention,
• increases the quality of the Security service,
• saves money on Security service staff.




                                                                                 11
Vehicle passage attempt




                      12
Solution:
                              Car and its underbody examination
                                        •   Underbody picture displaying

                                        •   Front picture displaying
                                        •   Number plate
                                        •    Date and time
                                        (all the parameters are adjustable)




•   Automatic image comparison for
    repetitively passing cars.

•   Actual and archived images
    comparison for the same car.




                                                                              13
Eavesdropping




            14
Solution:
                                                             Debugging systems

Portable debugging system

•   Reveals concealed electronic devices (radio and video
    transmitters, Infrared radiators) indoors, in
    telephones, on people, etc.
•   Tests telephone and electricity
    sockets, cables, suspicious wires.
•   Reveals sound leakage spots – ventilation, pipes, etc.
•   Fins a place to locate acoustic disturbance generator.




                          Non-linear debugging system
                          •  Detects even switched off devices.


                          Acoustic disturbance generator
                          •  Blocks any radio transmitters work.
                          •  Creates a zone, within which no information transfer is
                             possible.



                                                                                       15
Illegal observation




                 16
Solution:
                              Concealed video cameras detection

Optical lens infrared detector

•   Detects concealed cameras installed secretly in
    furniture, walls, etc.
•   The device amplitude is up to 20 m, the most
    efficient amplitude is up to 6 m.
•   Detects optical devices
    (cameras, binoculars, scope sights) at large
    distance – up to 1 km.
•   The lens is located at the binocular screen.
•   The device can be used with different lighting –
    at bright day and at dark night.




                                                             17
Unauthorized information retrieval




                               18
Solution:
                                              Reliable data storage


•   Data      safety   at     hard     disk
    failure, power supply cut, etc.

•   Passwords     system   for   authorized
    access.

•   Intrusion-via-the-Internet protection:
    antivirus software, Firewall, etc.

•   Encryption.




                                                                 19
«Human factor»




             20
Solution:
                                      Unbiased monitoring system


•   All information record-keeping.


•   Video analysis that provides unbiased
    information about the object under
    observation.




                                                              21
Integrated technical center




Security
systems




Engineering
systems




                                       22
SIS Group guarantees




1. Consulting           4. Procurement




2. Engineering           5. Assembling




3. Design               6. System launching




                                         23
SIS Group experience




23 companies in
   7 countries worldwide


Customers in East and West
Europe, Asia, Africa




                                                24
Our aim is:
Foresee criminal intensions
     and prevent intrusion!




                           25
Contacts

Andrei Ponomarev
Chief Business Development Officer

Managing company of SIS Group International
ul. Odoyevskogo, 131
220015, Minsk, Belarus

Phone: +375 (17) 259 13 09
Fax:    +375 (17) 259 13 00
Mobile: +375 (29) 7600209
E-mail: andrei.ponomarev@sis.com.by

www.sis-group.com




                                                    26

Contenu connexe

Tendances

Assignment sheet cctv
Assignment sheet cctvAssignment sheet cctv
Assignment sheet cctvAnuragSagar8
 
4. vdfd xl love is blind
4. vdfd xl love is blind4. vdfd xl love is blind
4. vdfd xl love is blindIlias Varsamis
 
D-Fence security book
D-Fence security bookD-Fence security book
D-Fence security bookGirish Nair
 
Ultimate Surveillance Solution
Ultimate Surveillance SolutionUltimate Surveillance Solution
Ultimate Surveillance Solutiondplsurve
 
1 vdfd xl bandit camera
1  vdfd xl bandit camera1  vdfd xl bandit camera
1 vdfd xl bandit cameraIlias Varsamis
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseVideoguy
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-AJim Stockstill
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-nyjcaire
 
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...mfrancis
 
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg122. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12CRISP Project
 

Tendances (19)

Assignment sheet cctv
Assignment sheet cctvAssignment sheet cctv
Assignment sheet cctv
 
4. vdfd xl love is blind
4. vdfd xl love is blind4. vdfd xl love is blind
4. vdfd xl love is blind
 
Security Products
Security ProductsSecurity Products
Security Products
 
D-Fence security book
D-Fence security bookD-Fence security book
D-Fence security book
 
Ultimate Surveillance Solution
Ultimate Surveillance SolutionUltimate Surveillance Solution
Ultimate Surveillance Solution
 
1 vdfd xl bandit camera
1  vdfd xl bandit camera1  vdfd xl bandit camera
1 vdfd xl bandit camera
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
 
5. vdfd xl burglar
5. vdfd xl burglar5. vdfd xl burglar
5. vdfd xl burglar
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of Defense
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
WI-FI Security in Jersey 2011
WI-FI Security in Jersey 2011WI-FI Security in Jersey 2011
WI-FI Security in Jersey 2011
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Product Protection
Product ProtectionProduct Protection
Product Protection
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-ny
 
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
OSGi Technology and IP-Based Video Surveillance in HomeSecurity, Access Contr...
 
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg122. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
 
File000136
File000136File000136
File000136
 
Algont
AlgontAlgont
Algont
 

Similaire à Private residence complex security. Technical solutions

CCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible ProtectorsCCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible ProtectorsMagnumSecurity1
 
ParanaVision Presentation (English)
ParanaVision Presentation (English)ParanaVision Presentation (English)
ParanaVision Presentation (English)Alphan Manas
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptxMathanE5
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 
Indigo Vision - Complete Solution Portfolio
Indigo Vision -  Complete Solution PortfolioIndigo Vision -  Complete Solution Portfolio
Indigo Vision - Complete Solution PortfolioClaudiu Sandor
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochurewilnet40
 
Diva Presentation
Diva PresentationDiva Presentation
Diva Presentationchriskovacs
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech BrandSimon Loe
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfLongJidin1
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillancebappyni
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualZTech Proje
 
Cisco Partner Solution Profile - Huneed
Cisco Partner Solution Profile - HuneedCisco Partner Solution Profile - Huneed
Cisco Partner Solution Profile - HuneedGlen Yi
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 

Similaire à Private residence complex security. Technical solutions (20)

CCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible ProtectorsCCTV Security Systems: Your Invisible Protectors
CCTV Security Systems: Your Invisible Protectors
 
SECURITY SYSTEM.pptx
SECURITY SYSTEM.pptxSECURITY SYSTEM.pptx
SECURITY SYSTEM.pptx
 
ParanaVision Presentation (English)
ParanaVision Presentation (English)ParanaVision Presentation (English)
ParanaVision Presentation (English)
 
NoxEye.pptx
NoxEye.pptxNoxEye.pptx
NoxEye.pptx
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Indigo Vision - Complete Solution Portfolio
Indigo Vision -  Complete Solution PortfolioIndigo Vision -  Complete Solution Portfolio
Indigo Vision - Complete Solution Portfolio
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochure
 
Diva Presentation
Diva PresentationDiva Presentation
Diva Presentation
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech Brand
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillance
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
Cisco Partner Solution Profile - Huneed
Cisco Partner Solution Profile - HuneedCisco Partner Solution Profile - Huneed
Cisco Partner Solution Profile - Huneed
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 

Plus de SIS Group International

Siding rails integrated management system for the industrial enterprise
Siding rails integrated management system for the industrial enterpriseSiding rails integrated management system for the industrial enterprise
Siding rails integrated management system for the industrial enterpriseSIS Group International
 
Proposal for Railways: Business software and electronic devices
Proposal for Railways: Business software and electronic devicesProposal for Railways: Business software and electronic devices
Proposal for Railways: Business software and electronic devicesSIS Group International
 
Example Solutions for Scheduling and Work Planning
Example Solutions for Scheduling and Work PlanningExample Solutions for Scheduling and Work Planning
Example Solutions for Scheduling and Work PlanningSIS Group International
 
Ascada–lösung für die fernüberwachung und steuerung der wasserversorgung
Ascada–lösung für die fernüberwachung und steuerung der wasserversorgungAscada–lösung für die fernüberwachung und steuerung der wasserversorgung
Ascada–lösung für die fernüberwachung und steuerung der wasserversorgungSIS Group International
 
Integrated Railway Transport Management System
Integrated Railway Transport Management SystemIntegrated Railway Transport Management System
Integrated Railway Transport Management SystemSIS Group International
 

Plus de SIS Group International (8)

Siding rails integrated management system for the industrial enterprise
Siding rails integrated management system for the industrial enterpriseSiding rails integrated management system for the industrial enterprise
Siding rails integrated management system for the industrial enterprise
 
Proposal for Railways: Business software and electronic devices
Proposal for Railways: Business software and electronic devicesProposal for Railways: Business software and electronic devices
Proposal for Railways: Business software and electronic devices
 
Example Solutions for Scheduling and Work Planning
Example Solutions for Scheduling and Work PlanningExample Solutions for Scheduling and Work Planning
Example Solutions for Scheduling and Work Planning
 
Ascada–lösung für die fernüberwachung und steuerung der wasserversorgung
Ascada–lösung für die fernüberwachung und steuerung der wasserversorgungAscada–lösung für die fernüberwachung und steuerung der wasserversorgung
Ascada–lösung für die fernüberwachung und steuerung der wasserversorgung
 
Integrated Railway Transport Management System
Integrated Railway Transport Management SystemIntegrated Railway Transport Management System
Integrated Railway Transport Management System
 
SIS Group offer to TELECOMS
SIS Group offer to TELECOMSSIS Group offer to TELECOMS
SIS Group offer to TELECOMS
 
Bespoke electronic device design
Bespoke electronic device designBespoke electronic device design
Bespoke electronic device design
 
Telecommunication networks for railways
Telecommunication networks for railwaysTelecommunication networks for railways
Telecommunication networks for railways
 

Dernier

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Private residence complex security. Technical solutions

  • 1. SIS Group International PRIVATE RESIDENCE COMPLEX SECURITY. Technical solutions 1
  • 2. Threat… Severe competition Criminal world having plenty of money Possibility to purchase modern weapon Busy local law enforcement bodies 2
  • 3. As the experts put it: nowadays criminal acts • are prepared at high professional level, • usually have a system approach, • are often committed with cruelty. 3
  • 4. The security service must always be alert. We will equip them with modern technologies! WHO will attack? WHERE WHEN will attack? will attack? HOW will attack? 4
  • 5. You suppose that you are safe? Wу will equip you security service with the latest technologies. 5
  • 6. SIS Group offers Running peculiarities of the residence Hardware Complex Technical Environment Solution peculiarities of the residence for the security of your residence Software Location of the residence 6
  • 7. Complex technical solution for the security of your residence 2 security barriers at the approaches 1) Exterior perimeter protection 2) Video surveillance with video analytics Interior territory surveillance • Private zones Construction safety • Rooms safety • Access restriction • Video surveillance 7
  • 8. Security barriers at the approaches Perimeter safety Video surveillance with video analytics 8
  • 9. Interior territory surveillance Private zones Construction safety Безопасность на Внутренней территории 9
  • 11. Solution: Video surveillance and perimeter defense complex system Video surveillance system Infrared band reveals  Cars at up to 5.5 km distance,  People at up to 2 km distance. Are used Visible band reveals together  Cars at up to 9 km distance,  People at up to 7 km distance. Video analysis – automatic recognition of certain objects (transport, people) and their movement patterns. • does not depend on operator’s attention, • increases the quality of the Security service, • saves money on Security service staff. 11
  • 13. Solution: Car and its underbody examination • Underbody picture displaying • Front picture displaying • Number plate • Date and time (all the parameters are adjustable) • Automatic image comparison for repetitively passing cars. • Actual and archived images comparison for the same car. 13
  • 15. Solution: Debugging systems Portable debugging system • Reveals concealed electronic devices (radio and video transmitters, Infrared radiators) indoors, in telephones, on people, etc. • Tests telephone and electricity sockets, cables, suspicious wires. • Reveals sound leakage spots – ventilation, pipes, etc. • Fins a place to locate acoustic disturbance generator. Non-linear debugging system • Detects even switched off devices. Acoustic disturbance generator • Blocks any radio transmitters work. • Creates a zone, within which no information transfer is possible. 15
  • 17. Solution: Concealed video cameras detection Optical lens infrared detector • Detects concealed cameras installed secretly in furniture, walls, etc. • The device amplitude is up to 20 m, the most efficient amplitude is up to 6 m. • Detects optical devices (cameras, binoculars, scope sights) at large distance – up to 1 km. • The lens is located at the binocular screen. • The device can be used with different lighting – at bright day and at dark night. 17
  • 19. Solution: Reliable data storage • Data safety at hard disk failure, power supply cut, etc. • Passwords system for authorized access. • Intrusion-via-the-Internet protection: antivirus software, Firewall, etc. • Encryption. 19
  • 21. Solution: Unbiased monitoring system • All information record-keeping. • Video analysis that provides unbiased information about the object under observation. 21
  • 23. SIS Group guarantees 1. Consulting 4. Procurement 2. Engineering 5. Assembling 3. Design 6. System launching 23
  • 24. SIS Group experience 23 companies in 7 countries worldwide Customers in East and West Europe, Asia, Africa 24
  • 25. Our aim is: Foresee criminal intensions and prevent intrusion! 25
  • 26. Contacts Andrei Ponomarev Chief Business Development Officer Managing company of SIS Group International ul. Odoyevskogo, 131 220015, Minsk, Belarus Phone: +375 (17) 259 13 09 Fax: +375 (17) 259 13 00 Mobile: +375 (29) 7600209 E-mail: andrei.ponomarev@sis.com.by www.sis-group.com 26