According to the defined security strategy to protect the environment, you can have the following protection systems:
The images of protected areas are captured by cameras and sent via the existing infreestructura to storage equipment. Saved images can be played locally or remotely; and it is possible to reproduce images on monitors in real time. The basic architecture of this type of services includes (fixed, pan-tilt-zoom and dome) cameras, one composed of coaxial cable or UTP and recording devices (DVRs, NVRs, servers, storage) infrastructure.
As technology offer solutions up to 3 types of constraints: proximity, biometrics and keyboard. Proximity technology card requires for its operation, requires biometric fingerprint or iris recognition technology while keyboard requires entering a personal password to open. The service of such solutions include biometric readers, electromagnetic locks, switches output; which are connected to a panel composed by a manuSystem Intrusion
Sensors and devices chosen for a particular solution are individually associated with an intrusion panel area. The panel notified by an audible signal and textual activating a device. Intrusion System enabled devices comprise dry contact as Pirs, magnetic contacts, sensors waterlogging, perimeter barriers, pushbuttons assault, among others. the hang independently enabled devices to each zone panel intrusion, locally and remotely cua notifies the occupants of the activated events.