SAC2S
Innovative “Security Area Command & Control System”
What is SAC2S
SAC2S is an innovative integrated security command and control system. Robust high-end security devices and secure technologies combined with extreme manageability offer next-gen area security and protection, advanced control over the system and personnel and immediate and accurate command of operations. SAC2S is to be the powerful weapon for shielding any high interest facility from threats of any kind. Such threats are:
- Terrorism
- Theft
- Physical Disaster
- Military threat
- Espionage
- Sabotage
Alert
Any intrusion attempt and generally any change of the system initial state will produce an event that will be displaced at the Command Room Screen. The event is accompanied with appropriate evaluation comments. The system manages low threat events automatically or triggers a precaution alarm.
The perimeter IDS and the RVS give an accurate location of the intrusion attempt while the mobile Emergency Response Teams (ERT) receive instructions wireless from the system and/or the operator for handling the intrusion attempt in the most efficient way.
ACS restricts the unauthorized entrance or exit at the facility or at buildings. Invalid answers to questions like “who is where” or “what he holds” produce an event or alarm and the ERTs undertake to identify the person or the contraband items via mobile access control identification devices.
Reaction
The ERTs are actually considered being the precaution and the real action principle consisting of personnel in continuous readiness and responsible to react immediately to any incident occurs in the area. The ERT equipment includes night vision goggles for identifying an object or person in dark night and Mobile workstations with a GIS representation for receiving/transmitting data in a secure wireless way from/to the Command & Control Center.
Key Features
- Addressing all security operations.
- Scalable, Extendible and Reliable.
- Sophisticated and Modern.
- Automated and Distributed.
- Fully Integrated.
Principles
Sensing, Surveillance and Access Control, the three main operational principles of security systems, are applied by complementary devices, in a multilayer onion-like strategy that is supported by a robust and redundant integrated information system.
Intrusion Sensing
The sensing needs are fully served in a reliable way by the installation of perimeter and indoor Intrusion Detection Systems (P-IDS and I-IDS) combined with the Access Control system (ACS).
Actual and/or virtual fences are created at the perimeter and the inner vital areas (areas of high interest and/or risk) deterring and assuming any possible intrusion attempt. Once any fence is compromised an alarm is triggered and the event is automatically displayed at the C&C room defining the position, severity and characteristics of the intrusion. More in-depth protection is provided by the indoor IDS, which produces an alarm whenever a building or office is violated or an invalid entrance attempt is observed. ACS inhibits the unauthorized entrance of personnel or visitors to the facility (gates) and to buildings and/or rooms.
Intrusion Surveillance
A Radar Video Surveillance (RVS) system covers and monitors open space enabling the detection and tracking of any moving object, person or vehicle at the inner area. RVS provides complete situation awareness by displaying a birds-eye view of the area with an overlay of all sensors. Once an alarm is produced, RVS undertakes to direct the cameras to the precise position for detecting and tracking efficiently and in real time the intruder within the area. Data concerning the intrusion position and progress are displayed at the command room and sent to the mobile Emergency Response Teams (ERT) enabling their prompt intervention.
Access Control
ACS provides an in depth entrance control of personnel and visitors restricting the entrance or exit at the facility. Unauthorized entrance attempt is immediately detected and followed by an alarm production. ACS answers the question “who is where” providing an overall personnel and visitor management. Items like weapons, metals or abandoned luggage are consider as contraband items and are detected via metal detectors, package search or explosive detectors.
Integation in the Command Center
In the C&C Center, the heart of the system, lie powerful machines that collect the distributed information produced by the devices. This information is filtered and processed by the integration and management software through advanced algorithms and parameterized rules to be presented clearly.
Alert
Any intrusion attempt and generally any change of the system initial state will produce an event that will be displaced at the Command Room Screen. The event is accompanied with appropriate evaluation comments. The system manages low threat events automatically or triggers a precaution alarm.
The perimeter IDS and the RVS give an accurate location of the intrusion attempt while the mobile Emergency Response Teams (ERT) receive instructions wireless from the system and/or the operator for handling the intrusion attempt in the most efficient way.
ACS restricts the unauthorized entrance or exit at the facility or at buildings. Invalid answers to questions like “who is where” or “what he holds” produce an event or alarm and the ERTs undertake to identify the person or the contraband items via mobile access control identification devices.
Reaction
The ERTs are actually considered being the precaution and the real action principle consisting of personnel in continuous readiness and responsible to react immediately to any incident occurs in the area. The ERT equipment includes night vision goggles for identifying an object or person in dark night and Mobile workstations with a GIS representation for receiving/transmitting data in a secure wireless way from/to the Command & Control Center.