Security Solutions

I3S is focused on providing security technologies that make residential and business environments safer and more efficient in their daily operation. We are specialized in various of the latest technologies and focus on providing security services to residential estates as well as large enterprises.

Biometric Access Control

Biometric access control refers to the management of an access point, such as a door, turnstile, elevator, etc Biometrics are the analysis of biological data using technology.

Typically, this data relates to specific physical traits that an individual might have. Hence, biometric access control is the use of this biological data to either grant or deny access to a building or area of a building by analyzing features that are unique to each individual. This includes fingerprints, retina scans, facial recognition, and/or voice.

Visitor Management

Visitor management involves tracking the usage of a public building or site.

Visitor Management Systems record the usage of the facilities by specific visitors and provide documentation of these visitor’s whereabouts at any given time during their use of the facility.

These systems are essential to effectively manage and control access to any building or construction site and ensure a comprehensive record is maintained, of those who have accessed the building or site is maintained.

CCTV Systems

CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the camera's input on monitors somewhere.

As the cameras communicate with monitors and/or video recorders across a private network links, they gain the designation "closed-circuit" to indicate that access to their content is limited by design only to those able to see it.

Boom Barriers

A boom barrier, also known as a boom gate, is a bar, or pole pivoted to allow the boom to block vehicular or pedestrian access through a controlled point. These barriers are widely used have several applications.

Spike Barriers

Spike Barriers are installed at higher security entrances or exits used by vehicles in conjunction with vehicle boom barriers. It is renowned for the ability of handling a high flow of traffic, and having optimum control of vehicle access.

Turnstiles

A turnstile is a form of gate which allows one person to pass at a time. It can also be made so as to enforce one-way human traffic and in addition, it can restrict passage only to people who insert a coin, a ticket, a pass, or similar.

Facial Recognition

Facial recognition systems uses biometrics to map facial features from a photograph or video. These systems are widely used by:

  • Government agencies and airports. Facial recognition systems can monitor people coming and going in airports. Government agencies uses the technology to identify people who have overstayed their visas or may be under criminal investigation, identify persons of interest etc
  • School, universities etc. use the technology in classrooms. Facial recognition software can, in essence, take a roll call and ensure the correct person taking exams.
  • Businesses at entrances and restricted areas. Some companies have changed their fingerprint biometric system to use facial recognition for access control.
  • Retailers can combine surveillance cameras and facial recognition to scan the faces of customers. The main goal is to identify previous shoplifters.
  • Airlines at departure gates. Historically agents scanned your boarding pass at the gate to board your flight. Some airline now scans your face.

Thermal solutions

Thermal imaging cameras are devices that translate thermal energy (heat) into visible light in order to analyze a particular object or scene.

  • The image produced is known as a thermo-gram and is analyses through a process called thermography.
  • Thermo-graphic cameras have over the years slowly migrated into other fields as varied as medicine and archaeology. More recently, the lowering of prices has helped fuel the adoption of infrared viewing technology. Advanced optics and sophisticated software interfaces continue to enhance the versatility of IR cameras.
  • The strength of thermal cameras for use in video surveillance is most notably their reliance on heat signatures alone to “see.” All objects have a measurable temperature, and thermal cameras detect even slight differences among people, vehicles, backgrounds and more to generate video that highlights contrasts within a scene. With thermal cameras, visible light isn’t necessary, bright light won’t distort images and weather or other harsh conditions can’t hinder their ability to capture usable video. Using the invisible heat radiation of each object in the field of view, these cameras can see what traditional cameras, and the human eye, cannot. And they can do this effectively over longer distances than their visible-light counterparts.

Video Analytics

Video analytics solutions can capture and identify various types of content and events, including motion detection, facial recognition, crowd and vehicle counting, heat map and dwell time in shopping aisles, traffic and queue detection, and much more

Automatic number plate recognition (ANPR)

ANPR is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit television, or cameras specifically designed for the task.