Access Control System
Technologies of access control can be as simple (though none the less effective) as a swipe badge, key pad or proxy, through to advanced biometrics such as retinal scans, fingerprint and voice recognition.
Highly sensitive areas can be restricted across a range of parameters i.e. timed access only or authorised personnel or a combination.
Access Control data via a PC platform can act as a very powerful management tool, with many organisations using the technology to augment their time management & health and safety policies.
Tracking ‘access permissions’ via an audit trail is of obvious benefit in a number of market sectors.
CCTV Systems
This has led to the advance of network video or IP surveillance. Digitally recorded images provide far greater quality and effectiveness. Specific footage can be recalled at the touch of a button and systems can be integrated with local and wide area networks so images can be viewed from one or more personal computers.
CCTV is a truly powerful and intelligent visual management tool, automatically alerting the CCTV operator to events as they unfold so they can take immediate action to prevent an incident from escalating. Intelligent video analysis software can even be used for facial recognition, automatic number plate recognition, intruder detection, slip and fall detection, people and vehicle counting, suspicious behavior analysis and tracking, theft detection and abandoned object detection.
Integrated Security Systems
The solutions use interface advanced technology incorporating staff protection, electronic access control, CCTV surveillance, guarding, intruder and fire alarm supported by offsite remote monitoring.
The range can service both basic and complex levels of integration, with each solution tailored to meet client specific needs.
Migration to either incorporate or develop existing security provision is managed from planning through to delivery with either none or minimized downtime.
The integrated systems ensure rapid detection to trigger the appropriate response possibly to emergency services or key holders, which assists to improve recovery times and operational efficiency.
In addition to the cost benefits, integrated solutions provide a safer working environment for all types of businesses, ranging from schools and local government to major retail and commercial organizations throughout the Kingdom.
Visitation Systems
Basic Features:
- Record entry, exit of Visitors, Contract workers*, Vehicles* and Material*
- Authorise all entries
- Pop-ups (alerts) on client PCs, SMS* on mobile for electronic authorisation
- Allow, Forward or Reject a request
- Pass formats : Use from the database or design your own
- Detailed onscreen and back-office MIS
- One day and long-duration, multi-entry passes
- Custom data entry forms (fields and labels)
- Informative control centres – current visitors, visit history, waiting for authorisation, online users
- Data Import: Users, departments, contract workers
- Archive or Purge historic data
- Intuitive and simple user interface for security users
- Chat module between security and staff
- User and Role definition
Under Car Surveillance System
An under-vehicle surveillance system generally consists of still or video cameras mounted within a ramp and used at facility access points, particularly at secure facilities. An under-vehicle inspection system is used to detect threats that are hidden underneath vehicles. Cameras capture images of the undercarriage of the vehicle for manual or automated visual inspection by security personnel or systems
Intruder Detection Systems
Intruder alarm systems range from high security, medium to low security systems that cover internal and external applications and cater for all sectors of business.
External perimeter microwave intrusion detection systems, which is a microwave radar sensor designed to monitor its protected zone for movement and continuously “learn” and adjust to changing weather and terrain conditions without adjusting the unit. The alarm activates sounds if a person moves within the protected zone and also can be linked to a communications room for onsite or offsite monitoring.
BTAM are highly experienced in the provision of national, multi-site intruder maintenance contracts, enabled by our national network of fully qualified engineers. With service support available 24/7, 365 days a year, it means we are always for you.
Security Scanning Systems
X Ray Machines, Airport X-Ray Scanners, Explosive Scanners
Road Blockers and Car Barriers
Ideal for maximum security sites such as Government installations, Royal palaces, Military bases, Police stations, Embassies, Airports.