Page 27

benefits of an Key componentsKey of an INTRUSION PROTECTION INTRUSION PROTECTION SOLUTION

SOLUTION

Compliance with UK government backed scheme highlights Axis Communications dedication to mitigate cyber risks within its own business.

Identification

Identify people or objects in wide areas using pan, tilt and zoom to specific areas of interest.

Detection & verification

Protect your perimeter from intrusion in real time - in challenging lighting or complete darkness with thermal technology.

Detection & tracking

Protect your area from unwanted activity and track people or objects’ distance, angle of movement and speed.

Deterrence

Act on alarms with pre-recorded audio to respond to an unwanted activity using horn speakers.

Access management

Monitor entrances and exits to ensure only authorized personnel are granted access.

Proactive alarm management

Manage your security solution from your video management software – centrally or remotely. With the power of analytics, you will be able to receive and respond to alerts and ensure your site remains safe.

Read our blog articles about our perimeter protection solutions: www.axis.com/blog/secureinsights/?s=perimeter+protection

For a fully optimized security solution, all components should work together to immediately alert you of security breaches.

For a fully optimized security solution, all components should work together DETECT & VERIFY IDENTIFY DETER & ACT to immediately alert you of security breaches. Detect movement and spot unwanted activity

Zoom in on the details

Receive Alarms alerts and respond appropriately

27

Axisinnovates June 2018  

Issue 9: The purpose of this magazine is to provide all of our partners and customers with the very latest news and views from Axis Communic...

Axisinnovates June 2018  

Issue 9: The purpose of this magazine is to provide all of our partners and customers with the very latest news and views from Axis Communic...