24/7 Electronics Security

CCTV Surveillance Solutions

A large part of a physical security solution continues to be the surveillance solution. The edge devices in the form of Analogue or IP CCTV cameras are image capturing devices that

form the back-bone of security video surveillance systems.

C2MS Security offers a widest range of analog CCTVs, IP CCTV, NVR, DVR, and other products to suit your requirement. Once the system is in place the stream of signal produced

by cameras is processed using Video Analytics software that runs on high performance servers located at the Central Command & Control Center. This facilitates automatic real-time detection of threats, raising alarms and activating designated response mechanisms to neutralize threats.

Salient Features:

  • Can capture images in daylight and pitch dark conditions
  • Can be controlled to monitor any designated location
  • Can be networked to cover large areas and monitored centrally
  • Can be integrated with Video Analytics module featuring heuristic intelligence capabilities to track and detect various threats

C2MS Security provides the following essential components of the Video Surveillance system.

CCTV CAMERAS

These camera systems are either analog, IP based or hybrid. They are available in different mechanical mounting configurations like Pan-Tilt-Zoom (PTZ), Fixed or Dome mounted. They are further graded by their spectral responses to cover visible spectrum and also Infra-red spectrum for night vision thermal imagery.

These devices are used to record the continuous data stream from CCTV cameras. While the DVR used to record from analog sources needs to be connected to each camera output, the NVR used for recording from IP sources can be directly plugged into the network and assigned an IP address..

This is a highly specialized software component that forms the heart of a modern video surveillance network. The incoming video data from cameras are processed in real time to detect any unusual objects, unusual movements or anomalies in camera images. This software is also capable of matching objects detected on camera with records in suspicious object database to identify weapons etc.

Monitoring & Command Station

This forms an effective human interface to a predominantly automated video surveillance environment. Within this category, we provide:

  • Monitors – Video Walls, Large Screen Displays
  • IT Components – Servers, Storage Devices, Switches
  • Communication – Wireless, Copper Cable, Optical Fiber.

Other forms of Security Surveillance Systems

Surveillance done with a bird’s eye view is the most effective form since it offers a complete picture of the activity area & its surroundings. Aerial Surveillance is such a solution that will offer a complete view of the designated location precisely thereby helping the authorities to take decisions that are more effective & informed.

Our offering includes a wide variety of aerial surveillance solutions that can add value to security & surveillance measures

Typical deployments of Aerial Surveillance include:

Unmanned Aerial Vehicles

Camera mounted Balloons

These are expert solutions that are designed to detect intrusions at boundaries and perimeters of installations that need to be secured.

This solution utilizes a specialized array of active or passive (PIR) infrared sensors & motion sensors to detect intrusion accurately. The electrical fencing systems can be clubbed with this to offer higher level of security by making it more difficult for the intruder from entering the premises. Installation of day-night cameras along the perimeter can add further value by enabling visual monitoring of activities around the perimeter.

Perimeter protection systems essentially are outdoor deployments. Hence they are subject to vagaries of weather. They need to be robust in construction and must be designed to avoid false and nuisance alarms on account of extraneous factors not related to actual threats. Several types of sensors are employed which can either be visible or lend itself to covert installations. The vulnerability of these sensors to damage due to manhandling or vandalism also need to be taken into account.

Perimeter security sensors are available with two distinctive operational attributes, Line-of-sight (LOS) or Volumetric. Volumetric sensors are usually terrain following in nature and are extremely difficult to defeat. Some typical examples are Megnetometric, Ported Cable and Bistatic Microwave sensors.

Perimeter surveillance technologies normally use:

  • Buried Cables
  • Seismic Transducers
  • Active or Passive Infra-red
  • Taut Wire
  • Electric Fencing
  • Bistatic Microwave
  • Ported Coaxial Cable or Fiber Optic Cable
  • Video Motion Detectors

This is a specialized solution that can be brought into play where a certain area or an object is critical. Whenever someone tries to force his/her way to reach it, an alarm goes off, thereby indicating the detection of intrusion. Alarms can be in form of sound/sms/email etc., thereby inciting the response system if it is integrated to a state-of-the-art command & control center like HORIZON.

 

These are advanced solutions that scan vehicle’s bottom chassis for hidden explosives & modifications. They utilize superior imaging & processing algorithms that will help in detecting modified components in the bottom chassis of the car. It also incorporates an x-ray system that can scan the boot space of the vehicle for hidden weapons, explosives or narcotics. The solution can take tonsof weight and are designed to withstand harsh environments, rugged terrain, and extreme temperatures. Likewise, cameras and lighting are encased in sturdy, weatherproof housings.

C2MS Security provides the best in class range of screening solutions in India and abroad. We partner with leading screening product companies worldwide to bring the most advanced range of screening solutions. Our range of Screening products include but is not limited to providing Baggage Scanners, Cargo scanners, Radiation monitors, Body Scanners, mobile trace detectors, etc to name a few.

Cargo Scanners

We provide a range of powerful and practical solutions for inspecting vehicles and cargo in high-volume operations. The system's high-energy X-ray provides detailed images, even though heavy shielding, and distinguishes light, organic material from dense, inorganic material. Its spectroscopic radiation detection locates and identifies nuclear material. Its OCR system identifies containers as they are scanned. And its database component integrates and delivers images and data on demand. The system can scan more than 150 vehicles per hour in the typical flow of checkpoint traffic. It can scan entire vehicles, bumper to bumper and roof to tires, including occupants. With its small footprint and low radiation dose, it can be used in very limited space. And by revealing weapons, special nuclear material (SNM) and other contraband, the system can greatly reduce the need for costly manual inspections.

Threat levels enhancement on account of undesirable articles packed in baggage that may enter restricted areas and sanitized premises pose a major challenge for security agencies. C2MS Security offers X-ray based 100% hold baggage screening systems, which are designed to prevent the cleverest attempts at concealing weapons, drugs, stolen goods and other contraband. These X-ray inspection systems are ideal for screening everything from small packages to oddly shaped items and palletized loads.

X-ray baggage screening solutions are available in various sizes for scanning all types of objects, baggage, mails and parcels.

Get Advice From Our Professionals.