Anti-Intrusion

Anti-intrusion systems are gaining popularity today, but it’s essential to clearly understand the desired outcomes to implement the most suitable measures for protection objectives.
Our solutions are specifically designed to meet our clients’ needs in terms of intrusion detection technology.

VIGILANCE: The goal is to detect unwanted presence, sound the alarm immediately, and intervene as quickly as possible. Simultaneously, resist using all mechanical and electronic means to slow the intruder’s progress or prevent access to sensitive areas.
TECHNOLOGY: The variety of wired or wireless equipment allows the detection system to be tailored to security objectives and specific usage and operational needs.
ABSOLUTE WEAPONS AGAINST INTRUDERS:
- In case of intrusion, activation of deterrence systems and sending alerts (SMS, email, etc.).
- Remote monitoring.
OPERATION: The objectives that align with operational requirements are:
- Management of multiple independent sectors (PARTITION).
- Specific functions: chime, time delay, automation.
- Scheduling of activation and scenarios.


The Alarm Control Unit: The Brain of the System

It centralizes all information from detectors and alerts when necessary. It connects sensors, the siren, and alert transmission. Controlled by a remote or keypad, it also manages the entire alarm system’s operation (activation, deactivation, etc.). A transmitter for communication (RTC, GSM, IP, or GPRS) is often integrated into the control unit in newer models.

Detectors: The Senses of the System

The choice and placement of detectors are critical for optimal security.

Indoor Detectors

  • Volumetric Detectors

The most common technology combines IR (infrared) and microwave detection. Volumetric detectors can be installed indoors or outdoors and monitor a specific volume or area based on angle and height. They use infrared sensors and thermal energy. For remote verification, some detectors include a micro-camera and flash. Most detectors are configured to avoid false alarms triggered by pets.

  • Magnetic Opening Contacts
  • Installed on doors and windows, they instantly detect an opening when the alarm system is active.

Outdoor Detectors

  • Perimeter Detectors
These infrared or laser barriers create an invisible fence around the site to be protected. When the beam is interrupted by an intruder, an alarm is triggered.


  • Buried Detection Cable
This intrusion sensor is undetectable. No emitting or receiving cells are visible: detection is ensured by buried microwave coaxial cables. If an intruder crosses the wired perimeter, they disrupt the frequencies emitted from underground and are immediately detected.

Vibration Detectors

They receive signals from vibrations, shocks, glass breaking, or jolts.
  • Shock Detectors
Suitable for doors, windows, and glass panels. There are "shock" glass break detectors and those that detect the sound generated by breaking glass.



  • Detecting Fence
For high-security applications, installing “smart” fences detects any attempt at cutting, shearing, pulling, or climbing and generates an alert, precisely locating the intruder. It analyzes the differences between vibrations caused by weather conditions and those caused by forced entry attempts.

Control Devices

Essential components for system management, including keypads, remote controls, tags, smartphones, etc.

Alert and Deterrence Devices

Audible or visual alarms (sirens, flashing lights, projectors).
Anti-burglary defense devices (fog generators, tear gas, etc.).

  • Example Architecture

  • Integration with Other Systems


Back