Fully Integrated Security Management System

The SCS (Supervision and Control System) is for the supervision and control of complete systems, using an extremely simple interface with the most advanced data presentation technology.

The SCS system integrates the management of:

  • Intruder control units
  • Fire control units
  • Access control systems
  • Video surveillance and recording systems
  • Building management systems
  • Perimeter Security systems

Designed to detect all the typical intrusion attempts of cutting the fence, pulling or lifting the fence or climbing over and, in the case of internal applications, penetration of the wall, the system is used as the primary means of detection in applications of medium to high risk.

When used with a secondary system (such as CCTV surveillance equipment) it can be used for the highest risk applications.

Operating Principles

The software architecture is network based and designed to be extremely flexible, allowing the best use of computer hardware, based on system size and complexity.

The system comprises some or all of the following components:

  • Database: contains all the information about the structure of the system together with details of commands, etc.
  • Command Server: controls the flow of information between the various components of the system
  • Client: there are as many as there are system control workstations. The client has an integrated video player to allow the display of images without having to add extra components (Players).
  • Data logger: there are as many as necessary for the connection of the equipment (perimeter systems, alarm control units, fire control units, access control systems, video devices, etc.).
  • Player: used to display the images from the cameras or recorded when there is insufficient display capability available on the client.
  • Video Storage: used to store the images provided by the cameras (when the codec does not have a hard disc on board).

The system also has the capability to send and receive commands to and from third party software applications, via IP socket connections and the SNMP interface.