Senstar latest technologies and products on display at IFSEC
Product Profile
Exhibiting at IFSEC 2010, stand 4E102
At IFSEC, Booth E102 / Hall 4 in 2010 for IFSEC, you will see Senstar's latest technologies and products on display.
Amongst the array of products on show will be the Sentient Security Management System (SMS). It designed to display and manage alarm and status information for applications where ease-of-use, integration with a diverse array of security equipment, and meeting the reliability requirements of high-security environments are paramount. Sentient comes pre-integrated with a range of Senstar sensors so the work of adapting Sentient to a specific site - adding maps, assigning zone and sensor icons to maps, etc., can begin immediately without a software integration exercise.
Sentient is the ideal solution for managing perimeter security systems based on Senstar's wide array of perimeter intrusion detection sensors.
Technical Specification
Make | Senstar |
---|---|
Manufacturer | Senstar |
Category | Intruder Alarms>Intruder detectors |
Model code | Sentient® |
Additional info | Sentient is a Security Management System (SMS) designed to display and manage alarm and status information for applications where ease-of-use, integration with a diverse array of security equipment, and meeting the reliability requirements of high-security environments are paramount. Sentient comes pre-integrated with a range of Senstar sensors so the work of adapting Sentient to a specific site - adding maps, assigning zone and sensor icons to maps, etc., can begin immediately without a software integration exercise. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download