The Spotter container solution

June 2017 Perimeter Security, Alarms & Intruder Detection, Infrastructure

Secu-Systems’ Spotter is a wide-area surveillance solution that uses thermal and visual surveillance cameras, as well as Panoptes MTI (Movement Target Indicators) software to set up a perimeter protection solution from well within the perimeter.

A world first with land-based MTI allows operators to see all targets on moving, full motion video, panned backgrounds or on pre-set positions, giving them complete piece of mind that all targets can be interrogated. The land-based MTI from Secu-Systems gets rid of expensive fences and allows complete coverage and situational awareness over extensively large areas 24x7.

The Spotter is fabricated in-house and designed for use in remote sites where there is little or no infrastructure. Spotter is targeted towards areas where there are large tracts of land to be covered, such as mining (illegal mining), forestry, fire detection, anti-poaching applications where a high-site is defined. A FLIR PT-Series camera or military specification FLIR PT-602CZ-R with both day/night and thermal capability is installed onto a pre-fabricated mast that is attached to the top side of the container – about 9 m from nominal ground level.

These systems offer a detection radius down to 2 x 2 pixels with Kestrel Land Based MTI, and allow complete situational awareness over 360 degrees, 24/7 and up to a radius of 6 km when using the PT-602CZ-R FLIR camera.

The entire Spotter container is secured against any would-be intruders via a number of applications, including high-pressure pepper gas systems. Spotter solutions are housed in self-sufficient containers fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric ­fencing with energisers operating off the internal power reticulation.

It also includes wireless communication back to a centralised control room (as long as line-of-site can be attained), and also allows complete housing of all equipment, along with additional security systems and wireless transmission equipment.

For more information, contact Secu-Systems, +27 (0)11 794 7834, charles@secusystems.co.za, www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.