Infrared perimeter beams with battery option

August 2004 Perimeter Security, Alarms & Intruder Detection, Information Security

I-Beam is an active infrared intruder detection system with its transmitter and receiver housings typically used in irrigation systems pre-mounted on heavy duty anodised aluminium poles, ensuring they blend in well in industrial and garden settings. "The system has dual contra-rotating beams 50 cm apart and as they need to be interrupted simultaneously to trigger an alarm, avoids false alarms caused by dogs, flying birds or debris," explains I-Beam's Colin Mason. "The transmitter and receiver housings are inherently weather- and insect-proof and with the electronics fully wired and recessed into the body of the housings, they are also tamper-proof."

The transmitter and receiver heads of the I-Beam system are fully lockable and can rotate horizontally and vertically, which together with a beam divergence angle of 4°, creates a peripheral beam radius of 3 m at a distance of 100 m. This allows for quick and accurate visual alignment of the beams during installation prior to optimising final beam alignment using a simple multi tester.

The I-Beam systems are either hard-wired or battery powered, the latter requiring no wiring between transmitter and receiver heads. Only the final receivers of the battery system are hard-wired with a standard 2-core cable to the panel or other security equipment. The battery life is guaranteed for a minimum of one year.

I-Beam products are 100% South African developed and are manufactured, distributed and serviced by CMT Trading.

For more information contact Colin Mason, CMT Trading, 011 704 4411, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Perimeter and open spaces protection
XtraVision Mining (Industry)
SMART Security Solutions spoke to Nick Grange and Theuns van Schalkwyk from XtraVision about its perimeter solution, one that has been applied in mines (and other industries) in Africa and South America.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Zero Trust and user fatigue
Access Control & Identity Management Information Security
Paul Meyer, Security Solutions Executive, iOCO OpenText, says implementing Zero Trust and enforcing it can create user fatigue, which only leads to carelessness and a couldn’t care attitude.

Read more...
Passwordless, unphishable web browsers
Access Control & Identity Management Information Security
Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.

Read more...