The Spotter container solution

June 2017 Perimeter Security, Alarms & Intruder Detection, Infrastructure

Secu-Systems’ Spotter is a wide-area surveillance solution that uses thermal and visual surveillance cameras, as well as Panoptes MTI (Movement Target Indicators) software to set up a perimeter protection solution from well within the perimeter.

A world first with land-based MTI allows operators to see all targets on moving, full motion video, panned backgrounds or on pre-set positions, giving them complete piece of mind that all targets can be interrogated. The land-based MTI from Secu-Systems gets rid of expensive fences and allows complete coverage and situational awareness over extensively large areas 24x7.

The Spotter is fabricated in-house and designed for use in remote sites where there is little or no infrastructure. Spotter is targeted towards areas where there are large tracts of land to be covered, such as mining (illegal mining), forestry, fire detection, anti-poaching applications where a high-site is defined. A FLIR PT-Series camera or military specification FLIR PT-602CZ-R with both day/night and thermal capability is installed onto a pre-fabricated mast that is attached to the top side of the container – about 9 m from nominal ground level.

These systems offer a detection radius down to 2 x 2 pixels with Kestrel Land Based MTI, and allow complete situational awareness over 360 degrees, 24/7 and up to a radius of 6 km when using the PT-602CZ-R FLIR camera.

The entire Spotter container is secured against any would-be intruders via a number of applications, including high-pressure pepper gas systems. Spotter solutions are housed in self-sufficient containers fitted with their own power reticulation, which includes solar panels mounted to the roof of the container and battery banks installed within the container. Security systems are integrated with the camera solution and include wall-top and/or additional freestanding electric ­fencing with energisers operating off the internal power reticulation.

It also includes wireless communication back to a centralised control room (as long as line-of-site can be attained), and also allows complete housing of all equipment, along with additional security systems and wireless transmission equipment.

For more information, contact Secu-Systems, +27 (0)11 794 7834, [email protected], www.secusystems.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...