Walk-through metal detectors that work

July 2002 Access Control & Identity Management

"11 September has made us all aware of the potential threats that could occur in our businesses. We have seen random attacks on American companies or their franchises in various parts of the world. Will the world summit in South Africa increase the risk of these attacks?" asks Morris Maram, MD of Emergency Reaction Services.

According to Maram, modern technology enables you to reduce risks for staff and clients and cites metal detectors as a means to reduce this risk. "If you thought weapon detectors were more trouble than they are worth, think again," he adds.

"The days of irate clients or employees emptying pockets and taking off jewellery before entering are over. Traffic flows of up to 50 people a minute are possible with considerable savings of manpower costs at checkpoints."

For example, explains Maram, the new Ranger Multi Zone metal detectors allows one to walk through the detector with normal quantities of keys and coins, without triggering. Walk through with a weapon and the alarm triggers.

The Ranger detectors, distributed by Emergency Reaction Services, use multizone technology. The various zones scan the different areas of one's body independently, ignoring small harmless objects. "The days of old technology units that trigger from the accumulated reading of all the metal on your body, and then alarm, are over," states Maram.

"The detectors have a built-in display that pinpoints the location of one or more weapons at a glance saving labour costs at checkpoints. Some clients have reduced checkpoint staff by as much as 60%."

Ranger walk-through detectors are available in two, six and 18 zones. Ranger also supplies weatherproof and portable models, ideal for conferences, conventions, trade shows, sports events etc.

The Ranger detectors also include 20 built-in programmes, and one can now select the item to be detected such as guns and/or small knives, laptop computers, SIMMs and processors, copper, brass etc while ignoring other harmless metal objects.

Detection enhancements

"The programme can be changed in seconds so you can use the detectors to monitor for weapons on the way in and then to check staff for assets on the way home," explains Maram. Another unique feature is the range of site settings that include adjustments for metal in flooring or dry walls. As a result, the detector can be installed wherever it is needed.

Also available is the unique Detection Enhancement Option. This allows customised detection profiles to be created for advanced weapon and asset protection applications.

A program called Identiscan analyses metal objects that are passed through the detector. It generates a character signature for each object. Once a signature has been created for an object, its detection response can be precisely manipulated. Difficult-to-detect ferrous, nonferrous, stainless steel or composite objects can be specifically targeted, while ignoring other metal objects. "This has opened up a huge market in asset protection," says Maram.

Ranger handheld metal detectors are reasonably priced and the unit is highly rated by the FAA. It can detect a medium pistol at 300 mm (12"), a 486 processor at 100 mm (4") and a hat pin at 25 mm (1").

For further details contact Emergency Reaction Services on tel: 0800 138 911.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...