TROUBLED BY FREQUENT VANDALISM AND THEFT ?

The need for total site security varies according to remote site’s geographic location, and may differ from country to country.  Most RMS vendors provide sufficient tools for site security, yet the increase in the sophisticated nature of site crime/vandalism such as controller wire cutting/system hackings etc. calls for more advanced measures; AIO Systems’ three layer security model (physical, data, intelligence) provides all required protection measures and ensures your site’s total security, reducing vandalism and theft instances to an absolute minimum.

PHYSICAL SECURITY

On the physical level, all security detectors including active/passive RFID based asset security, shelter protection, surveillance cameras, siren, smoke detection, tampering sensors and local/remote access control are connected through AIO's EyeSite Controller to provide full real time view of the site in the CMS. Any intrusion immediately triggers a chain of events to both alarm the sites remote management and deter the intruders.

ASSET RECOGNITION

To further extend the functionalities of its end-to-end security solution AIO has applied Video analytics technology for asset recognition, so that any change to any of the site's assets is automatically identified in real-time and a predefined alarm process is initiated. This measure effectively reduces the necessity of on-site guards.

FULL WIRELESS

To reduce site's vulnerability to tampering to wiring and improve installation ease and timing, AIO offers an all wireless solution. The base unit is offered as a stand-alone unit that can support 32 slave units and can be located anywhere on site, or alternatively, embedded in AIO's Premium EyeSite controller. 

DATA SECURITY & SECURITY INTELLIGENCE

All communications among site assets and the remote central management system are proprietary and encrypted to ensure total data security, and furthermore have a three layered communications redundancy. On the security intelligence level, management security dashboards are available representing detailed user access, fault tracking, alerts and all relevant security information in a timely and proactive manner.