IC Realtime Partners with JETprotect to Develop Virtual Fence Radar Security Solutions

IC Realtime LLC, a designer of products for security/alarm dealers and integrators, announced an exclusive partnership with JETprotect Corp. to develop new solutions incorporating IC Realtime’s security products and JETprotect’s new Virtual Fence Radar (VFR) technology.

“IC Realtime has an outstanding reputation for developing the most advanced and reliable security solutions available,” said Greg Johnston, CEO of JETprotect. “Our VFR technology represents a ground-breaking approach to automated security solutions, and this partnership with IC Realtime will only further enhance the unique capabilities of the system. We look forward to working with the team at IC Realtime to bring a new wave of high performance surveillance systems driven by both of our company’s expertise and resources.”

“Never before has there been a product that features the capabilities of JETprotect’s Virtual Fence Radar,” said Matt Sailor, president of IC Realtime. “We’re proud to have the opportunity to partner with JETprotect to bring together VFR and our advanced technologies and products to develop a new range of sophisticated security solutions ideal for any application.”

Detecting intruders at any time of day and weather condition, JETprotect’s VFR can monitor up to nine square miles to discover, track and slew cameras to any moving target or breached point. VFR monitors property in a 360-degree sweep of distances of approximately a 1.7-mile radius, rotating at one-second intervals. If an object is detected during the radar sweep, VFR’s advanced rules-based analytics Cortex will instantly determine if the object appears to be a threat to the protected area. The system will calculate the object’s geolocation, size, bearing and local velocity, then direct sensors and/or cameras to further determine the possibility of threat.

VFR’s tracking capabilities are enhanced by utilizing several different cameras within a single housing unit. This enables the systems to automatically select the best camera for the situation, depending on lighting, distance and other factors. For example, if a possible threat was identified at a long distance in the middle of the night, the VFR Cortex would trigger the high powered thermal camera and lock onto the object for monitoring. As the object moved closer, the Cortex would automatically switch tracking to a high resolution day/night camera for better viewing.

At a programmed critical point, VFR will also alert a central monitoring station and appropriate security personnel with live video and real-time data.

Attendees to CEDIA EXPO, 2011 held Sept. 7-11 in Indianapolis, will have an exclusive opportunity to learn more about the partnership between IC Realtime and JETprotect by visiting the IC Realtime booth (#5835) during the show.

Featured

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3