Intrusion Detection

Intrusion Detection Systems are used in commercial, industrial, and military properties for protection against burglary (theft) or property damage, typically these systems record information related to observed events, notify security administrators of important observed events and produce reports such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. Intrusion detection systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control.

Electronic Access Control

Electronic Access Control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.

CCTV / Security Monitoring

Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It allows customers to monitor an area for security and status alarm purposes as well as record and store the video activity. These systems may operate continuously or only as required to monitor a particular event or scene, as defined by your needs. Data can be accessed and managed remotely. CCTV / Monitoring can be used with:

  • IP Systems
  • Wireless Systems
  • Network Room Alarms

  • Video Surveillance
  • Remote Monitoring


We really appreciate the help and patience of Bill Collins in the process and him working with our various funding and timeline issues here. Will definitely recommend utilization of iSoft in the future.

- U. S. Army