SlideShare una empresa de Scribd logo
1 de 17
Future Fibre Technologies
       Fibre Optic Intrusion Detection Solutions




©Future Fibre Technologies 2013                    1
FFT – world leader in fibre optic
         intrusion detection




       • 100’s of installations and thousands of kilometres of intrusion detection
         installed in over 55 countries

       • Supported by a global network of FFT offices and accredited partners.

©Future Fibre Technologies 2013                                                      2
FFT – a strong tradition of
         innovation and world firsts



         Since 1994 Future Fibre Technologies has been a leader in developing
         advanced fibre optic sensing solutions for security applications.

         •      First company to bring high end fibre optic sensing to the mass market

         •      First company to be able to locate an event on a fibre optic perimeter
                intrusion detection system

         •      First to incorporate advanced signal processing, intelligent algorithms and
                Artificial Intelligence to reduce nuisance alarms

         •      First real-time fibre optic buried pipeline
                intrusion detection system that locates Third
                Party Interference (TPI)

         •      First long distance network protection system


©Future Fibre Technologies 2013                                                               3
FFT – more than a manufacturer,
         we are your security partner


     •      Solution focused organisation working
            to exceed customer expectations

     •      Team of highly experienced professionals that can
            add real value to your intrusion detection requirements

     •      Providing superior levels of product support, sales and training
            through its worldwide support team

     •      Delivering ongoing product advancements through innovation and
            research

     •      Delivering the broadest and most advanced range of fibre optic security
            solutions

     •      Independently recognised as the global leader in fibre optic perimeter
            intrusion detection1
            1
             Source IMS Research

©Future Fibre Technologies 2013                                                       4
Addressing key customer
         requirements


                          Feature          End User   Consultant   Integrator

                 A broad range of fibre
                 optic solutions                                    
                 Product support
                                             
                 Design assistance
                                                                    
                 Application engineering
                                                                     
                 Powerful integration
                 capability                                          
                 Ongoing R&D
                                                        
                 Commissioning support
                                                                     
                 Maintenance & Service
                                                                     
©Future Fibre Technologies 2013                                                 5
The fibre optic advantage


         Turning a fibre optic cable into a sensing medium takes a very simple
         idea and turns it into a powerful tool

         •      No power or electronics are required in the field

         •      High reliability and low maintenance

         •      Consistent over very long distances

         •      Real time sensing performance

         •      Intrinsically safe – immune to EMI, RFI and
                lightning

         •      Use existing fibre optic infrastructure

         •      Extremely cost-effective security solution

         •      Proven technology and proven performance

©Future Fibre Technologies 2013                                                  6
Diverse and dynamic market
         coverage


                                  CRITICAL INFRASTRUCTURE

                                         OIL & GAS


                                         MILITARY


                                       GOVERNMENT


                                        TRANSPORT


                                     COUNTRY BORDERS


                                         PRISONS


©Future Fibre Technologies 2013                             7
•      An economical entry level dual zone, remote capable controller with
                extremely low power consumption
         •      Sensitive enough to work on most fence types
         •      Intelligent – eliminates nuisance alarms without compromising on
                detection capability
         •      Simple to install and configure
         •      Optional installation without fusion splices
         •      Powerful interfacing options
         •      Flexible configurations - can be
                either rack mounted or field installed
         •      2 year warranty with global support



©Future Fibre Technologies 2013                                                       8
• One system provides either 8 or 16 separate fence zones - if one
           zone is disabled, the remainder continue to work
         • Requires no electronics or power in the field
         • Advanced signal processing to eliminate nuisance alarms
         • Intrinsically safe and immune to EMI, RFI and lightning
         • Fast, real-time notification of an intrusion and instant activation of
           CCTV cameras to capture intruders
         • Lowest total cost of ownership due to simple installation,
           low infrastructure costs and no field maintenance
         • Award winning - GSN “Best Perimeter Protection
           Product (Excluding Video)” 2009



©Future Fibre Technologies 2013                                                     9
408


         •      One system provides 8 separate zones - if one
                zone is disabled, the remainder continue to work

         •      Sensitive enough to work on almost all fence types

         •      Up to 40km of insensitive lead in for remote sites without power

         •      Requires no electronics or power in the field

         •      ARaD signal processing eliminates nuisance alarms

         •      Intrinsically safe and immune to EMI, RFI and lightning

         •      Real-time notification of an intrusion and instant activation of cameras to
                capture intruders

         •      Lowest total cost of ownership due to simple installation, low infrastructure
                costs and no field maintenance

         •      2 year warranty with global support

©Future Fibre Technologies 2013                                                                 10
The most advanced, proven, fibre optic perimeter intrusion detection
         system available today.
         • One system handles even the longest perimeters - up to 80km or 50
           miles of sensor cable
         • Pinpoints intrusions to 25 metres or better on almost all fence types
         • Requires no power or electronics in the field
         • Immune to EMI, RFI and nuisance alarms
         • Lowest total cost of ownership
         • Award winning - GSN “Best Perimeter Protection Product
           (Excluding Video)” 2010



©Future Fibre Technologies 2013                                                    11
SR™


         •      One FFT Aura SR™ system handles medium
                length perimeters up to 16km or 10 miles long

         •      The sensor cable can be installed on almost all fence types,
                covertly buried in the ground, or both simultaneously

         •      Identify & track vehicles, people, and digging activities

         •      Pinpoints intrusions to 6 metres (20ft) or better

         •      Detect activity up to 25 metres away from the buried sensor*

         •      Requires no power or electronics in the field

         •      Sensor cable cut resilience - continued operation up to the point of the cable
                cut standard, with self-healing resiliency an option

         •      Immune to EMI, RFI and lightning
               *Distances may vary depending on soil type/condition

©Future Fibre Technologies 2013                                                                  12
• Protects buried oil/gas/liquid pipelines
           against TPI (Third Party Interference)
           including illegal tapping and unauthorised excavation
           by providing valuable early warning of these activities.

         • Monitors the entire pipeline in real-time and locates a
           TPI event to within 150 metres or 500 feet, regardless
           of the pipeline length.

         • Requires no electronics or power along the pipeline.

         • Simple to understand, simple to use




©Future Fibre Technologies 2013                                       13
LR™


         •      One FFT Aura LR™ system protects pipelines
                up to 40km or 25 miles long. Multiple systems
                are networked for longer pipelines.

         •      Provides valuable real-time warning of TPI activities, identifying
                & tracking vehicles, people, and digging activities above pipeline

         •      Pinpoints the location of TPI to 10 metres (30ft) or better

         •      Detect foot traffic up to 5 metres and machinery activity
                up to 20 metres laterally from the buried sensor*

         •      Requires no power or electronics in the field – intrinsically safe

         •      Sensor cable cut resilience - continued operation up to the point
                of the cable cut standard, with self-healing resiliency an option

         •      Immune to EMI, RFI and lightning
               *Distances may vary depending on soil type/condition

©Future Fibre Technologies 2013                                                      14
Whether a WAN or a LAN, you can protect and maximise
         the availability of your critical data and telecoms networks
         by receiving advanced warning and the location of:


                  • Illegal tapping of sensitive data

                  • Physical intrusions – malicious or accidental

                  • Interference with the fibre optic signal or cable

                  • Damage from excavation or associated works

                  • Unauthorised cable handling



©Future Fibre Technologies 2013                                         15
Selection of FFT clients




©Future Fibre Technologies 2013     16
Global support




       Americas                         Asia Pacific                        Europe                             India                         Middle East

       Future Fibre Technologies (US)   Future Fibre Technologies Pty Ltd   Future Fibre Technologies Europe   Future Fibre Technologies     Future Fibre Technologies MENA
       Inc                              10 Hartnett Close,                  Ltd                                M-12/23, DLF City Phase II,   FZ-LLC
       800 West El Camino Real, Suite   Mulgrave, Vic., 3170                3000 Hillswood Drive,              Gurgaon, Haryana 122 002      Dubai Internet City,
       180                              Australia.                          Hillswood Business Park            India                         Building 11, Office G-08
       Mountain View, CA 94040                                              Chertsey, Surrey KT16 0RS                                        Dubai,
       USA                                                                  United Kingdom                                                   United Arab Emirates

       Phone:     +1 (650) 903 2222
       Toll Free: +1 (877) 650 8900     Phone:   +61 3 9590 3100            Phone: +44 (0)1932 895 317         Phone: +91 124 4087020        Phone: +971 4 434 5361
       Fax:       +1 (435) 417 6671     Fax:     +61 3 9560 8000            Fax:   +44 (0)1932 895 318         Fax:   +91 124 4087019        Fax:   +971 4 439 3406




                                                                   www.fftsecurity.com

©Future Fibre Technologies 2013                                                                                                                                               17

Más contenido relacionado

La actualidad más candente

Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Perimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXPerimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXMaybei Maybeyou
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
Fortinet
FortinetFortinet
FortinetABEP123
 
1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale1. Network Security Monitoring Rationale
1. Network Security Monitoring RationaleSam Bowne
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security SolutionsThe TNS Group
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations CenterSiemplify
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...EC-Council
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacksStefan Fodor
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 

La actualidad más candente (20)

Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Perimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXPerimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAX
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Fortinet
FortinetFortinet
Fortinet
 
1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
Side channel attacks
Side channel attacksSide channel attacks
Side channel attacks
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 

Destacado

Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemJoseph Garcia
 
Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...
Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...
Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...Allied Market Research
 
LenovoEMC(IOMEGA) Product Presentation
LenovoEMC(IOMEGA) Product PresentationLenovoEMC(IOMEGA) Product Presentation
LenovoEMC(IOMEGA) Product PresentationSubbaram Gowra
 
2014 Job Market Insights & Recruitment Advice
2014 Job Market Insights & Recruitment Advice 2014 Job Market Insights & Recruitment Advice
2014 Job Market Insights & Recruitment Advice Experian_US
 
Job Market Trend Report 2009-10
Job Market Trend Report 2009-10Job Market Trend Report 2009-10
Job Market Trend Report 2009-10Lynn Hazan
 
The hidden job market
The hidden job market The hidden job market
The hidden job market sklip
 
Pulsed Fibre Optic Light Source for Optical Tomography
Pulsed Fibre Optic Light Source for Optical TomographyPulsed Fibre Optic Light Source for Optical Tomography
Pulsed Fibre Optic Light Source for Optical TomographyQasim Humayoun
 
Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...
Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...
Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...Software Advice
 
Fiber cable vs copper cable
Fiber cable vs copper cableFiber cable vs copper cable
Fiber cable vs copper cablespringning
 
Innovation Summit 2015 - 05 - axis
Innovation Summit 2015 - 05 - axisInnovation Summit 2015 - 05 - axis
Innovation Summit 2015 - 05 - axisThibault Cantegrel
 
21st century skills for the 21st century job market (final cc)
21st century skills for the 21st century job market (final cc)21st century skills for the 21st century job market (final cc)
21st century skills for the 21st century job market (final cc)mrroberts
 
VMS Comparison table
VMS Comparison tableVMS Comparison table
VMS Comparison tableGeter Junior
 
10 STAGES OF FIBER OPTICS PROJECT IMPLEMENTATION
10 STAGES OF  FIBER OPTICS PROJECT IMPLEMENTATION10 STAGES OF  FIBER OPTICS PROJECT IMPLEMENTATION
10 STAGES OF FIBER OPTICS PROJECT IMPLEMENTATIONimtfiber
 
Mobile Video Architecture project
Mobile Video Architecture projectMobile Video Architecture project
Mobile Video Architecture projectTransit-Protect
 

Destacado (19)

Wireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security SystemWireless Perimeter Intrusion Detection Security System
Wireless Perimeter Intrusion Detection Security System
 
Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...
Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...
Ip video surveillance and v saa s market expected to reach $57.3 billion by 2...
 
LenovoEMC(IOMEGA) Product Presentation
LenovoEMC(IOMEGA) Product PresentationLenovoEMC(IOMEGA) Product Presentation
LenovoEMC(IOMEGA) Product Presentation
 
2014 Job Market Insights & Recruitment Advice
2014 Job Market Insights & Recruitment Advice 2014 Job Market Insights & Recruitment Advice
2014 Job Market Insights & Recruitment Advice
 
Job Market Trend Report 2009-10
Job Market Trend Report 2009-10Job Market Trend Report 2009-10
Job Market Trend Report 2009-10
 
The hidden job market
The hidden job market The hidden job market
The hidden job market
 
Pulsed Fibre Optic Light Source for Optical Tomography
Pulsed Fibre Optic Light Source for Optical TomographyPulsed Fibre Optic Light Source for Optical Tomography
Pulsed Fibre Optic Light Source for Optical Tomography
 
Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...
Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...
Software Advice IndustryView: A Comparison of the Best Job Boards for Your Re...
 
Why choose genetec
Why choose genetecWhy choose genetec
Why choose genetec
 
Fiber cable vs copper cable
Fiber cable vs copper cableFiber cable vs copper cable
Fiber cable vs copper cable
 
Innovation Summit 2015 - 05 - axis
Innovation Summit 2015 - 05 - axisInnovation Summit 2015 - 05 - axis
Innovation Summit 2015 - 05 - axis
 
21st century skills for the 21st century job market (final cc)
21st century skills for the 21st century job market (final cc)21st century skills for the 21st century job market (final cc)
21st century skills for the 21st century job market (final cc)
 
VMS Comparison table
VMS Comparison tableVMS Comparison table
VMS Comparison table
 
FOT_MEng2004_FEUP
FOT_MEng2004_FEUPFOT_MEng2004_FEUP
FOT_MEng2004_FEUP
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Ofc ppt
Ofc pptOfc ppt
Ofc ppt
 
10 STAGES OF FIBER OPTICS PROJECT IMPLEMENTATION
10 STAGES OF  FIBER OPTICS PROJECT IMPLEMENTATION10 STAGES OF  FIBER OPTICS PROJECT IMPLEMENTATION
10 STAGES OF FIBER OPTICS PROJECT IMPLEMENTATION
 
Optical fibres
Optical fibresOptical fibres
Optical fibres
 
Mobile Video Architecture project
Mobile Video Architecture projectMobile Video Architecture project
Mobile Video Architecture project
 

Similar a FFT fibre optic intrusion detection

MulteFire: Reliable Wireless for Industrial IoT
MulteFire: Reliable Wireless for Industrial IoTMulteFire: Reliable Wireless for Industrial IoT
MulteFire: Reliable Wireless for Industrial IoTMFA
 
Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Laird Connectivity
 
Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)
Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)
Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)Ari Zoldan
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideGlen Yi
 
Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Networks
 
Nokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptxNokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptxteletalkinnovation
 
a detailed study on femtocell,
a detailed study on femtocell,a detailed study on femtocell,
a detailed study on femtocell,Ali Ali
 
100G Metro Encryption
100G Metro Encryption100G Metro Encryption
100G Metro EncryptionADVA
 
WiMax 2 Slideshare.pdf
WiMax 2 Slideshare.pdfWiMax 2 Slideshare.pdf
WiMax 2 Slideshare.pdfNITINMehta95
 
iDEN Technology
iDEN Technology iDEN Technology
iDEN Technology Naveen Ivao
 
Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Raja Gopal
 
Ruckus EDU brochere
Ruckus EDU brochereRuckus EDU brochere
Ruckus EDU brochereDan Roth
 
Presentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfPresentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfAjay Gangakhedkar
 

Similar a FFT fibre optic intrusion detection (20)

MulteFire: Reliable Wireless for Industrial IoT
MulteFire: Reliable Wireless for Industrial IoTMulteFire: Reliable Wireless for Industrial IoT
MulteFire: Reliable Wireless for Industrial IoT
 
Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity
 
Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)
Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)
Proxim Tsunami Mp 16 3500 - Product Description (quantumwimax.com)
 
Ptp800 05 br-022012
Ptp800 05 br-022012Ptp800 05 br-022012
Ptp800 05 br-022012
 
Huneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution GuideHuneed-Cisco Perimeter Security Solution Guide
Huneed-Cisco Perimeter Security Solution Guide
 
Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006Meru Retailer Presentation 18 October 2006
Meru Retailer Presentation 18 October 2006
 
Nokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptxNokia Small Cell Portfolio_Oct 2023.pptx
Nokia Small Cell Portfolio_Oct 2023.pptx
 
Alessio Murroni - Cambium Networks
Alessio Murroni - Cambium NetworksAlessio Murroni - Cambium Networks
Alessio Murroni - Cambium Networks
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 
a detailed study on femtocell,
a detailed study on femtocell,a detailed study on femtocell,
a detailed study on femtocell,
 
Developing and evolving cctv surveillance systems
Developing and evolving cctv surveillance systemsDeveloping and evolving cctv surveillance systems
Developing and evolving cctv surveillance systems
 
100G Metro Encryption
100G Metro Encryption100G Metro Encryption
100G Metro Encryption
 
WiMax 2 Slideshare.pdf
WiMax 2 Slideshare.pdfWiMax 2 Slideshare.pdf
WiMax 2 Slideshare.pdf
 
WiMax Share.pdf
WiMax Share.pdfWiMax Share.pdf
WiMax Share.pdf
 
iDEN Technology
iDEN Technology iDEN Technology
iDEN Technology
 
Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013
 
Ruckus EDU brochere
Ruckus EDU brochereRuckus EDU brochere
Ruckus EDU brochere
 
WIMAX.pdf
WIMAX.pdfWIMAX.pdf
WIMAX.pdf
 
Presentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfPresentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdf
 
Gifi
GifiGifi
Gifi
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

FFT fibre optic intrusion detection

  • 1. Future Fibre Technologies Fibre Optic Intrusion Detection Solutions ©Future Fibre Technologies 2013 1
  • 2. FFT – world leader in fibre optic intrusion detection • 100’s of installations and thousands of kilometres of intrusion detection installed in over 55 countries • Supported by a global network of FFT offices and accredited partners. ©Future Fibre Technologies 2013 2
  • 3. FFT – a strong tradition of innovation and world firsts Since 1994 Future Fibre Technologies has been a leader in developing advanced fibre optic sensing solutions for security applications. • First company to bring high end fibre optic sensing to the mass market • First company to be able to locate an event on a fibre optic perimeter intrusion detection system • First to incorporate advanced signal processing, intelligent algorithms and Artificial Intelligence to reduce nuisance alarms • First real-time fibre optic buried pipeline intrusion detection system that locates Third Party Interference (TPI) • First long distance network protection system ©Future Fibre Technologies 2013 3
  • 4. FFT – more than a manufacturer, we are your security partner • Solution focused organisation working to exceed customer expectations • Team of highly experienced professionals that can add real value to your intrusion detection requirements • Providing superior levels of product support, sales and training through its worldwide support team • Delivering ongoing product advancements through innovation and research • Delivering the broadest and most advanced range of fibre optic security solutions • Independently recognised as the global leader in fibre optic perimeter intrusion detection1 1 Source IMS Research ©Future Fibre Technologies 2013 4
  • 5. Addressing key customer requirements Feature End User Consultant Integrator A broad range of fibre optic solutions    Product support  Design assistance    Application engineering   Powerful integration capability   Ongoing R&D   Commissioning support   Maintenance & Service   ©Future Fibre Technologies 2013 5
  • 6. The fibre optic advantage Turning a fibre optic cable into a sensing medium takes a very simple idea and turns it into a powerful tool • No power or electronics are required in the field • High reliability and low maintenance • Consistent over very long distances • Real time sensing performance • Intrinsically safe – immune to EMI, RFI and lightning • Use existing fibre optic infrastructure • Extremely cost-effective security solution • Proven technology and proven performance ©Future Fibre Technologies 2013 6
  • 7. Diverse and dynamic market coverage CRITICAL INFRASTRUCTURE OIL & GAS MILITARY GOVERNMENT TRANSPORT COUNTRY BORDERS PRISONS ©Future Fibre Technologies 2013 7
  • 8. An economical entry level dual zone, remote capable controller with extremely low power consumption • Sensitive enough to work on most fence types • Intelligent – eliminates nuisance alarms without compromising on detection capability • Simple to install and configure • Optional installation without fusion splices • Powerful interfacing options • Flexible configurations - can be either rack mounted or field installed • 2 year warranty with global support ©Future Fibre Technologies 2013 8
  • 9. • One system provides either 8 or 16 separate fence zones - if one zone is disabled, the remainder continue to work • Requires no electronics or power in the field • Advanced signal processing to eliminate nuisance alarms • Intrinsically safe and immune to EMI, RFI and lightning • Fast, real-time notification of an intrusion and instant activation of CCTV cameras to capture intruders • Lowest total cost of ownership due to simple installation, low infrastructure costs and no field maintenance • Award winning - GSN “Best Perimeter Protection Product (Excluding Video)” 2009 ©Future Fibre Technologies 2013 9
  • 10. 408 • One system provides 8 separate zones - if one zone is disabled, the remainder continue to work • Sensitive enough to work on almost all fence types • Up to 40km of insensitive lead in for remote sites without power • Requires no electronics or power in the field • ARaD signal processing eliminates nuisance alarms • Intrinsically safe and immune to EMI, RFI and lightning • Real-time notification of an intrusion and instant activation of cameras to capture intruders • Lowest total cost of ownership due to simple installation, low infrastructure costs and no field maintenance • 2 year warranty with global support ©Future Fibre Technologies 2013 10
  • 11. The most advanced, proven, fibre optic perimeter intrusion detection system available today. • One system handles even the longest perimeters - up to 80km or 50 miles of sensor cable • Pinpoints intrusions to 25 metres or better on almost all fence types • Requires no power or electronics in the field • Immune to EMI, RFI and nuisance alarms • Lowest total cost of ownership • Award winning - GSN “Best Perimeter Protection Product (Excluding Video)” 2010 ©Future Fibre Technologies 2013 11
  • 12. SR™ • One FFT Aura SR™ system handles medium length perimeters up to 16km or 10 miles long • The sensor cable can be installed on almost all fence types, covertly buried in the ground, or both simultaneously • Identify & track vehicles, people, and digging activities • Pinpoints intrusions to 6 metres (20ft) or better • Detect activity up to 25 metres away from the buried sensor* • Requires no power or electronics in the field • Sensor cable cut resilience - continued operation up to the point of the cable cut standard, with self-healing resiliency an option • Immune to EMI, RFI and lightning *Distances may vary depending on soil type/condition ©Future Fibre Technologies 2013 12
  • 13. • Protects buried oil/gas/liquid pipelines against TPI (Third Party Interference) including illegal tapping and unauthorised excavation by providing valuable early warning of these activities. • Monitors the entire pipeline in real-time and locates a TPI event to within 150 metres or 500 feet, regardless of the pipeline length. • Requires no electronics or power along the pipeline. • Simple to understand, simple to use ©Future Fibre Technologies 2013 13
  • 14. LR™ • One FFT Aura LR™ system protects pipelines up to 40km or 25 miles long. Multiple systems are networked for longer pipelines. • Provides valuable real-time warning of TPI activities, identifying & tracking vehicles, people, and digging activities above pipeline • Pinpoints the location of TPI to 10 metres (30ft) or better • Detect foot traffic up to 5 metres and machinery activity up to 20 metres laterally from the buried sensor* • Requires no power or electronics in the field – intrinsically safe • Sensor cable cut resilience - continued operation up to the point of the cable cut standard, with self-healing resiliency an option • Immune to EMI, RFI and lightning *Distances may vary depending on soil type/condition ©Future Fibre Technologies 2013 14
  • 15. Whether a WAN or a LAN, you can protect and maximise the availability of your critical data and telecoms networks by receiving advanced warning and the location of: • Illegal tapping of sensitive data • Physical intrusions – malicious or accidental • Interference with the fibre optic signal or cable • Damage from excavation or associated works • Unauthorised cable handling ©Future Fibre Technologies 2013 15
  • 16. Selection of FFT clients ©Future Fibre Technologies 2013 16
  • 17. Global support Americas Asia Pacific Europe India Middle East Future Fibre Technologies (US) Future Fibre Technologies Pty Ltd Future Fibre Technologies Europe Future Fibre Technologies Future Fibre Technologies MENA Inc 10 Hartnett Close, Ltd M-12/23, DLF City Phase II, FZ-LLC 800 West El Camino Real, Suite Mulgrave, Vic., 3170 3000 Hillswood Drive, Gurgaon, Haryana 122 002 Dubai Internet City, 180 Australia. Hillswood Business Park India Building 11, Office G-08 Mountain View, CA 94040 Chertsey, Surrey KT16 0RS Dubai, USA United Kingdom United Arab Emirates Phone: +1 (650) 903 2222 Toll Free: +1 (877) 650 8900 Phone: +61 3 9590 3100 Phone: +44 (0)1932 895 317 Phone: +91 124 4087020 Phone: +971 4 434 5361 Fax: +1 (435) 417 6671 Fax: +61 3 9560 8000 Fax: +44 (0)1932 895 318 Fax: +91 124 4087019 Fax: +971 4 439 3406 www.fftsecurity.com ©Future Fibre Technologies 2013 17