Fiber SenSys Security Solutions 

Fiber SenSys Sales Video

Fiber SenSys (FSI™) security solutions create lasting value for your business and customers because we employ the advantages of fiber optics and integrated security:

  • Fiber-Optic security solutions are very difficult to defeat
  • Fiber SenSys systems require little or no maintenance and have a demonstrated lifespan of nearly 20 years (many original processors are still in use today).

Fiber SenSys systems work in environments where other perimeter detection systems fail or have numerous false alarms. Learn more about our superior FSI software tools for tuning and calibration.

Fiber-Optic security solutions are resistant to environmental effects (EMI, RFI, wind, extreme temperatures, corrosion, lightning and other weather-related conditions). Explore the Fiber SenSys comprehensive family of perimeter security solutions.

 

Military

military

Military Security 

Fiber SenSys has a rich history of successful military projects. Whether security is needed for force protection or critical resource sites, we can provide a solution. We can also help with both fixed and tactical/temporary sites.

Our sensor achieved the highest security designation approval for nuclear weapons storage areas and critical resources by the US Air Force – Protection Level 1 Nuclear.

Currently the only fiber-optic sensor to achieve this rating, our sensor product underwent rigorous testing to meet the demanding requirements for this classification. As a result, Fiber SenSys offers the only fiber-optic sensor systems designated as PL-1N, and is used in the most critical sites in the world.

Fiber SenSys ensures every Alarm Processing Unit (APU) performs to the highest standards in probability of detection (PD) and has industry-low nuisance/false alarm rates (NAR/FAR). By offering advanced tuning capabilities, the installer can precisely optimize detection and tune the system according to the unique site conditions.

Ensuring that military bases and national security activities are never compromised forms the basis for all perimeter security initiatives.