Once your custom sensor network is deployed (see: deploy for more), you can immediately start tracking intruders. Vortex Systems provides a comprehensive set of tracking software and messaging tools to make this process streamlined and easy. Intrusion signals captured by the network are immediately visible in tools like Google Earth and ESRI ArcGIS. In addition, alert messages are automatically dispatched to one or more responders via email, SMS or pagers. All network activity is stored in a secure database for backup, analysis and reporting. Sensor models and configurations are stored for inventory management and maintenance. System software can be deployed on a single laptop or scaled across many computers. Network signals and alert messages are monitored and delivered locally or worldwide. System users can maintain data locally or can share data across departments and agencies worldwide.
Vortex Systems sensors are state of the art and can detect a wide variety of intrusion activities. Our small and ruggedized sensor units utilize the most advanced component, radio and battery technology to provide sophisticated, long-lasting performance that will survive the harshest environments. Custom embedded software allows our units to intelligently interpret remote activity and can accurately distinguish between humans and motorized vehicles, and can provide direction of travel for vehicular traffic. Sensor units have external ports which can be used to attach third party sensors like, exterior contacts, or chemical, radiological or fire sensors. Lithium batteries allow our units to run for typically over a year. Smart software automatically detects a low battery state and forwards a report to the end user. Finally, our powerful 5 watt linear radios securely deliver messages directly to base stations or network operations centers. Repeaters are available to handle communications over longer distances or rugged terrain.
- Configure software to route signal messages from specific sensors to specific responders via email, SMS or pagers.
- Load Vortex SensorTrack routing and logging software, Google Earth or ArcGIS on one or more laptops or desktop computers.
- Wait for incoming signals and respond accordingly. Signal information includes sensor location and up to 15 types of intrusion information.
- Filter and export system data to spreadsheets, word processors or other third party software for analysis or sharing of information.