CRITICAL INFRASTRUCTURE

Protect vast areas with
AI video analytics

Solutions / Critical infrastructure

Prevent vandalism and attacks on critical infrastructure

Providing security to energy stations, bridges, solar and wind parks, pipelines, and country borders is not always an easy task. Harsh outdoor environments, remote areas, and disturbances from wildlife and nature provide many challenges. Critical infrastructure sites are also prone to sabotage and potential intentional damage, making security even more important. These sites are often large, remote, and dangerous to unauthorized visitors. Therefore protecting people as well as assets are key.

… by detecting unwanted visitors, over really long distances.

Our solutions are built to secure the longest possible security areas. With the minimum amount of cameras. Cameras are placed high on poles that are placed up to 2km apart – enabling coverage of extensive distances. The system is camera agnostic and provides high-precision detections even under the most challenging outdoor conditions.

Rail security on screen
Rail security on screen

… by detecting unwanted visitors, over really long distances.

Our solutions are built to secure the longest possible security areas. With the minimum amount of cameras. Cameras are placed high on poles that are placed up to 2km apart – enabling coverage of extensive distances. The system is camera agnostic and provides high-precision detections even under the most challenging outdoor conditions.

Just as functional in challenging outdoor conditions

One central platform for multiple distributed sites

Accurate on really long distances – up to 1km

Minimize false alarms for vegetation and animals

IRIS™ Intrusion detection
IRIS™ Loitering detection
IRIS™ Violent behavior
IRIS™ Flame detection
IRIS™ Fall detection
Track crossing icon
Unattended objects icon
IRIS™ Anonymization
IRIS™ AI alarm filtering

Intrusion detection

Loitering detection

Violent
behavior

Flame
detection

Fall
detection

Rail
trespassing

Unattended
objects

Anonymization filter

AI Alarm
Filtering

IRIS™ Intrusion detection
IRIS™ Loitering detection
IRIS™ Violent behavior

Intrusion
detection

Loitering
detection

Violent
behavior

IRIS™ Flame detection
IRIS™ Fall detection
Track crossing icon

Flame
detection

Fall
detection

Rail
trespassing

Unattended objects icon
IRIS™ Anonymization
IRIS™ AI alarm filtering

Unattended
objects

Anonymized
filter

AI Alarm
Filtering

Secure environments with intelligent camera surveillance

The ultimate solution for critical infrastructure sites

Irisity’s software is tailored to support the high-end requirements of expansive, distributed, and un-manned critical infrastructure sites. It enables security and safety of facilities and personnel by automatic detection of perimeter intrusion and reliable operations across limited bandwidth networks. One central platform allows for the management of multiple distributed sites, with rapid individual site deployment. 

Discover more:

IRIS™ Fall detection

Theft, vandalism, and safety in focus for energy provider

Parque Seixal is a vast solar park in southern Europe, with a total area of 45.000 sqm and 9.000 solar panels installed. In 2014 Irisity took over as provider of video analytics – transforming its operations and helping the security company work proactively.

Read the case study >>

Power station

Case Study: Fortum Distribution – Energy provider in the Nordics

”Since we installed the intelligent surveillance system from Irisity, we have experienced a great impact on intrusion, damage, and theft at our stations. Our estimate is that the expenses have been cut by 80%”, says Kåre Falkevik, Station Engineer at Fortum Distribution. 

Read the case study >>

IRIS™ Fall detection

High security requirements top-priority for The Øresund Bridge

Every day, nearly 70 000 travelers pass over Øresund Bridge – the 16 kilometers long highway and railroad between Sweden and Denmark. Therefore, safety is a top priority for The Øresund Bridge Consortium and the surveillance needs to live up to the high-security requirements.

Read the case study >>

Sounds interesting? Let's get in touch!