{"id":2994,"date":"2023-03-30T13:54:00","date_gmt":"2023-03-30T11:54:00","guid":{"rendered":"https:\/\/nucron.de\/?p=2994"},"modified":"2023-10-24T15:28:37","modified_gmt":"2023-10-24T13:28:37","slug":"advantages-of-networked-security-robots","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots","title":{"rendered":"Advantages of networked security robots"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;has-divider-edge-bottom-left&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#020003&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/security-<a rel=\"popover\" data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/a>.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.jpg&#8221; title_text=&#8221;zaunsensorik und <span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1320px&#8221; max_height=&#8221;600px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"ce_text block\">\n<div class=\"ce_text block\">\n<p style=\"text-align: justify;\">In current, more aptly called conservative security concepts, technical solutions are often still used too selectively, a camera here, a motion detector there, a light barrier there. Although attention is paid to covering critical and access areas as completely as possible, especially with cameras, the focus is rarely on the entire <a rel=\"popover\" data-title=\"perimeter\" data-post-id=\"6000\" class=\"sr-glossary-link\" aria-label=\"Perimeter\" href=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\">perimeter<\/a>. Serious security incidents, such as those that occurred at several airports in 2022, show how quickly this can take revenge. What is missing is <strong>a holistic approach to the security concept<\/strong> and an understanding of how networked <a rel=\"popover\" data-title=\"security technology\" data-post-id=\"5907\" class=\"sr-glossary-link\" aria-label=\"Security technology\" href=\"https:\/\/security-robotics.de\/en\/glossary\/security-technology\">security technology<\/a>, including <a rel=\"popover\" data-title=\"surveillance robots\" data-post-id=\"5900\" class=\"sr-glossary-link\" aria-label=\"Surveillance robot\" href=\"https:\/\/security-robotics.de\/en\/glossary\/surveillance-robot\">surveillance robots<\/a>, works. We clarify.<\/p>\n<p style=\"text-align: justify;\">When we talk about modern security concepts, we always focus on our central platform solution. <a href=\"https:\/\/security-robotics.de\/de\/software-as-a-service.html\"><strong>Acuda<\/strong><strong>\u00ae<\/strong><\/a> connects and networks all <a rel=\"popover\" data-title=\"Actuators\" data-post-id=\"6192\" class=\"sr-glossary-link\" aria-label=\"Actuator\" href=\"https:\/\/security-robotics.de\/en\/glossary\/actuator\">actuators<\/a> with each other and allows their bidirectional data exchange. In this way, not only potential alarms are transmitted, but also position, status, etc., depending on the system. <span data-title=\"Actuators\" data-post-id=\"6192\" class=\"sr-glossary-link\" aria-label=\"Actuator\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/actuator\">Actuators<\/span> are all security systems that are already IoT-capable or enabled via <strong>Nucron\u00ae<\/strong>, i.e. all existing fixed cameras, status detectors such as doors, barriers, motion detectors and also all security robots integrated in this system.<\/p>\n<p style=\"text-align: justify;\">The operators therefore always know where which technology is performing its defined task in which state, whether, when and which potential alarms, faults, etc. occur, and thus receive a complete overview. Cleverly thought out, a maximum of security can be guaranteed 24\/7, i.e. penetration attempts are detected in the beginning and in real time and corresponding automatic or manual reactions are triggered.<\/p>\n<p style=\"text-align: justify;\">We at Security <span data-title=\"Robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">Robotics<\/span> are developers and integrators, which is why we can integrate all types of sensor and camera technology &#8211; independent of the manufacturer &#8211; and also enable the connection to every type of NSL &#8211; emergency call and service <a rel=\"popover\" data-title=\"control centre\" data-post-id=\"5892\" class=\"sr-glossary-link\" aria-label=\"Control centre\" href=\"https:\/\/security-robotics.de\/en\/glossary\/control-centre\">control centre<\/a>. Let us explain the facts and possibilities with a concrete example.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/security-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.de\/wp-content\/uploads\/2023\/03\/zaunsensoren-und-<a rel=\"popover\" data-title=\"beehive\" data-post-id=\"6030\" class=\"sr-glossary-link\" aria-label=\"Beehive\" href=\"https:\/\/security-robotics.de\/en\/glossary\/beehive\">beehive<\/a>.jpg&#8221; title_text=&#8221;zaunsensoren und <span data-title=\"beehive\" data-post-id=\"6030\" class=\"sr-glossary-link\" aria-label=\"Beehive\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/beehive\">beehive<\/span>&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>All safe, is it?<\/strong><\/h3>\n<p style=\"text-align: justify;\">\n<\/p><p style=\"text-align: justify;\">In a typical scenario, the fenced <span data-title=\"perimeter\" data-post-id=\"6000\" class=\"sr-glossary-link\" aria-label=\"Perimeter\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter\">perimeter<\/span> with various gates, individual buildings with doors and windows, as well as various storage and parking areas are usually to be protected. The main gate is secured by a barrier and a guard house, the fence is solid and possibly equipped with climbing protection. There are swivelling cameras at the outer corners of the buildings and a PTZ dome camera keeps an eye on the car park and parking areas. Mechanical locking systems and an <a rel=\"popover\" data-title=\"alarm system\" data-post-id=\"6191\" class=\"sr-glossary-link\" aria-label=\"Alarm system\" href=\"https:\/\/security-robotics.de\/en\/glossary\/alarm-system\">alarm system<\/a> are installed on doors and windows. Perhaps a security guard also makes his rounds on the property from time to time. So far, so typical.<\/p>\n<p style=\"text-align: justify;\">But this supposedly adequate security solution, which has been schematically sold as the ideal form for many years, has glaring weaknesses, because all elements act independently of each other:<\/p>\n<ul>\n<li>Barrier and main gate on mechanical opening or the care of the guard.<\/li>\n<li>Fences and walls are purely mechanical, static obstacles whose condition can only be checked on a guard walk.<\/li>\n<li>The anti-theft system only as soon as windows or doors would be opened by force.<\/li>\n<li>The patroller has to rely on his eyes and ears and is connected to his colleagues by telephone at best, but never to the systems.<\/li>\n<li>And the cameras? With good onboard detection software, they report suspicious movements, but they are limited to their field of vision.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The decentralisation and especially the lack of digitalisation of security measures thus leaves gaps that criminal elements can easily exploit. If security robots were also added to this concept as a single element, i.e. if they were only assigned a task but were not networked, the positive effect would be limited.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/security-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.de\/wp-content\/uploads\/2023\/03\/vernetzte-technik_.jpg&#8221; title_text=&#8221;vernetzte technik_&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 style=\"text-align: justify;\"><strong>How can property protection be made better + safer?<\/strong><\/h3>\n<p><strong><\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\">In the first step, existing systems must be digitised, i.e. their messages, alarm signals and status must be summarised in a central place. In our example, this concerns doors and gates, whose status, i.e. closed, open, defective, etc., is now clearly visible instead of being personally inspected. This upgrade can be carried out by means of <strong>Nucron\u00ae<\/strong>.<\/li>\n<li style=\"text-align: justify;\">Fence systems are retrofitted with a detection cable and are no longer just a passive part of the <a rel=\"popover\" data-title=\"perimeter protection\" data-post-id=\"5999\" class=\"sr-glossary-link\" aria-label=\"Perimeter protection\" href=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter-protection\">perimeter protection<\/a>. This system, such as\u00a0 <strong><a href=\"https:\/\/www.sorhea.com\/de\/products\/g-fence-3000\/\" target=\"_blank\" rel=\"noopener\">Sorhea&#8217;s G-Fence 3000<\/a><\/strong>, incorporates vibration and acceleration sensors and thus registers any manipulation of the fence, whether climbing, cutting, pushing in or breaking through. Each individual fence field is sensorically a zone of its own, which enables a pinpoint assignment of potential penetration attempts.<\/li>\n<li style=\"text-align: justify;\">In the case of extensive objects, it is easy to add long-range motion detectors and intelligent cameras to the <span data-title=\"perimeter protection\" data-post-id=\"5999\" class=\"sr-glossary-link\" aria-label=\"Perimeter protection\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/perimeter-protection\">perimeter protection<\/span> by setting up video towers such as the <strong><a href=\"https:\/\/watchdome.de\/\" target=\"_blank\" rel=\"noopener\">Watchdome systems from GT.AI<\/a><\/strong> or the <strong><a href=\"https:\/\/de.dussmann.de\/mobile-videoueberwachung\" target=\"_blank\" rel=\"noopener\">mobile video surveillance from Dussmann<\/a><\/strong>.<\/li>\n<li style=\"text-align: justify;\">In the future, patrols will not be mapped by a person, but by security robots. Depending on the size of the area, these are on the move on 4 legs (also indoors) (ideal here <strong><a href=\"https:\/\/security-robotics.de\/en\/four-legged-robots\/\">Spot<\/a><\/strong>) or travel their programmed routes continuously (perfect for <strong><a href=\"https:\/\/security-robotics.de\/en\/wheel-driven-robots\/\">Argus<\/a><\/strong>). Thanks to a complete <a rel=\"popover\" data-title=\"360\u00b0 view\" data-post-id=\"6195\" class=\"sr-glossary-link\" aria-label=\"360\u00b0 view\" href=\"https:\/\/security-robotics.de\/en\/glossary\/360-view\">360\u00b0 view<\/a>, operation independent of time of day and weather, and flexible equipment, robotic systems can do more in this area than even the most experienced security guard.<\/li>\n<li style=\"text-align: justify;\">All messages converge at a central point such as the guard building or the security centre. This means that the security expert not only has an eye on the small area of the access road, but is fully informed about the integrity of the property.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The decisive quality leap and thus increased security, cost-efficient and reduced false alarms, is achieved when all the measures mentioned work as an integrated system, together, complementing and supporting each other.<\/p>\n<p>[\/et_pb_text][et_pb_video src=&#8221;https:\/\/security-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.de\/wp-content\/uploads\/2023\/03\/Tests-erfolgreich-Roboter-und-Zaunsensoren-arbeiten-Hand-in-Hand-fuer-maximale-Sicherheit.mp4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_video][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"ce_text block\">\n<h3 style=\"text-align: justify;\"><strong>Security you can rely on<\/strong><\/h3>\n<p style=\"text-align: justify;\">\n<\/p><p style=\"text-align: justify;\">We at Security <span data-title=\"Robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">Robotics<\/span> do not believe in full-bodied promises and pure showcases. That&#8217;s why we extensively test security robots, sensors of all kinds and, of course, the systems of companies on our own research premises, which we regard as the added value of a holistic security concept.<\/p>\n<p style=\"text-align: justify;\">Only when everything meshes perfectly and functions as a networked whole do we stand behind it, offer it in customer projects and also integrate this technology into the <strong>Acuda\u00ae<\/strong> platform.<\/p>\n<p style=\"text-align: justify;\">It is impressive how agile robotic systems react to penetration attempts without delay, unerringly targeting the section in question, such as a fence field or gate, while directing their sensors at the potential troublemaker. <a rel=\"popover\" data-title=\"Argus\" data-post-id=\"6031\" class=\"sr-glossary-link\" aria-label=\"Argus\" href=\"https:\/\/security-robotics.de\/en\/glossary\/argus\">Argus<\/a> can use its loud announcements as a deterrent, <a rel=\"popover\" data-title=\"Spot\" data-post-id=\"6026\" class=\"sr-glossary-link\" aria-label=\"Spot\" href=\"https:\/\/security-robotics.de\/en\/glossary\/spot\">Spot<\/a> can stream the incident in sound &amp; vision, and the <strong><a href=\"https:\/\/security-robotics.de\/en\/flying-robots\/\">Beehive drone system<\/a><\/strong> can provide unparalleled clarity.<\/p>\n<p style=\"text-align: justify;\">Above all, the flying robot is perfect for verifying\/qualifying alarms and, in case of doubt, can be on site faster than any security guard. If the need arises, other systems are sent to the incident in support.<\/p>\n<p style=\"text-align: justify;\">\n<\/p><h3 style=\"text-align: justify;\">Security 2023: Not the same as always, but doing it better!<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Single solutions have had their day. A simple more instead of better, a purely staff-centred approach and ignoring the need to use networked robotic and security systems is already no longer sufficient. In the future, security service providers will not be able to meet customer requirements and customers will virtually invite criminal elements thanks to the poor quality of their measures. It does not have to come to that.<\/p>\n<p style=\"text-align: justify;\"><strong>A conclusion that should also be yours.<\/strong><\/p>\n<p>Talk to us.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; border_width_top=&#8221;1px&#8221; border_color_top=&#8221;rgba(0,0,0,0.24)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_padding=&#8221;40px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>CONTACT FOR PRESS &amp; COMMUNICATION:<\/h3>\n<p>Michael Engel | <a href=\"mailto:m.engel@security-robotics.de\">m.engel@security-robotics.de<\/a><\/p>\n<p>Landsberger Allee 366, 12681 Berlin<br\/>\nTelefon: <span>+49 341 2569 3369<\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form captcha=&#8221;off&#8221; email=&#8221;info@security-<span data-title=\"robotics\" data-post-id=\"5878\" class=\"sr-glossary-link\" aria-label=\"Robotics\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/robotics\">robotics<\/span>.de&#8221; title=&#8221;Jetzt anfragen!&#8221; submit_button_text=&#8221;Abschicken&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; module_class=&#8221;with-edge-top-right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;43c21b82-3e69-48bf-9754-a901d779e23f&#8221; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;#000000&#8243; form_field_focus_background_color=&#8221;RGBA(255,255,255,0)&#8221; form_field_focus_text_color=&#8221;#006CA6&#8243; title_font=&#8221;Expletus Sans||||||||&#8221; title_text_color=&#8221;#006CA6&#8243; title_font_size=&#8221;32px&#8221; title_line_height=&#8221;40px&#8221; background_color=&#8221;#FAFAFA&#8221; custom_button=&#8221;on&#8221; custom_padding=&#8221;44px|44px|44px|44px|true|true&#8221; custom_padding_tablet=&#8221;|24px||24px|true|true&#8221; custom_padding_phone=&#8221;|16px||16px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;28px&#8221; title_font_size_phone=&#8221;24px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;20px&#8221; button_text_size_phone=&#8221;18px&#8221; button_text_size_last_edited=&#8221;on|desktop&#8221; custom_css_contact_button=&#8221;margin-top: 24px;&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;rgba(0,0,0,0.16)&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;E-Mail-Adresse&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Phone&#8221; field_title=&#8221;Telefon&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Message&#8221; field_title=&#8221;Nachricht&#8221; field_type=&#8221;text&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.19.4&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>In current, more aptly called conservative security concepts, technical solutions are often still used too selectively, a camera here, a motion detector there, a light barrier there. Although attention is paid to covering critical and access areas as completely as possible, especially with cameras, the focus is rarely on the entire perimeter. Serious security incidents, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2986,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section fb_built=\"1\" module_class=\"has-divider-edge-bottom-left\" _builder_version=\"4.19.4\" _module_preset=\"default\" background_color=\"#020003\" background_enable_image=\"off\" background_size=\"initial\" background_position=\"top_center\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"0px||0px||false|false\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg\" title_text=\"zaunsensorik und robotics\" align=\"center\" _builder_version=\"4.19.4\" _module_preset=\"default\" max_width=\"1320px\" max_height=\"600px\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]\n<div class=\"ce_text block\">\n<div class=\"ce_text block\">\n<p style=\"text-align: justify;\">Bei aktuellen, treffender konservativ zu nennenden Sicherheitskonzepten werden technische L\u00f6sungen oftmals noch zu punktuell eingesetzt, hier eine Kamera, dort ein Bewegungsmelder, da die Lichtschranke. Zwar achtet man vor allem bei den Kameras auf eine m\u00f6glichst vollst\u00e4ndige Abdeckung kritischer und Zugangsbereiche, der komplette Perimeter steht aber selten im Fokus. Wie schnell sich so etwas r\u00e4chen kann, zeigen schwere Sicherheitsvorf\u00e4lle wie diese bspw. 2022 auf mehreren Flugh\u00e4fen vorkamen. Was fehlt ist ein<span>&nbsp;<\/span><strong>ganzheitlicher Ansatz<\/strong><span>&nbsp;<\/span>im Sicherheitskonzept und das Verst\u00e4ndnis wie vernetzte Sicherheitstechnik, incl. \u00dcberwachungsroboter funktioniert. Wir kl\u00e4ren auf.<\/p>\n\n<\/div>\n<div class=\"ce_text block\">\n<p style=\"text-align: justify;\">Reden wir \u00fcber moderne Sicherheitskonzepte, stellen wir dabei stets unsere zentrale Plattforml\u00f6sung in den Mittelpunkt.<span>&nbsp;<\/span><a href=\"https:\/\/security-robotics.de\/de\/software-as-a-service.html\"><strong>Acuda<\/strong><strong>\u00ae<\/strong><\/a><span>&nbsp;<\/span>verbindet und vernetzt alle Aktoren mit einander und erlaubt deren bidirektionalen Datenaustausch. So werden nicht nur potentielle Alarme \u00fcbermittelt, sondern auch je nach System auch Position, Zustand usw. Aktoren sind alle bereits IoT-f\u00e4higen oder per<span>&nbsp;<\/span><strong>Nucron<\/strong><strong>\u00ae<\/strong><span>&nbsp;<\/span>dazu bef\u00e4higten Sicherheitssysteme, d.h. alle existenten festen Kameras, Zustandsmelder wie T\u00fcren, Schranken, Bewegungsmelder und eben auch s\u00e4mtliche in diesem System integrierte Security Robots.<\/p>\n<p style=\"text-align: justify;\">Die Operatoren wissen also immer, wo welche Technik in welchem Zustand Ihrer definierten Aufgabe nachgeht, ob, wann und welche potentiellen Alarme, St\u00f6rungen etc. auftreten und erhalten damit einen Komplett\u00fcberblick. Clever durchdacht kann damit 24\/7 ein H\u00f6chstma\u00df an Sicherheit garantiert werden, sprich Penetrationsversuche werden im Ansatz und Realtime erkannt und entsprechende automatische oder manuelle Reaktionen ausgel\u00f6st.<\/p>\n<p style=\"text-align: justify;\">Wir als Security Robotics sind Developer und Integratoren, daher k\u00f6nnen wir - herstellerunabh\u00e4ngig - alle Arten von Sensorik und Kameratechnik einbinden und auch die Ankn\u00fcpfung zu jedem Typus von NSL \u2013 Notruf und Serviceleitstelle erm\u00f6glichen. Lassen Sie uns Sachverhalt und M\u00f6glichkeiten an einem konkreteren Beispiel erl\u00e4utern.<\/p>\n\n<\/div>\n<\/div>\n[\/et_pb_text][et_pb_image src=\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensoren-und-beehive.jpg\" title_text=\"zaunsensoren und beehive\" align=\"center\" force_fullwidth=\"on\" _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]\n<h3><strong>Alles sicher, oder?<\/strong><\/h3>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">In einem typischen Szenario sind meist der zaunumfasste Perimeter mit diversen Toren, einzelne Geb\u00e4ude mit T\u00fcren und Fenstern, sowie unterschiedliche Lager- und Stellfl\u00e4chen zu sch\u00fctzen. Das Haupttor wird mittels Schranke und Wachh\u00e4uschen gesichert, der Zaun ist massiv und evtl. mit \u00dcbersteigschutz ausgestattet. An den Au\u00dfenecken der Geb\u00e4ude befinden sich schwenkbare Kameras und Parkplatz sowie Stellfl\u00e4chen beh\u00e4lt eine PTZ Dome Kamera im Blick. An T\u00fcren und Fenstern sind mechanische Schlie\u00dfsysteme und eine Alarmanlage installiert. Vllt. dreht noch ein Wachmann ab und an seine Runden auf dem Objekt. So weit, so typisch.<\/p>\n<p style=\"text-align: justify;\">Doch diese vermeintlich ausreichende und seit vielen Jahren schematisch als Idealform verkaufte Sicherheitsl\u00f6sung hat eklatante Schwachpunkte, denn alle Elemente agieren unabh\u00e4ngig voneinander:<\/p>\n\n<ul>\n \t<li style=\"text-align: justify;\">Schranke und Haupttor auf mechanische \u00d6ffnung bzw. die Sorgfalt des Wachhabenden.<\/li>\n \t<li style=\"text-align: justify;\">Z\u00e4une und Mauern sind rein mechanische, statische Hindernisse, deren Zustand nur auf einem Wachgang \u00fcberpr\u00fcft werden kann.<\/li>\n \t<li style=\"text-align: justify;\">Die Diebstahlanlage nur, sobald Fenster oder T\u00fcren gewaltsam ge\u00f6ffnet werden w\u00fcrden.<\/li>\n \t<li style=\"text-align: justify;\">Der Patrouillierende muss sich auf seine Augen und Ohren verlassen und ist unterwegs bestenfalls per Telefon mit seinen Kollegen, nie aber mit den Systemen verbunden.<\/li>\n \t<li style=\"text-align: justify;\">Und die Kameras? Mit guter Onboard-Erkennungssoftware melden Sie verd\u00e4chtige Bewegungen, aber beschr\u00e4nken sich dabei eben auf Ihre Sichtbereiche.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Die Dezentralisierung und vor allem mangelnde Digitalisierung der Sicherheitsma\u00dfnahmen l\u00e4sst also L\u00fccken klaffen, die sich kriminelle Elemente problemlos zu Nutze machen k\u00f6nnen. W\u00fcrde man zu diesem Konzept Sicherheitsroboter ebenfalls als Einzelelement addieren, sprich nur eine Aufgabe zuweisen, aber auf Vernetzung verzichten, hielte sich der positive Effekt in Grenzen.<\/p>\n[\/et_pb_text][et_pb_image src=\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/vernetzte-technik_.jpg\" title_text=\"vernetzte technik_\" align=\"center\" force_fullwidth=\"on\" _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]\n<h3 style=\"text-align: justify;\"><strong>Wie kann man den Objektschutz besser + sicherer machen?<\/strong><strong>&nbsp;<\/strong><\/h3>\n&nbsp;\n<ul>\n \t<li style=\"text-align: justify;\">Im ersten Schritt m\u00fcssen existente Systeme digitalisiert werden, d.h. deren Meldungen, Alarmsignale und Zustand an zentraler Stelle zusammengefasst werden. Dies betrifft in unserem Beispiele T\u00fcren und Tore, deren Zustand, also geschlossen, offen, defekt usw. nun klar ersichtlich wird, statt pers\u00f6nlich in Augenschein genommen zu werden. Diese Ert\u00fcchtigung kann mittels<span>&nbsp;<\/span><strong>Nucron<\/strong><strong>\u00ae<\/strong><\/li>\n \t<li style=\"text-align: justify;\">Die Zaunanlagen werden mit einem Detektionskabel nachger\u00fcstet und sind nicht l\u00e4nger nur passiver Teil des Perimeterschutzes. Dieses System, wie das<span>&nbsp;<\/span><strong><a href=\"https:\/\/www.sorhea.com\/de\/products\/g-fence-3000\/\">G-Fence 3000 von Sorhea<\/a><\/strong>, beinhaltet Ersch\u00fctterungs- und Beschleunigungssensoren und registriert damit jede Manipulation am Zaun, egal ob Kletterversuch, Zerschneiden, Eindr\u00fccken, Durchbrechen. Jedes einzelnen Zaunsfeld ist sensorisch eine eigene Zone, was eine punktgenaue Zuordnung potentieller Penetrationsversuche erm\u00f6glicht.<\/li>\n \t<li style=\"text-align: justify;\">Bei ausgedehnten Objekten ist es leicht durch das Aufstellen von Videot\u00fcrmen wie den Systemen<span>&nbsp;<\/span><strong><a href=\"https:\/\/watchdome.de\/\">Watchdome von GT.AI<\/a><\/strong><span>&nbsp;<\/span>oder der<span>&nbsp;<\/span><strong><a href=\"https:\/\/de.dussmann.de\/mobile-videoueberwachung\">mobilen Video\u00fcberwachung von Dussmann<\/a><\/strong>, dem Perimeterschutz Langstreckenbewegungsmelder und intelligente Kameras hinzuzuf\u00fcgen.<\/li>\n \t<li style=\"text-align: justify;\">Die Patrouillen werden zuk\u00fcnftig nicht von einer Person, sondern durch Sicherheitsroboter abgebildet. Je nach Gr\u00f6\u00dfe des Areals sind diese auf 4 Beinen (auch indoor) unterwegs (ideal hier<span>&nbsp;<\/span><a href=\"https:\/\/security-robotics.de\/de\/vierbeiniger-roboter.html\">Spot<\/a>) oder fahren kontinuierlich (perfekt geeignet<span>&nbsp;<\/span><a href=\"https:\/\/security-robotics.de\/de\/radbetriebene-roboter.html\">Argus<\/a>) Ihre programmierten Routen ab. Dank kompletten 360\u00b0 Blick, Tageszeit und wetterunabh\u00e4ngigem Einsatz und flexibler Ausstattung k\u00f6nnen robotische Systeme in diesem Bereich mehr leisten als jeder noch so erfahrene Wachmann.<\/li>\n \t<li style=\"text-align: justify;\">An zentraler Stelle wie dem Wachgeb\u00e4ude oder der Sicherheitszentrale laufen alle Meldungen zusammen. Der Sicherheitsexperte hat also nicht nur den kleinen Bereich der Zufahrt im Blick, sondern ist \u00fcber die Unversehrtheit des Objektes ganzheitlich informiert.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Der entscheidende Qualit\u00e4tssprung und damit eine erh\u00f6hte Sicherheit, kosteneffizient und Fehlalarmreduziert, wird erreicht, wenn alle genannten Ma\u00dfnahmen als integriertes System arbeiten, gemeinsam, sich erg\u00e4nzend, unterst\u00fctzend.<\/p>\n[\/et_pb_text][et_pb_video src=\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/Tests-erfolgreich-Roboter-und-Zaunsensoren-arbeiten-Hand-in-Hand-fuer-maximale-Sicherheit.mp4\" _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" title_text=\"Tests erfolgreich Roboter und Zaunsensoren arbeiten Hand in Hand f\u00fcr maximale Sicherheit\" sticky_enabled=\"0\"][\/et_pb_video][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]\n<div class=\"ce_text block\">\n<h3 style=\"text-align: justify;\"><strong>Sicherheit auf die man sich verlassen kann<\/strong><\/h3>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">Wir von Security Robotics halten nichts von vollmundigen Versprechungen und reinen Showcases. Daher testen wir auf unserem eigenen Forschungsgel\u00e4nde ausf\u00fchrlich Sicherheitsroboter, Sensorik aller Art und nat\u00fcrlich auch die Systeme von Unternehmen, welche wir als Mehrwert einer ganzheitlichen Sicherheitskonzeptes betrachten.<\/p>\n<p style=\"text-align: justify;\">Erst wenn alles perfekt ineinandergreift und als vernetztes Ganzes funktioniert, stehen wir dahinter, bieten es in Kundenprojekten an und integrieren diese Technik ebenfalls in die<span>&nbsp;<\/span><strong>Acuda<\/strong><strong>\u00ae<\/strong><span>&nbsp;<\/span>Plattform.<\/p>\n<p style=\"text-align: justify;\">Es ist schon beeindruckend, wie verz\u00f6gerungsfrei agile robotische Systeme auf Penetrationsversuche reagieren, zielsicher den fraglichen Abschnitt, wie ein Zaunsfeld oder Tor ansteuern und dabei ihre Sensorik auf den potentiellen St\u00f6renfried richten.<span>&nbsp;<\/span><strong>Argus<\/strong><span>&nbsp;<\/span>kann seine lautstarken Durchsagen zur Abschreckung einsetzen,<span>&nbsp;<\/span><strong>Spot<\/strong><span>&nbsp;<\/span>den Vorfall in Bild &amp; Ton streamen und das<span>&nbsp;<\/span><strong><a href=\"https:\/\/security-robotics.de\/flugroboter\/\">Drohnensystem Beehive<\/a><\/strong><span>&nbsp;<\/span>mit unvergleichbarer \u00dcbersicht f\u00fcr Klarheit sorgen.<\/p>\n<p style=\"text-align: justify;\">Vor allem der Flugroboter eignet sich perfekt um Alarme zu verifizieren\/qualifizieren und ist im Zweifelsfall schneller vor Ort als jeder Wachmann. Besteht die Notwendigkeit werden andere Systeme unterst\u00fctzend zum Vorfall gesendet.<\/p>\n<p style=\"text-align: justify;\"><\/p>\n\n<\/div>\n<div class=\"ce_text block\">\n<h3 style=\"text-align: justify;\"><strong>Sicherheit 2023: Nicht wie immer, sondern besser machen!<\/strong><\/h3>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">Singlel\u00f6sungen haben ausgedient. Ein einfaches Mehr, statt Besser, ein rein personalzentrierter Ansatz und das Ignorieren der Notwendigkeit vernetzte robotische und Sicherheitssysteme einzusetzen, gen\u00fcgt bereits heute nicht mehr. In Zukunft werden Sicherheitsdienstleister keine Kundenanforderungen erf\u00fcllen k\u00f6nnen und Kunden dank mangelnder Qualit\u00e4t Ihrer Ma\u00dfnahmen kriminelle Elemente geradezu einladen. Soweit muss es nicht kommen.<\/p>\n<p style=\"text-align: justify;\"><strong>Ein Fazit, das auch Ihres sein sollte.<\/strong><\/p>\nSprechen Sie mit uns.\n\n<\/div>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.19.4\" _module_preset=\"default\" border_width_top=\"1px\" border_color_top=\"rgba(0,0,0,0.24)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"40px||||false|false\" custom_padding=\"40px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]\n<h3>CONTACT FOR PRESS &amp; COMMUNICATION:<\/h3>\nMichael Engel | <a href=\"mailto:m.engel@security-robotics.de\">m.engel@security-robotics.de<\/a>\n\nLandsberger Allee 366, 12681 Berlin\nTelefon: <span>+49 341 2569 3369<\/span>\n\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.19.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_contact_form captcha=\"off\" email=\"info@security-robotics.de\" title=\"Jetzt anfragen!\" submit_button_text=\"Abschicken\" module_id=\"et_pb_contact_form_0\" module_class=\"with-edge-top-right\" _builder_version=\"4.19.4\" _module_preset=\"default\" _unique_id=\"43c21b82-3e69-48bf-9754-a901d779e23f\" form_field_background_color=\"#FFFFFF\" form_field_text_color=\"#000000\" form_field_focus_background_color=\"RGBA(255,255,255,0)\" form_field_focus_text_color=\"#006CA6\" title_font=\"Expletus Sans||||||||\" title_text_color=\"#006CA6\" title_font_size=\"32px\" title_line_height=\"40px\" background_color=\"#FAFAFA\" custom_button=\"on\" custom_padding=\"44px|44px|44px|44px|true|true\" custom_padding_tablet=\"|24px||24px|true|true\" custom_padding_phone=\"|16px||16px|true|true\" custom_padding_last_edited=\"on|phone\" title_font_size_tablet=\"28px\" title_font_size_phone=\"24px\" title_font_size_last_edited=\"on|phone\" button_text_size_tablet=\"20px\" button_text_size_phone=\"18px\" button_text_size_last_edited=\"on|desktop\" custom_css_contact_button=\"margin-top: 24px;\" border_width_all=\"1px\" border_color_all=\"rgba(0,0,0,0.16)\" global_module=\"680\" saved_tabs=\"all\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_contact_field field_id=\"Name\" field_title=\"Name\" fullwidth_field=\"on\" _builder_version=\"4.19.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Email\" field_title=\"E-Mail-Adresse\" field_type=\"email\" fullwidth_field=\"on\" _builder_version=\"4.19.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Phone\" field_title=\"Telefon\" field_type=\"email\" fullwidth_field=\"on\" _builder_version=\"4.19.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][et_pb_contact_field field_id=\"Message\" field_title=\"Nachricht\" field_type=\"text\" fullwidth_field=\"on\" _builder_version=\"4.19.4\" global_colors_info=\"{}\" button_text_size__hover_enabled=\"off\" button_one_text_size__hover_enabled=\"off\" button_two_text_size__hover_enabled=\"off\" button_text_color__hover_enabled=\"off\" button_one_text_color__hover_enabled=\"off\" button_two_text_color__hover_enabled=\"off\" button_border_width__hover_enabled=\"off\" button_one_border_width__hover_enabled=\"off\" button_two_border_width__hover_enabled=\"off\" button_border_color__hover_enabled=\"off\" button_one_border_color__hover_enabled=\"off\" button_two_border_color__hover_enabled=\"off\" button_border_radius__hover_enabled=\"off\" button_one_border_radius__hover_enabled=\"off\" button_two_border_radius__hover_enabled=\"off\" button_letter_spacing__hover_enabled=\"off\" button_one_letter_spacing__hover_enabled=\"off\" button_two_letter_spacing__hover_enabled=\"off\" button_bg_color__hover_enabled=\"off\" button_one_bg_color__hover_enabled=\"off\" button_two_bg_color__hover_enabled=\"off\" theme_builder_area=\"post_content\"][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","footnotes":""},"categories":[20,23,1],"tags":[],"class_list":["post-2994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles","category-aktuelles-en","category-unkategorisiert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Advantages of networked security robots - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advantages of networked security robots\" \/>\n<meta property=\"og:description\" content=\"In current, more aptly called conservative security concepts, technical solutions are often still used too selectively, a camera here, a motion detector there, a light barrier there. Although attention is paid to covering critical and access areas as completely as possible, especially with cameras, the focus is rarely on the entire perimeter. Serious security incidents, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-30T11:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-24T13:28:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1852\" \/>\n\t<meta property=\"og:image:height\" content=\"926\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots\",\"url\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots\",\"name\":\"Advantages of networked security robots - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#primaryimage\"},\"image\":{\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#primaryimage\"},\"thumbnailUrl\":\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg\",\"datePublished\":\"2023-03-30T11:54:00+00:00\",\"dateModified\":\"2023-10-24T13:28:37+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#primaryimage\",\"url\":\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg\",\"contentUrl\":\"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg\",\"width\":1852,\"height\":926},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advantages of networked security robots\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Advantages of networked security robots - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots","og_locale":"en_US","og_type":"article","og_title":"Advantages of networked security robots","og_description":"In current, more aptly called conservative security concepts, technical solutions are often still used too selectively, a camera here, a motion detector there, a light barrier there. Although attention is paid to covering critical and access areas as completely as possible, especially with cameras, the focus is rarely on the entire perimeter. Serious security incidents, [&hellip;]","og_url":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots","og_site_name":"Security Robotics","article_published_time":"2023-03-30T11:54:00+00:00","article_modified_time":"2023-10-24T13:28:37+00:00","og_image":[{"width":1852,"height":926,"url":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg","type":"image\/jpeg"}],"author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots","url":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots","name":"Advantages of networked security robots - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"primaryImageOfPage":{"@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#primaryimage"},"image":{"@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#primaryimage"},"thumbnailUrl":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg","datePublished":"2023-03-30T11:54:00+00:00","dateModified":"2023-10-24T13:28:37+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#primaryimage","url":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg","contentUrl":"https:\/\/security-robotics.de\/wp-content\/uploads\/2023\/03\/zaunsensorik-und-robotics.jpg","width":1852,"height":926},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/aktuelles-en\/advantages-of-networked-security-robots#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Advantages of networked security robots"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/2994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=2994"}],"version-history":[{"count":6,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/2994\/revisions"}],"predecessor-version":[{"id":4276,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/2994\/revisions\/4276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media\/2986"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=2994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=2994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=2994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}