Divisus
Integrated Security Solutions
(495) 663-71-75
Products and Technologies
Mobile Communication System
“Unicom-1” mobile communication system is intended for control of border guards patrol duties
Face Recognition Technology
Face recognition technology developed by Divisus allows creation of automated access points at sensitive and military infrastructures and search for wanted persons for security forces and agencies.
Long-Range Video Surveillance System
“Divisus Observer” standalone long-range video surveillance and thermal imaging system is intended for protection and surveillance of state boarders, big open spaces and remote sites.
News
On April 12, 1961 the whole world was astonished with the news opening a new era in the history of space exploration. On this day a Soviet cosmonaut Yury Gagarin circled the Earth aboard the Vostok spacecraft. This history-making event paved the way for space exploration, thousands of satellites have been launched since that time, there are space modules landing on other planets and asteroids...
Published: 12.04.2016
On 29-30 January 2016 “Divisus” learning center hosted a round table on the Experience in Detection of Traffic Law Violations. 56 market experts from over 20 cities throughout Russia and CIS attended the event. The scope of discussion was wide and included road safety and application of traffic enforcement systems and city police and administration awareness. The experts have highlighted the fol...
Published: 05.02.2016

“Graphs” Technology

Sometimes it is quite complicated to connect all devices used in access control system and apply various identification rules from system settings.

Divisus access control software incorporates “graphs” technology – a mechanism for creation of different operating rules for all access control system elements with certain identifiers, access restriction equipment, various security sensors, operating time for each element, “if … then” logical elements. This way our software enables system flexibility to address almost all kinds of access control tasks.

This way “graphs” can be used to provide access by proximity cards and keyboards to the armory room , authorize vehicle access by license plate and driver’s proximity card, connect turnstile or enable manual confirmation from the security guard.