top of page

SECURITY TECHNOLOGY

 

HGH provides responsive, personalized and comprehensive emerging security technology solutions.  We specialize in physical security but also have extensive experience providing technology development, testing, deployment and program management support within a variety of capacities.  We are very methodical in assisting our customer with their technology needs.  We believe in the Crawl-Walk-Run approach which insures all processes remain properly aligned with the customers requirements.  Our model is simple and has resulted in successful product development, testing, deployment and sustainment.
 

TECHNOLOGY TOOLS

GPS TRACKING

GPS TRACKING SYSTEMS

Using up-to-date technology we customize GPS systems to monitor your personnel and assets.  Some of our capabilities are:

  • Tracking for Vehicles, Personnel, Sea craft or Aircraft

  • Instant Communication with Command Centers

  • Instant Communication with Other Field Assets

  • Analytics and Status Data such as Fuel, Vehicle

  • Subsystem, Speed, Direction, etc.

  • Data Management Capability

Our GPS technology has these features:

  • User Friendly Web Applications

  • Real Time Vehicle Location Info

  • 2 Years of Online Recording

  • Downloadable Reports

  • Geo-fencing Capability

  • SMS, Email, and Text Notifications

  • Wireless Networking of Map Data and Incident Report

PERIMETER SECURITY & INTRUSION DETECTION SYSTEMS

PERIMETER SECURITY AND INTRUSION DETECTION SYSTEMS


We supply electronic alarm fences and virtual fences, combined with electro-optical pointing, verification and tracking to detect and deter attempts by intruders to breach secured facilities and critical infrastructures.

TRANSPORTATION SECURITY & SAFETY SYSTEMS

TRANSPORTATION SECURITY AND SAFETY SYSTEMS

We provide security and safety solutions for railroad authorities, including railway security systems and anti-collision alert systems for crossing junctions.

UNMANNED AERIAL VEHICLES (UAV)

UNMANNED AERIAL VEHICLES (UAV)

We offer a Class II helicopter UAV with a 40 km range, called the CONDOR. The CONDOR is a tactical UAV whose purpose is to supply immediate information and support to the appropriate battalion/company ground commander(s) or similar-level police, security or intelligence collecting organization engaged in action.

SEAPORT & COASTAL SURVEILLANCE SYSTEMS

SEAPORT AND COASTAL SURVEILLANCE SYSTEMS

We supply comprehensive surveillance systems for monitoring maritime traffic, prevention of smuggling, illegal shipments, customs violations and illegal immigration, controlling fishing activities and coordination of search and rescue.
 

AIRPORT AVIATION SECURITY SYSTEMS

AIRPORT AVIATION SECURITY SYSTEMS

​We supply a variety of solutions to secure airports and related aviation security facilities from undesired intrusions, supporting secure airport operations while complying with the range of regulations that govern airport and aviation security. We also supply national-based access security solutions for air traffic control missions.

SAFE CITY SYSTEMS

SAFE CITY SYSTEMS

We are improving “safe city” crime reduction, terror detection and disaster recovery solutions combining fully integrated C4I systems with advanced electro- optics surveillance, UAVs, communication solutions and other systems to provide city-wide event detection and operations coordination, management and control.

BORDER SURVEILLANCE SYSTEMS

BORDER SURVEILLANCE SYSTEMS


We supply a range of systems and products for border, surveillance, including day/night laser designated observation systems, mini-UAVs, surveillance land vehicles and C4I-based systems combining some or all of the above-mentioned systems.

COUNTER IED SOLUTIONS

COUNTER IED SOLUTIONS

Jamming Systems - Electronic Counter Measures (ECM)Technology
An IED Jammer blocks radio signals used to detonate a remote controlled improvised explosive device or RCIED. Also known as an RF Jammer, this high powered IED Jammer saturates the environment with radio frequency pulses of electromagnetic energy.

1-1.jpg
INTEGRATED PIPELINE ACCESS SECURITY SYSTEMS (I-PASS)

INTEGRATED PIPELINE ACCESS SECURITY SYSTEMS (I-PASS)

The IPASS system was developed to give the best solution for protection of pipe lines or other infrastructure installations of the energy industry. The system has two different derived versions for two different applications:


IPASS – surface – dedicated to protect above the ground installations – when the fiber is buried near the surface on a special layer in order to detect activities on the ground (cars or other vehicles, people, etc...).


​IPASS – underground – dedicated for buried pipelines -when the fiber is buried along the pipe in order todetect digging or other activity on the pipe.


​The Acoustic Fiber Optic of the two versions is based on the same technology and basic difference between them consists on the installation approach and the tuning of the identification algorithm.

IPASS.png
bottom of page