The LBASense Investigation Tool is mainly tailored for Security Managers in private premises such as government buildings, construction sites or retails.
Why Do You Need It?
Awareness and quick response are essential to guarantee safe environments to the whole population and in community infrastructures.
We offer appropriate tools to enable decision makers to take the most effective actions when a blacklisted phone or a device previously marked as suspicious is detected. Our sensors are deployed in strategic places or critical infrastructures, to properly monitor movements in particular areas.
We therefore bring you the opportunity to search among a list of detected visitors for target persons, to anticipate security answers as well as to save the cost of expensive 24/7 manned surveillance.
What Will You Get?
We offer you to visualise the list of all phones detected on your premises and to search for a particular device.
Sensors detect and track phones for as long as they remain in range. At any time, the detection’s history of a specific visitor can be retrieved and analysed in terms of visited regions and related timestamps. The target search is performed based on visitor identifier, phone’s MAC address or profile.
This unique technology provides an effective permanent watch, generating alerts whenever a suspicious individual is detected in a forbidden area (dormitory, university, factory outlet, etc.).
Provided features include: List of present visitors, Search for a target device, Profile History, Device Registration, Alert Configuration.
The solution consists of a full package of sensors and monitoring tools. The system is based on multiple short-range mobile phones detectors to be deployed in the selected area, that passively sense data transmitted over WiFi.
Results are visualised on a web-based and password-protected dashboard.
Moreover, data are available in real-time and historical views, in daily, hourly and customisable resolution, for various types of population (staff, passers-by, etc.).
Why Our Product?
Thanks to our unique technology, we provide analytics, highly accurate and at low cost.
iOS devices are transmitting a temporary MAC address while searching for nearby access points. Our technology is capable of identifying the real device hidden behind the temporary MAC address, hence of counting the number of mobile devices in the area.
ONE SENSOR, MULTIPLE RANGES
Based on a unique combination of hardware and software, our sensors are also capable of controlling their detection range, providing different “virtual” regions of coverage using the same physical device.
Our sensors detect a unique mobile phone identifier: unlike other systems, there is no double counting.
You want to know more about the Investigation Tool solution and understand how this solution can fit your business? Contact us to ask for a quotation tailored to your scenario.