Improving physical security while saving money
By Todd Brisebois, Product Manager
January 2, 2018
Is it possible to reduce both capital and operational costs while dramatically improving the security of a site? With the Senstar LM100 2-in-1 hybrid perimeter intrusion detection and intelligent lighting system, the answer is yes! Let’s compare the Total Cost of Ownership (TCO) of the Senstar LM100 against other security lighting solutions. The results are clear: The Senstar LM100 pays for itself in savings after a period of 2–4 years.
Security lighting with intrusion detection
The world’s first 2-in-1 perimeter intrusion detection and intelligent lighting system, the Senstar LM100 combines two key security functions in one cutting-edge product. The Senstar LM100 is a powerful deterrent – detecting and illuminating potential intruders at the fence line while alerting the site’s security system.
Lower installation, maintenance and electrical costs
With its ultra-efficient LED technology, simple installation, and long lifespan, the Senstar LM100 provides a Return on Investment (ROI) far exceeding that of traditional perimeter security lighting. By virtually eliminating maintenance costs and drastically reducing electricity usage, the Senstar LM100 has the lowest TCO of any perimeter security lighting solution.
The following graph compares the 6-year TCO of current perimeter security lighting technologies. These costs take into account the material, installation, operating, and maintenance costs over a 6-year period and are based on a 600 m (0.37 mi) fence perimeter.
As the above graph shows, the Senstar LM100 has a payback period of 2–4 years (depending on technology being replaced), with a 6-year maintenance and operating cost of only $620.
For an PDF version of this information, click here.
Security Digest is dedicated to providing useful information about physical security. Written by Senstar’s industry experts, the posts will cover a range of subjects related to perimeter intrusion detection, video management and analytics, personal duress, and cyber security. Questions and/or comments? Email [email protected].