
Product Retirement Reminder: Analog Microwave Intrusion Detection Sensors
Reminder: Southwest Microwave analog sensors are available for purchase until December 31, 2022. On this date, we will retire our full range of analog volumetric
Customers in the critical infrastructure sector have consistently been able to trust the quality, longevity and performance of our detection technologies.
Customers in the critical infrastructure sector have consistently been able to trust the quality, longevity and performance of our detection technologies.
A physical attack on a utility inflicts damage and destruction
to vital infrastructure, affecting delivery of services and threatening public and environmental health and safety.
Providers within the electric and renewable energy, water & wastewater and oil & gas sectors rely on Southwest Microwave to protect their sites from acts of terrorism, sabotage, vandalism and theft, and against the legal and financial liability resulting from these attacks. Our technologies reliably prevent unauthorized access to property, critical equipment and networks.
Our team understands the high stakes involved in securing power plants, substations, dams, control centers, treatment plants, pump sites, pipelines, tank farms, refineries, compression stations and storage facilities. Our conceptual designs are customized to address a site’s unique risks while also meeting the stringent industry standards and regulations required for utilities to effectively deter, detect, delay and assess security threats.
Applications
FEATURED SOLUTIONS
Reminder: Southwest Microwave analog sensors are available for purchase until December 31, 2022. On this date, we will retire our full range of analog volumetric
Southwest Microwave, a global leader in high-performance outdoor perimeter security technologies, launched two advanced digital K-band microwave transceivers with hybrid power and communication options to
Water and wastewater facilities are critical components of any country’s infrastructure. Knowledge of potential threats and technology limitations are essential to designing an effective perimeter