Sara Verbruggen

Freelance journalist

Author Bio ▼

Experienced freelance B2B journalist and editor, specialising in fields of renewable energy, energy storage, smart grids and nanotech.
July 4, 2017

Sign up to free email newsletters


“Second to none”: Inner Range improves security and access control for a large college in Stockport

IFseC 2017

“What cannot be seen, cannot be stolen”: Fog Bandit demos security fog system at IFSEC 2017

IFSEC International, held at ExCel London in June, was chosen as the launch for the new Fog Bandit 320 range, for anti-theft applications.

At the show the Bandit UK team provided live demonstrations of the device.

As well as being smaller and lighter, Fog Bandit 320 has many unique patented design and technical features.

Fog Bandit is the fastest security fogging system of its kind, for round-the-clock security. When sensors detect an intruder or a personal alarm is raised the system delivers a dense, visually impenetrable fog at a rapid rate.

The technology acts as daytime robbery deterrent, for example, by creating a fog curtain between the raider and the staff and goods. Overnight protection is achieved by filling a room where valuable stock, equipment and other contents is kept, with dense fog. The objects, obscured from sight, are protected from the possibility of theft or damage, until police or security personnel arrive.

Fog Bandit 320 can be mounted in any orientation on walls or ceilings. The system weighs 7kg (max 9kg with cartridges installed) and includes an independent control box for all electronics. Installation is simple. The new compact, self-change disposable fog cartridge has very low power consumption and does not require servicing.

Different shell and facia colours are available.

Using a new patented heat exchanger, the 320 can protect smaller rooms with a fog ejection reaction time in a quarter of a second from when an activation signal is received. Fog is fully ejected in under four seconds.

Free Download: The key to mitigating cybersecurity risks

Exploiting IoT technology without creating cybersecurity vulnerabilities is one of the defining challenges in today’s security landscape.

This report will help you to see why third parties should adhere to ‘secure by design’ principles and why the necessary convergence of IT and security departments demands a holistic approach.

Download now

Related Topics

Leave a Reply

Be the First to Comment!

Notify of