Intrusion Detection
Define restricted zones on any camera view and receive instant alerts when unauthorized persons or objects enter, exit, or dwell within boundaries. Visylix Intrusion Detection combines object detection with spatial reasoning for intelligent perimeter security.
About Intrusion Detection
Visylix Intrusion Detection enables operators to define restricted zones as polygonal boundaries on any camera view and triggers alerts when persons, vehicles, or objects enter, exit, or dwell within those zones. The model combines person and object detection with spatial reasoning to distinguish legitimate activity from unauthorized access. Each zone supports independent rules for entry direction, minimum dwell time, object class filters, and schedule-based activation. Non-compliance events are flagged instantly with annotated snapshots and delivered via the Visylix dashboard, webhook, or alarm output. The system operates continuously across all monitored zones, providing shift-level intrusion statistics and audit-ready logs for security compliance programs.
Key Features
Engineered for accuracy, speed, and seamless integration into enterprise workflows.
Polygonal Zone Definition
Draw restricted zones with unlimited vertices on any camera view for precise boundary mapping. Each zone operates independently with its own rules and alert routing.
Enter, Exit & Dwell Rules
Configure per-zone rules for entry direction, exit detection, and minimum dwell time thresholds. Trigger alerts based on the specific type of intrusion activity detected.
Object Class Filtering
Trigger alerts only on specific categories such as persons, vehicles, or other object types per zone. Reduces false positives and focuses alerts on relevant security scenarios.
Schedule-Based Activation
Arm and disarm zones based on time-of-day profiles for different operational modes. Support for business hours, after-hours, weekends, and custom schedules.
Instant Alert Delivery
Receive alerts via dashboard, webhook, email, and alarm output with annotated snapshot evidence showing the exact zone violation and object involved.
Audit-Ready Logging
Comprehensive intrusion logs with timestamp, zone ID, object class, and snapshot for compliance reporting and post-incident forensic investigation.
Real-World Use Cases
Deployed across industries to deliver measurable value from day one.
Perimeter Security
Protect critical infrastructure sites with fence-line zone definitions and alarm system integration that detects unauthorized entry attempts at facility boundaries.
Restricted Area Monitoring
Secure data centers, server rooms, and classified areas with immediate alert escalation when unauthorized presence is detected, ensuring physical security compliance.
Construction Site Protection
Define equipment storage and material staging areas as restricted zones to prevent theft and vandalism during off-hours with automated intrusion alerts.
Corporate Campus Security
Monitor building perimeters, parking areas, and restricted wings with zone-based intrusion detection integrated with access control and security management systems.
Technical Specifications
Explore More AI Models
Combine multiple models for comprehensive video intelligence coverage.
Ready to Get Started?
Discover how Visylix AI models can transform your video infrastructure into an intelligent, automated system.