Skip to main content

Intrusion Detection

Define restricted zones on any camera view and receive instant alerts when unauthorized persons or objects enter, exit, or dwell within boundaries. Visylix Intrusion Detection combines object detection with spatial reasoning for intelligent perimeter security.

About Intrusion Detection

Visylix Intrusion Detection enables operators to define restricted zones as polygonal boundaries on any camera view and triggers alerts when persons, vehicles, or objects enter, exit, or dwell within those zones. The model combines person and object detection with spatial reasoning to distinguish legitimate activity from unauthorized access. Each zone supports independent rules for entry direction, minimum dwell time, object class filters, and schedule-based activation. Non-compliance events are flagged instantly with annotated snapshots and delivered via the Visylix dashboard, webhook, or alarm output. The system operates continuously across all monitored zones, providing shift-level intrusion statistics and audit-ready logs for security compliance programs.

Key Features

Engineered for accuracy, speed, and seamless integration into enterprise workflows.

Polygonal Zone Definition

Draw restricted zones with unlimited vertices on any camera view for precise boundary mapping. Each zone operates independently with its own rules and alert routing.

Enter, Exit & Dwell Rules

Configure per-zone rules for entry direction, exit detection, and minimum dwell time thresholds. Trigger alerts based on the specific type of intrusion activity detected.

Object Class Filtering

Trigger alerts only on specific categories such as persons, vehicles, or other object types per zone. Reduces false positives and focuses alerts on relevant security scenarios.

Schedule-Based Activation

Arm and disarm zones based on time-of-day profiles for different operational modes. Support for business hours, after-hours, weekends, and custom schedules.

Instant Alert Delivery

Receive alerts via dashboard, webhook, email, and alarm output with annotated snapshot evidence showing the exact zone violation and object involved.

Audit-Ready Logging

Comprehensive intrusion logs with timestamp, zone ID, object class, and snapshot for compliance reporting and post-incident forensic investigation.

Real-World Use Cases

Deployed across industries to deliver measurable value from day one.

Perimeter Security

Protect critical infrastructure sites with fence-line zone definitions and alarm system integration that detects unauthorized entry attempts at facility boundaries.

Restricted Area Monitoring

Secure data centers, server rooms, and classified areas with immediate alert escalation when unauthorized presence is detected, ensuring physical security compliance.

Construction Site Protection

Define equipment storage and material staging areas as restricted zones to prevent theft and vandalism during off-hours with automated intrusion alerts.

Corporate Campus Security

Monitor building perimeters, parking areas, and restricted wings with zone-based intrusion detection integrated with access control and security management systems.

Technical Specifications

Detection MethodObject detection + spatial reasoning
Zone TypesPolygon with unlimited vertices
RulesEnter, exit, dwell, directional
Object ClassesPerson, vehicle, configurable
Alert Latency< 100 ms from detection
Multi-ZoneUnlimited zones per camera
SchedulingPer-zone time-based arming profiles
Supported ProtocolsRTSP, RTMP, HTTP-FLV, WebRTC
HardwareNVIDIA T4 / L4 / A100 / Jetson
DeploymentOn-premise, edge, or cloud

Ready to Get Started?

Discover how Visylix AI models can transform your video infrastructure into an intelligent, automated system.