{"id":320,"date":"2022-04-18T16:54:47","date_gmt":"2022-04-18T16:54:47","guid":{"rendered":"https:\/\/www.jadealarm.com\/blog\/?p=320"},"modified":"2022-04-18T17:19:06","modified_gmt":"2022-04-18T17:19:06","slug":"the-g-fence-perimeter-detection-alarm-system","status":"publish","type":"post","link":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/","title":{"rendered":"THE G-FENCE PERIMETER DETECTION ALARM  SYSTEM PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN DETECTING FENCE ATTACKS"},"content":{"rendered":"\n<p><strong>PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.<\/strong><\/p>\n\n\n\n<p>As our needs for perimeter detection of attacks on fencing increased, Jade Alarm Co. began investigating the new technology that was now available. After narrowing the choices, we focused our efforts on a firm that we are an authorized dealer of and had previously utilized their outdoor PIRAMID motion detection sensors. This manufacturer has its act together. Their YouTube videos got our installer familiar with the proper method of installation and within a day the ENTIRE fence line detection system was in stalled around the perimeter of our property and then our Service Manager was able to program the entire system and get it interfaced into our own facility\u2019s security system!<\/p>\n\n\n\n<p><strong><em>WE THEN WAITED AND WATCHED <\/em><\/strong>\u2013 would it be of sufficient durability and reliability to weather the Mid-West\u2019s harsh environ ments and allow us to offer it to my valued customers who were having issues as well as new customers? The next week \u2013 the sleet starting to come down and then the snow and high winds\u2026.<\/p>\n\n\n\n<p>The only alarm was due to squirrels jumping from the Propane tanks (used for the backup fuel source for the generators in the event primary natural gas failed) onto the fence \u2013 WOW!<\/p>\n\n\n\n<p>We conducted extensive perimeter detection testing of the system including one of our personnel CUTTING the fence line before we felt comfortable enough to recommend it to prospective customers\u2026..The system detected everything we could throw at it. But, would it work under actual intrusion conditions\u2014that was the question being asked\u2026<\/p>\n\n\n\n<p><strong><em>This was a pre-cursor of events to come\u2026<\/em><br><\/strong>The G-Fence system triggered at 04:57:53 hours the morning 02\/15 when an intruder penetrated our perimeter chain link fencing. This was a very determined attack as the intruder had to scale the wall area to the South. There was a very tight space between the neighbor\u2019s wooden picket fence and our chain link fence (topped with UltraBarrier spikes). The fence detection system alerted us of the attempted intrusion and the would be thief was repelled.<\/p>\n\n\n\n<p>With proper perimeter detection by this reliable system and remote video verification by our Central Station Dispatchers, Jade Alarm Co.\u00a0 can proudly recommend this system to our valuable customers!<\/p>\n\n\n\n<p>If you have questions\u2014just call and talk to our consultants!<\/p>\n\n\n\n<h2 class=\"has-text-align-center\" id=\"h-we-are-here-to-helpwith-your-perimeter-detection-needs-call-now-816-333-5233\"><strong><em>WE ARE HERE TO HELP<\/em><\/strong><br><strong><em>WITH YOUR PERIMETER DETECTION NEEDS!<\/em><\/strong><br><strong><em>CALL NOW! 816-333-5233<\/em><\/strong><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING. As our needs for perimeter detection of attacks on fencing increased, Jade Alarm Co. began investigating the new technology that was now available. After narrowing the choices, we focused our efforts on a firm that we are an authorized dealer of and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":321,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":[],"categories":[10,6,9],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v18.1 (Yoast SEO v18.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>THE G-FENCE PERIMETER ALARM DETECTION SYSTEM<\/title>\n<meta name=\"description\" content=\"PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"THE G-FENCE PERIMETER DETECTION ALARM SYSTEM PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN DETECTING FENCE ATTACKS\" \/>\n<meta property=\"og:description\" content=\"PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Jade Alarm\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T16:54:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-18T17:19:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2022\/04\/image2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"519\" \/>\n\t<meta property=\"og:image:height\" content=\"282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmp@jadealarm.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#website\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/\",\"name\":\"Jade Alarm\",\"description\":\"Informative Advice from Security Professionals\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.jadealarm.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2022\/04\/image2.png\",\"contentUrl\":\"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2022\/04\/image2.png\",\"width\":519,\"height\":282},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#webpage\",\"url\":\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/\",\"name\":\"THE G-FENCE PERIMETER ALARM DETECTION SYSTEM\",\"isPartOf\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#primaryimage\"},\"datePublished\":\"2022-04-18T16:54:47+00:00\",\"dateModified\":\"2022-04-18T17:19:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0\"},\"description\":\"PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.jadealarm.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"THE G-FENCE PERIMETER DETECTION ALARM SYSTEM PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN DETECTING FENCE ATTACKS\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0\",\"name\":\"jmp@jadealarm.com\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.jadealarm.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g\",\"caption\":\"jmp@jadealarm.com\"},\"sameAs\":[\"https:\/\/www.jadealarm.com\/blog\"],\"url\":\"https:\/\/www.jadealarm.com\/blog\/author\/jmpjadealarm-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"THE G-FENCE PERIMETER ALARM DETECTION SYSTEM","description":"PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/","og_locale":"en_US","og_type":"article","og_title":"THE G-FENCE PERIMETER DETECTION ALARM SYSTEM PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN DETECTING FENCE ATTACKS","og_description":"PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.","og_url":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/","og_site_name":"Jade Alarm","article_published_time":"2022-04-18T16:54:47+00:00","article_modified_time":"2022-04-18T17:19:06+00:00","og_image":[{"width":519,"height":282,"url":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2022\/04\/image2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmp@jadealarm.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.jadealarm.com\/blog\/#website","url":"https:\/\/www.jadealarm.com\/blog\/","name":"Jade Alarm","description":"Informative Advice from Security Professionals","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jadealarm.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2022\/04\/image2.png","contentUrl":"https:\/\/www.jadealarm.com\/blog\/wp-content\/uploads\/2022\/04\/image2.png","width":519,"height":282},{"@type":"WebPage","@id":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#webpage","url":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/","name":"THE G-FENCE PERIMETER ALARM DETECTION SYSTEM","isPartOf":{"@id":"https:\/\/www.jadealarm.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#primaryimage"},"datePublished":"2022-04-18T16:54:47+00:00","dateModified":"2022-04-18T17:19:06+00:00","author":{"@id":"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0"},"description":"PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN PERIMETER DETECTION OF AN INTRUDER ATTEMPTING TO CLIMB, CUT, OR RAISE THE FENCING.","breadcrumb":{"@id":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.jadealarm.com\/blog\/2022\/04\/18\/the-g-fence-perimeter-detection-alarm-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jadealarm.com\/blog\/"},{"@type":"ListItem","position":2,"name":"THE G-FENCE PERIMETER DETECTION ALARM SYSTEM PROVEN TO BE RELIABLE, DURABLE AND DEPENDABLE IN DETECTING FENCE ATTACKS"}]},{"@type":"Person","@id":"https:\/\/www.jadealarm.com\/blog\/#\/schema\/person\/b4c5a01dc7e7f6624a81f0017a1546b0","name":"jmp@jadealarm.com","image":{"@type":"ImageObject","@id":"https:\/\/www.jadealarm.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ea79dfd8f05a46688da36d16ba1ecd7?s=96&d=mm&r=g","caption":"jmp@jadealarm.com"},"sameAs":["https:\/\/www.jadealarm.com\/blog"],"url":"https:\/\/www.jadealarm.com\/blog\/author\/jmpjadealarm-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/320"}],"collection":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":4,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/posts\/320\/revisions\/329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/media\/321"}],"wp:attachment":[{"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jadealarm.com\/blog\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}