SURVEILLANCE SOLUTIONS

CCTV Cameras can provide the home and business monitoring and protection you need with many options as they come in a wide variety of sizes and shapes. Knowing these options and advantages of each can help you select the ideal security camera for your exact needs.
Those in colour generally require a higher level of lighting than their Black & White counterparts do. Colour Security Cameras give the advantage of being able to easily distinguish and detect objects simply by their colors where Black & White cameras offer better resolution in low light conditions.
Before selecting the type of Camera that will fulfill your requirements, you should consider; the type of residential security cameras you need, the area they need to cover, distance they need to cover and do they need to be discreet or a deterrent.
Select the type of CCTV camera you require. If you are unsure, give our experienced sales team a call!


ACCESS CONTROL

Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system. Preserving your privacy or property has become quite an issue nowadays. Do you feel your home is no longer a safe place, or that your trade secrets could become compromised? Do you want to keep unauthorized personnel out of some areas? Perhaps you already have some sort of access control system, but it isn't suitable? Maybe you just want to know who's ringing your door bell. We can help you deal with any of these situations, and more. In physical security, the term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems, which control electronic or mechanical locks.

Biometric (Fingerprint, Iris, Face)

Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. The only commercially widely available form is the fingerprint reader. Upon installation the prints of 1 or 2 fingers per user are programmed into the reader. Presenting the correct fingertip to the biometric reader plate will send an electric impulse to the door lock to open up. A biometric reader works in conjunction with an electronic door release or an electronically operated lock. Iris or face detection also can be done for high security access areas. This solution usually looks nice and is suitable for high security area.

Proximity Card

A proximity card or proxy card is a smart card which can be "read" without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards. To use, the proximity card is held near an electronic reader unit for a moment. The reader usually produces a "beep" or other sound to indicate the card has been read. Proximity cards typically have a range of around 5 cm (2 inches) for reading, so the user often leaves the card inside his or her wallet or purse, and simply holds the wallet or purse near the reader.

Electromagnetic Doors

An electromagnetic door, magnetic lock, or maglock is a locking device that consists of an electromagnet and an armature plate. There are two main categories of maglock namely "fail safe" and "fail secure". By attaching the electromagnet to the door frame and the armature plate to the door, a current passing through the electromagnet attracts ("fail safe") or releases ("fail secure") the armature plate. A "fail safe" magnetic lock requires power to remain locked and is therefore not suitable for high security applications, because it is possible to bypass the lock by disrupting the power supply. However, "fail safe" maglocks are well suited for use on emergency exit doors, because they are less likely to fail to unlock. "Fail secure" maglocks use a permanent magnet to keep the door shut and use current passing through an electromagnet to cancel out the permanent magnet and release the door.

Single / Multi Door Controllers

There are many types of controllers depending upon the purpose and function. Serial Controllers are connected to a host PC via a serial RS-485 communication line. Serial main and sub-controllers are an all door hardware is connected to sub-controllers (a.k.a. door controllers or door interfaces). Sub-controllers usually do not make access decisions, and forward all requests to the main controllers. Serial main controllers & intelligent readers are all door hardware is connected directly to intelligent or semi-intelligent readers. Readers usually do not make access decisions, and forward all requests to the main controller. Only if the connection to the main controller is unavailable, the readers use their internal database to make access decisions and record events. Semi-intelligent reader that have no database and cannot function without the main controller should be used only in areas that do not require high security. Serial controllers with terminal servers in spite of the rapid development and increasing use of computer networks, access control manufacturers remained conservative and did not rush to introduce network-enabled products. When pressed for solutions with network connectivity, many chose the option requiring fewer efforts: addition of a terminal server, a device that converts serial data for transmission via LAN or WAN. Network-enabled main controller's topology is nearly the same as described in the second and third paragraphs. The same advantages and disadvantages apply, but the on-board network interface offers a couple valuable improvements. Transmission of configuration and users to the main controllers is faster and may be done in parallel. IP Controllers are connected to a host PC via Ethernet LAN or WAN

Security Systems