CCTV Cameras Johannesburg

The Specialists In CCTV Security Cameras In Johannesburg. Supply & Installation

Security Alarm Systems Johannesburg

The Specialists in Security Alarm Systems In Johannesburg. Supply & Install

Access Control Systems Johannesburg

The Specialists In Access Control Systems In Johannesburg. Supply & Installation

CCTV Cameras

CCTV Cameras Johannesburg. Suppliers & Installers of CCTV Cameras Johannesburg.

http://advanced-security.co.za/wp-admin/post.php?post=2&action=edit#

Security Alarm Systems

Security Alarm Systems Johannesburg. Installers & Suppliers of Security Alarm Systems.

Access Control

Access Control Systems Johannesburg. Specialists in Access Control

What Our Clients Say

Don’t just take it from us, let our customers do the talking!

Advanced Security

Contact Us

Security Alarm Systems

A security alarm system is a system designed to detect intrusion – unauthorized entry – into a home, business or specific area. Security alarms are used in residential, commercial, industrial, and military properties for protection against robberies, theft, property damage and personal protection against intruders.

Some alarm systems serve one purpose of robbery protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with CCTV systems to automatically record the activities of intruders, and may interface to access control systems. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control. This is designed to your needs and specifications. It may even include two-way voice which allows communication between the panel and Monitoring.

• The Alarm Control Panel is known as the “brain” of the system, it reads sensor inputs, tracks and registers arm/disarm status, and signals intrusions and movement. Today, this is typically one or more computer circuit boards inside a metal enclosure, along with a power supply.
• Sensors: Devices this detects intrusions. Sensors may be placed at the perimeter of the protected area, within it, or both. Sensors can detect intruders by many different methods, such as monitoring doors and windows for opening, or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances.
• Alerting devices: These indicate an alarmed state. Most commonly, these are bells, sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially scaring off robbers. These devices may also be used to warn occupants of a fire or smoke condition.
• Keypads: Small devices, typically wall-mounted, which function as the human-machine interface to the system. In addition to buttons, keypads typically feature indicator lights, a small multi-character display, or both.
• Interconnections between components. This may consist of direct wiring to the control unit, or wireless links with local power supplies.
• Security devices: Devices to detect unauthorized entry or movements such as spotlights, cameras & lasers.

In addition to the system itself, security alarm systems are often coupled with a monitoring service. In the event of an alarm, the premises control unit contacts a central monitoring station for example ADT or Chubb. Operators at the station see the signal and take appropriate action, such as contacting property owners, notifying police, or dispatching private security forces to the property to assess what the issue is. Such signals may be transmitted via dedicated alarm circuits, telephone lines, or the internet.

Upgrading to Wireless Access Control

Wireless access control allows for:

• Quicker, easier, less disruptive, cheaper maintenance.
• Easier integration with existing access control systems.
• Easy, quick, minimally disruptive installation.
• Battery life in exceeds two years.

It’s worthwhile to start thinking of the benefits of wireless access control as opposed to its wired counterparts. Wireless offers the installer the benefit of a less complicated installation, “especially in those hard to reach areas where trunking just isn’t possible. The end-user in this instance receives a more finished and whole solution which otherwise would have created many more problems such as remodeling and redesigning … if access control was critical for that location.”

He adds that a wireless solution should offer a hybrid variation with wired systems. “The power of hybrid means that wireless becomes complementary as pure wireless does have range limitations.”

Wireless access control solutions allow for quicker installation, but adds that they also provide more options for installation. This reduces the cost of labour and time on-site drastically.

The ease of wireless access is like using Wi-Fi to connect your laptop to the Internet, as opposed to a network cable. It just makes everything easier. The benefits extend to installation where time to install is reduced dramatically, which results in labour cost savings. Secondly, there is a saving on the cost of material, such as cabling, conduit and other peripheral equipment.

Overall maintenance on the system is reduced and less expensive to perform. “Wireless access control solutions form part of the mechanical lock that requires very little maintenance and this is also less susceptible to external interferences like lightning, power spikes and surges that piggyback on cabling. Because it is using the mortise lock in the centre of the door, it also offers better security than using magnetic locks residing at the top of the door.”

“On average, installation takes less time because the wireless lock combines everything found around the door, the lock, the card reader, the request to exit, and the door contact into a single point of installation rather than wiring these components separately.”

 

http://www.securitysa.com/7768r

By Andrew Seldon.

 

Why a nanny camera system should be considered!

Contact Us For Your Nanny Camera System!
Parents with a desire to protect their children’s safety may decide to use nanny cameras. Hidden or exposed nanny cams will grant you the ability to capture “disturbing violent activities of a childcare provider” as well as “excellent activities of a childcare provider.”
Current technology allows parents to discreetly install and monitor nanny cams. The ethical or legal issues involved in the nanny cam’s use should be considered.
It is legal for a homeowner to install a hidden camera, as long as the camera isn’t installed in a private space, such as a bathroom or bedroom used by the childcare worker. Court rulings support parents’ rights to film the worker in the child’s bedroom or in common spaces, e.g. the kitchen or living room.
Should parents tell childcare workers about a nanny cam?
A discussion about the presence of a nanny cam can yield benefits to the employer:
  • Before hiring a nanny or childcare worker, parents can explain the decision to use a nanny cam to monitor routine childcare tasks. If a prospective nanny objects or considers the nanny cam an intrusion, parents probably won’t want to hire the individual.
  • A second benefit to the nanny cam discussion is that, if the prospective employee has any tendency to treat a child improperly, knowledge of nanny cam taping can serve as a deterrent.
  • A third benefit supports mutual respect between the childcare worker and employer. A discussion about childcare expectations is essential in any working relationship. The nanny cam’s presence need not cause concern for an ethical, responsible childcare worker.
Although nanny cams can’t possibly ‘catch everything’ occurring between a childcare worker and child, they are useful in establishing a ‘spot check’ monitoring system. It is advised that parents should continue to talk with their children and listen carefully to the child’s feedback about his or her nanny. Heed any concerns about the childcare worker’s behavior with immediate discussion.

 

Access Control

What are the Pros of Access Control Systems?

Accessibility – Access can be controlled using few alternate options, including biometrics (Finger prints), an FID key fob, or swipe key card. Due to this, traditional keys are no longer a necessity. As a result of keeping things better organised, the risk of a security breach is reduced.
Optimal Control – With access control systems, a master system controls doors. This master control monitors access to these doors and modifies it when needed. If someone had access to a certain area of the company but that area is now out of bounds, it would only take a few minutes to modify the individual’s access.
Monitoring – Keeping an eye on who is coming and going from different areas is possible with an access control system. Information as to the time the access card/biometrics was used is also provided. This enhanced security system gives the company more control over the employees whereabouts, especially if they are not authorized to enter certain parts of the business.
Surveillance – In some cases, access control systems are linked with a surveillance system. Not only is an employee’s card registered when entering and exiting of authorized areas, but video captures every occurrence as well. When a breach is suspected, this is beneficial. For instance, if an employee’s card was lost or stolen and then used to enter an authorised area, an official with the company can pull up surveillance and identify who had used the card.
Integration – Access control systems seamlessly integrate with other security products, thereby creating a centralised management solution.
Individuality – Every employee’s access card is customised for each employee’s personal use with an access control system. As a result, restrictions on certain doors can be placed. Building layers of restrictions based on schedules and other factors is also a key feature to benefit this system.
Manageability – Information is stored on a centrally managed database, making access remotely from any computer on the network easy. Only a few select people have this authorisation.
http://www.san-jose-locksmith.us/pros-cons-access-control-systems/

What are the different types of motion sensor beams?

Motion sensors for security.
Active Infrared Sensors
Active sensors depend on transmissions and feedback to pick up changes in the area of coverage. By sending out a constant stream of Infra-red, these sensors then measure and compare changes from previous readings. Due to this perpetual back and forth activity, active sensors consume a larger amount of energy compared to passive alternatives.
Passive Infrared Detectors
An infrared sensor, otherwise known as passive infrared (PIR), is the only option available in this category. These detectors work on a simple premise. Instead of sending out emissions and comparing previous readings, the devices simply wait for a heat signature. The human body, along with most other animals, is a source of heat. As this heat is released from the body, it can be viewed as an infrared light.
https://www.safety.com/blog/benefits-of-motion-sensors-and-detectors/

GSM G-Speak Communicator

Main Features
  • Wireless convenience:
    People like to say ‘less is more!’  When it comes to wiring, less is less: less money, less time and less effort. With the G-SPEAK GSM-based intercom system, your mobile phone acts as the intercom handset so there is no need for expensive cable runs back to the house.
  • Up the security ante:
    With the G-SPEAK system, you can answer your intercom from anywhere in the world with a 2G GSM network, giving the appearance that you are always home. This greatly enhances security and acts as a deterrent to would-be intruders. In addition, only learned-in, authorised phones are able to access the system.
  • Open your gate from anywhere:
    The G-SPEAK Classic offers up to 10 users the ability to open an entrance gate from anywhere in the world via a free ‘Missed call’. You don’t need to compromise the security of your home by giving your garden service or repairmen keys or remotes; you can give them access even if you’re chilling on a beach in the Bahamas! You are firmly at the controls.
  • Your voice will be heard:
    And so will the voices of your visitors! G-SPEAK delivers crystal-clear speech quality thanks to state-of-the-art GSM audio technology.
  • Weatherproof enclosure for greater reliability:
    The G-SPEAK Calling Module boasts an impressive IP55 rating, making it perfect for outdoor use. Mother Nature keeps on knocking but she can’t come in – a tough-as-nails ABS plastic housing makes sure of that.
  • Compact design:
    The combination of your intercom and your gate forms a welcoming committee for visitors, so you want to be sure that it looks good. The G-SPEAK Calling Module has an attractive, compact design making for an aesthetically-pleasing installation. A white LED back light makes for beautiful low-light visibility of the Calling Module.

Paradox Outdoor Security Beams

Paradox Outdoor Security Beams

Available in both wired and wireless version these rugged indoor/outdoor detectors incorporate two passive infrared side-by-side detectors. The specially designed optics is designed for excellent detection and false alarm rejection. Combined with the Paradox Effi+circuit, the NVR780 delivers extended battery life operation.

Business & Nanny Cameras

Protect your Home, business and loved ones with CCTV Cameras in key areas. You can easily access the cameras on your cell phone. CCTV Systems can be used in any home/business application for security and monitoring of children and important areas. CCTV Cameras can be easily accessed remotely at anytime.

 

Access Control Systems

When is it ever a good time to upgrade your access control solution? Many organisations follow the policy of ‘if it isn’t broken, don’t fix it’, but this can be a risky situation in a world where technology and threats are changing so rapidly. The use of older, access control systems exposes an organisation, a building, a server room, a computer to the possibility of unauthorised access and the consequences of this. But why should users upgrade?

Data privacy
One of the biggest drivers for updating access control systems is the need for enhanced levels of data privacy. This could come about through the on-boarding of a client that requires high levels of security, new legislation being brought in for specific industries, or even new building tenants. The driver remains the same: data or the building itself is in some way exposed to or at risk and needs added protection. Yesterday’s technology is no longer sufficient for today’s access control and identity management challenges.
In The Access Control Report 2016: Legacy Infrastructure and Motivations for Upgrading, 44% of respondents stated they were planning on upgrading their access control ­solution. This is a strong indicator that end-users are acknowledging that the risk to organisations is evolving, and the need to protect their physical assets and consequently data assets is important. It would take a security breach that exposed a flaw in the current system for 92% of respondents to consider changing their current access control system, but not beforehand.
On any site at any one time, in addition to regular employees, there are also individuals and groups that have access to various parts of a site for short periods of time. These could be visitors, maintenance teams or contractors. In the report, 75% of respondents have third-party members on site on a regular basis. Integrated visitor management solutions in modern access control systems significantly improve the distribution and use of temporary credentials but also safeguard various parts of the site to unwarranted access. Access control solutions, such as mobile access, make it easier for facilities and securities managers to track who is accessing what parts of the site to ensure nobody is in an area they shouldn’t be.
User convenience
The continual development in consumer technology has spilled over into the business world with devices now being used for work and in our personal lives. Bring Your Own Device, mobiles and wearables are all common features of today’s office environment. Organisations can utilise this growing level of secure technologies that employees are carrying around with them on a daily basis. Instead of having several key cards or fobs that have a high chance of being left behind, users can now utilise smartphones or smart devices, their closest pieces of technology for secure access control as well. Mobile access control is increasingly coming into the market and the benefits this brings are numerous.
Having mobile credentials that allows for multiple access levels, for instance, saves the users from having multiple access control devices that could lead to confusion or ­possibly misplacement. The survey also noted that 29% of respondents would like future-proof technology. This can easily be provided through mobile access solutions which grant users modern techniques for access control, but also a single credential for multiple access devices. Utilising smartphones are a very straightforward solution that solves three of the top concerns of employees looking for updated access control.
Flexibility
A new access control solution must be flexible so users don’t just see it as an ‘expensive way of opening doors’. Open Supervised Device Protocol (OSDP) for secure communication between field devices in a physical access control system, has gained increased importance allowing for standardisation, more flexibility and freedom of choice for security managers.
Flexibility also supports multiple applications for managing not only physical access but also logical access applications, like computers and software logins. Additional access control systems, such as secure print management, require an associated card issued to users. This represents a prime opportunity for organisations to consolidate to a single access control device, such as a contactless wearable or smartphone that combines access control with other functions.
By exploiting modern technology, such as mobile devices and wearables, users are afforded the opportunity to simplify their access control devices: one device, with one credential providing access to multiple areas and requirements. It was found that nearly a quarter of respondents wanted to manage multiple credentials across a single device. With mobile access solutions, multiple credentials are rolled into one and stored on one device. The facilities or security manager is capable of controlling access and distributing credentials to those with the right security clearance. Technology such as the latest high frequency access control systems ensure security is independent of hardware and media. This makes it easier for an organisation to support functionality and higher levels of data privacy.
Conclusion
Although, there are clearly several barriers to the adoption of more sophisticated access control systems, organisations are placing increasing importance to safeguard their physical assets as it supports in providing protection to their IT infrastructure as well. This is mainly due to the belief that current systems in place are adequate enough until they are proven to have failed and the fact that a replacement system is perceived to be an unnecessary expense.
Despite the technological advancements, users are still content with cards and fobs, regardless of the lack of sophisticated security and encryption contained in these when compared with mobile access control solutions. The change to a more sophisticated system is likely to come from employees themselves, rather than decision makers.
Existing access control solutions are also easy to upgrade which provide minimal disruption and cost-efficient site retrofits. Facilities and security managers need to question whether it is more expensive to replace an outdated system, or recover from a site or data breach.
By Jaroslav Barton, product marketing director, physical access control, EMEA, HID Global.
http://www.securitysa.com/8866a

Benefits of CCTV Cameras

 

Home CCTV Systems

Protect your Home and loved ones with CCTV Cameras in key areas. You can easily access the cameras on your cell phone. CCTV Systems can be used in any home application for security and monitoring of children. CCTV Cameras can be easily accessed remotely at anytime.

Perimeter CCTV Systems

View your perimeter CCTV Cameras getting full coverage of your homes perimeter. This is a good way to deter criminals and add additional protection with a full CCTV System to complement your security as a whole.

Entrance CCTV

Control who enters your home with a entry CCTV System. With CCTV Cameras at the entrance. Visually confirm who is there and control access. Entry CCTV Systems are a good addition to security and the CCTV Camera will aid in deterring criminals.

Access Control Tutorial

Access Control

Access Control is the control of who and how you allow someone to enter your premisis. Access control includes: Booms gate systems, gate motor automation systems, Biometric fingerprint readers, RFID card readers, Intercom systems etc.

Biometric Readers

Biometrics as a term is associated with the reading and use of unique physiological characteristics to identify an individual such as fingerprints. This technology is mostly used with security because biometric traits can be used for authentication, where a special characteristic of an individual is used to identify them. From the identifacation, peramiters will trigger events on what the person has been allowed to access.

Gate Automation

Gate automation comes in many forms. There is many forms of gate automations for sliding gates, swing gates, garage doors. Advanced Security uses a product “Centurion” which has become the market leader in the industry, they provide competitive pricing and well designed and reliable products. Garage door automation will use “Centurion Xtrac”. Sliding Gates “Centurion D or A Series. And for swing gates the “Centurion Vector series”.

Intercom Systems

Intercom systems are a vital feature of controling access. Intercom systems can be used to verbaly and visually communicate with someone and with allow or deny access. Intercom systems can also be used to intercommunicate between: Offices,Rooms and buildings. Imtercom systems can now be intergrated with a GSM Intercom which communicates to cellular devices and communication and access can be granted offsite.

Boom Gates

Boom Gate Systems are used to allow the flow and access of vehicles in and out of premisis. This is a good solution to control speeed to allow capturing of details such as number plates, driver details. Booms can be manual or automated and even have tire spikes if required. Centurion systems also offer boom gate automation and are the prefered brand of Advanced Security.

 

Paradox IP150 and the Insight Gold App

Paradox IP150 and the insight gold app
Paradox IP150
Description
The IP150 Internet Module is a HTTPs-supported IP communication device that enables you to control and monitor your security system through any web browser (e.g. Google Chrome). The IP150 provides freedom to access your system and receive instant, SSL encrypted email notifications anywhere in the world when your system detects activity. So no matter where you are, you will have access to arm, disarm, and more.
Before You Begin
Before you begin, make sure that you have web-enabled computer. You will also require the following system requirements in order to configure to your IP150 Internet Module. System requirements include:
• Ethernet-compatible computer with internet access (required for remote access)
• Router
 • 4-pin serial cable (included)
• CAT-5 Ethernet cable (maximum 90m (295 ft.), not included)
• Paradox IP Exploring Tools Software (required for remote access).
Software can be downloaded from our website (www.paradox.com/GSM/IP/Voice/IP).
Insight Gold App
Introduction
PMH (Paradox My Home) is a server created to be a bridge between Paradox systems IP devices, IP cameras and mobile devices using the Insight GOLD application. Using the PMH server allows connection to all without any local IP programming or programing of Paradox devices. Enrolling an account and creating a site is very easy and takes a few minutes. PMH also provides reliable system push notifications, as well as supervision lost notification.
Creating a Site and Service Options
Each Paradox system (SITE) is identified with a PMH account by the serial number of the Paradox control panel. Each site has also a site ID. Optional site name can be added in the phone application. PMH sites can be connected to PMH via Paradox IP cameras, PCS modules, and IP150. Once the Panel and the above devices are powered up and connected to the internet or the cellular network, they will auto – connect to PMH and indicate that they are live. From the Insight GOLD main menu, select Menu > Create new site. After selecting the site type and entering the panel serial number and installation information, a payment screen will appear with service options including a one month free trial. A free month will be added for any paid service as well. The free month will start at the first of the month after the registration date.

How to setup Hikvision online viewing on a mobile phone

CCTV Remote view
Hikvision provides DDNS service for its products (e.g. DVRs), allowing customers to use their equipment anywhere in the world, even if they do not have a static external IP address.
Preconditions that are required to use the service:
  • a Hikvision device,
  • public, external IP address,
  • proper configuration of router or other network node: port forwarding.
Information on the features of the Internet connection you can obtain from your ISP .
Port forwarding allows a specific computer or service within a private local-area network (LAN) to connect with remote computers on the Internet. It is quite easy operation, usually performed in the router, which is typically both the network node and default gateway.

The Importance of CCTV Remote view

Every business/home owner strives to keep their employees, assets, office space and families as safe as possible. There are several ways to help increase the security at your business/home; one of the most effective is to install a monitored security system.
Door and Window Contacts
Security Contacts are a simple, reliable form of security that can be installed quickly and easily. Security Contacts will sound an alarm when someone has opened any windows or doors while the system is activated. These contacts are installed on the connecting points of windows and doors – when they are touching, the alarm won’t go off, but when they are unexpectedly removed from each other, the alarm goes off.
Motion Sensors
Motion Sensors can be used to detect intruders, inside and out. You can connect them to lights on the outside of your building or to an alarm system so it will warn you when someone is lurking within the building. Special types of motion detectors are available for facilities with pets. Best of all, most of these motion sensors can be activated or deactivated at will – this means you can turn them off during the day, and arm them at night time before heading home.
Control Panels
Having access to your system from anywhere in the building is very important, and installing control panels throughout the site will allow you to access the system in multiple areas. Having the master panel in a place that is hard to reach for any intruder is important.
Most panels are installed with a two-way intercom that allows communication with the security company’s monitoring center – this means that if your security measures activate, you can talk with a security specialist to explain the situation to them. This open communication provides you with the ability to get help fast, or explain to the security officer if the security system is engaged accidentally.
Surveillance Cameras
Most buildings have several areas on the outside and inside that are great hiding places for intruders. Installing cameras inside can lower the amount of hiding places an intruder will have to hide in, as well as deter customers and/or employees from theft or other inappropriate work behavior. This is the ultimate form of security, and with integrated alarm and camera system monitoring services, you can rest assured that any suspicious activities or alarm signals are reported and dealt with quickly.
It is important to speak with a specialist when making any final decision for what type of security works best for your business.
http://innovativesecurity.com/the-importance-of-security-systems/

Security Cameras, Security Systems, Security Camera System, Security Alarm, Security Camera System

Integrating Access

Integrating Access Control 

As end-users demand easier to use products that are more secure, more companies are collaborating to release solutions that are tightly integrated with each other. Suprema, distributed in South Africa, recently announced a number of integrations linking its access solutions to different vendors’ flagship products.

NX-Witness Hive VMS is developed by NetworkOptix, one of the top 10 fastest growing software companies in the US by Inc.5000. Offering powerful VMS features and resilience in fail over, it is considered one of the most advanced, rapid search and user-friendly video management platforms.

Suprema now integrates NX-Witness Hive VMS. The API integration between Suprema’s BioStar 1 & 2 and NX-Witness adds real-time access control events into NX-Witness, offering easy management and adding more value for both access control and video.

Any event within BioStar can trigger programmable events within NX-Witness. Selectable alarms can trigger bookmarks, PTZ events, video wall live displays, e-mails and more customisable features within the NX Witness platform. Now searching video and finding incidents related to access control, directly from the NX-Witness VMS system, is easy. It allows programming of almost any live events and finding of historic events, related to users and alarms, within seconds.

Suprema also recently improved its integration with Avigilon’s ACM. This integration has now advanced to integrate Suprema’s new generation devices. This brings to the table 1:100 000 (<1s) matching, up to 500 000 users, advanced optical sensors and live finger detection.

Supreme ProSync detects and synchronises Avigilon users when a new user is added within Avigilon, activating Suprema enrolment within the Avigilon ACC web interface, allowing for user biometric enrolment which is seamlessly synchronised to the Suprema devices. Communication between the Suprema reader and Avigilon ACU controller ensures Avigilon ACM remains 100% in control.

It features easy deployment, seamlessly adding Suprema’s biometrics to Avigilon. An easy to use interface that requires little additional training and there is no need to leave the Avigilon platform.

In addition, also on the video management front, Suprema now also integrates with Arteco. From video security, access control, intrusion and fire detection to building automation, traffic control, parking management and beyond, this integration has opened up new and interesting opportunities in logistics, healthcare, critical infrastructure, transportation and large retail environments. Each of these operations may care about different information, but in the end, they are all focused on what is important to their environment: the event.

The API integration between Suprema’s BioStar 1 & 2 and Arteco adds real-time access control events into Arteco. These events are searchable, provide video wall displays including access control user badge image overlay, dynamically configurable video triggers allowing bookmarking of video data, text overlay and PTZ action.

Taking it a step further, Arteco allows for incorporating the BioStar 2 web interface to be managed from within Arteco with no need to leave the Arteco platform.

Wired VS Wireless Alarm Systems

Alarm system basics:

A typical alarm system consists of sensors, a control panel, a power supply and battery backup, a panic button, motion detectors and cameras. You customise the layout of your alarm by dividing your home into ‘zones’. Typical homes range from 8 to 16 zones, even more with larger houses. There are endless bells and whistles that can be added to a home alarm system. Aside from the cost of the equipment and installation, you will need to pay a monthly fee in order to get emergency response, patrols and other security services. The cost of this varies significantly; by area, size of house, extent of services and whether you’ve gone wireless or hard wired.

Wired alarm systems:

Known as hard wired systems, these are alarm systems that are connected with wires. Most alarm companies offer wired alarm systems, along with professional installation. Some of the larger companies throw a free installation in too. You can also buy the components separately and pay for installation or do it yourself. A typical 8 zone alarm system can be purchased for a few hundred Rands. ADT and some other security companies offer a rental option where you pay a monthly fee to rent the equipment. You’ll be locked into a lengthy contract and there are no guarantees that the folks who collect the rented equipment won’t leave unsightly holes and damage.

The advantages of wired alarm systems are compelling. Wired alarm systems are cheaper than wireless, maintenance free and super reliable. There’s no danger of a battery running out, so your siren can go for a long period of time. Wired alarm systems also add to your homes resale value.

There are however, some significant downsides to wired alarm systems. Wired alarm systems are a pain to install. Usually you’ll need a professional to run all the wires in the right places. And despite the neatest alarm installations, those wires will look unsightly in places. Also, wired can be tampered with and leave you very vulnerable without even knowing it.

Wireless alarm systems:

Is everything better wireless? Some alarm companies would like us to believe so. You will still need the same basic components as with hard wired alarms. The big difference is that there won’t be any pesky wires needed. Wireless alarm systems transmit information via radio frequencies instead of through wires. You can buy the components yourself and installation couldn’t be easier. You can even buy the components pre-programmed.

Wireless alarm systems have some convincing advantages. Wireless alarm systems are super easy to install, no professionals needed. You have total flexibility to move sensors and cameras wherever they will be most effective. Because there are no wires, it all looks neater. There’s no risk of a thief cutting your wires and therefore your connection either. If you move, you can take your wireless alarm system with you, so once you’ve forked out you have your home security sorted, forever.

But, wireless is expensive. For a basic 8 zone system with wireless components you can expect to part with R10000 and more. And all the parts need constant maintenance, batteries need checking and replacing regularly. Failure to do so means the risk of an alarm system failing at a critical point. If your alarm system consists of 100 parts, that is 100 batteries to check and change. It’s a noteworthy disadvantage!

So, how do you choose?

The size of your property and the extent of your budget will probably be the largest determining factors. It’s not uncommon to use a combination of a wired alarm system with a few wireless components thrown in.

One day, wireless technology will be cheaper and more reliable. Until then, a wired alarm system seems to be the most budget friendly, reliable choice to be sure that your family doesn’t become another statistic.

How does Access Control work?

An access control system is a process put in place by our company (Advanced Security)  to support your security by allowing and/or denying individuals access to certain areas, whether they physical (such as doors) or digital such as certain computer files.A professional access control system keeps

A professional access control system keeps record of who accessed certain files or areas and the time of the attendence. Door access control systems will allow you to control who is coming in and out and allow certain access.

For a system such as this to operate at full potential, great care must be taken to ensure that it works with all of the other security measures already in place such as having a system that is fully functional with timecards, ID cards, and badges, if that is what is used. When all the components work together systematically, a true system is impossible to beat. Access Control allows for a full sense of security.

High Performance Security Cameras

FLIR announced 4 new security products recently. These new products include the FLIR United VMS 8.0, the latest version of the company’s flagship video management solution (VMS), and three high-performance security cameras, including the FLIR PT-Series HD (High-Definition) thermal and visible camera system, the FLIR Quasar 4K fixed box camera, and the FLIR Ariel 3MP (3-megapixel) corner camera. All three cameras integrate with FLIR United VMS 8.0 and expand the company’s end-to-end line of security solutions.

The FLIR PT-Series HD is a dual-sensor camera system that provides superior, long-range perimeter intrusion detection regardless of lighting and environmental conditions. The high-speed, pan-tilt camera provides quick and accurate threat verification. The offers either a cooled or uncooled 640×480 resolution thermal camera with a 1080p HD visible camera. Multiple high-performance thermal lenses are available, including optical zoom lenses up to 14X. The HD visible camera also features a 30X optical zoom lens with autofocus and low light capabilities. The FLIR PT-Series HD integrates with FLIR United VMS 8.0 and other major VMS software providers.”

http://www.securitysa.com/57241n

Centurion G-Speak

Main Features

Wireless convenience:

People like to say ‘less is more!’ When it comes to wiring, less is less: less money, less time and less effort. With the G-SPEAK, your mobile phone acts as the intercom handset so there is no need for expensive cable runs back to the house.

Up the security:

With the G-SPEAK system, you can answer your intercom from anywhere in the world with a 2G GSM network, giving the appearance that you are always home. This greatly enhances security and acts as a deterrent. In addition, only authorised phones are able to access the system.

Open your gate from anywhere:

The G-SPEAK offers up to 10 users the ability to open an entrance gate from anywhere in the world via a free ‘Missed call’. You don’t need to compromise the security of your home by giving your garden service or repairmen keys or remotes; you can give them access from anywhere in the world.

Your voice will be heard:

And so will the voices of your visitors! G-SPEAK delivers crystal-clear speech quality thanks to state-of-the-art GSM audio technology.

Weatherproof enclosure for greater reliability:

The G-SPEAK Calling Module boasts an IP55 rating, making it perfect for outdoor use. Mother Nature keeps on knocking but she can’t come in – a tough-as-nails ABS plastic housing makes sure of that.

Compact design:

The combination of your intercom and your gate forms a welcoming committee for visitors, so you want to be sure that it looks good. The G-SPEAK Calling Module has an attractive, compact design making for an aesthetically-pleasing installation. A white LED back light makes for beautiful low-light visibility of the Calling Module.