Driving reliable wireless security

Issue 6 2022 Perimeter Security, Alarms & Intruder Detection, Industrial (Industry), Products & Solutions

The expansive site at a large vehicle manufacturing plant in the Eastern Cape was not conducive to the laying of cables for an alarm system to protect the premises. The manufacturer requested local security system integration company, Atlas Security, to find a wireless system that would provide uncompromising perimeter intruder detection.

After consultation with Ajax distributor, Elvey, the decision was made to deploy several Ajax wireless products that were able to seamlessly integrate with existing third-party point-to-point beams. The PoC and inception took place in the fourth quarter of 2021.

The scope of work called for the supply and installation of an Ajax MultiTransmitter, the Hub2 Plus, several Motion Protect PIRs, Door Protect units, ReX range extenders and StreetSirens. The Hub2 Plus provides a communications platform between the third-party beams and the Ajax products.

“The Ajax MultiTransmitter has allowed Atlas to bring in the third-party wired outdoor beams, thereby keeping costs low and retaining the legacy equipment for the client. This is particularly advantageous to clients who wish to retain their current investment by adding third-party elements and synergistic Ajax products to the entire Ajax ecosystem,” says Ingo Mutinelli, head of sales in southern Africa for Ajax Systems.

Mutinelli explains that the Ajax wireless technology route was the perfect solution for this site and is characterised by its superior communications range using ReX range extenders, Hub2 Plus and several MotionProtect PIRs, DoorProtect opening detectors and StreetSirens, at various points on the site. “The client was so pleased with the performance of the technology that they are planning for future expansion of the system on a further four sites, with work having already started on the second site.”

Wireless security technology with extended range

The MultiTransmitter communicates with a hub via an encrypted Jeweller radio protocol. This is a TDMA technology developed by Ajax Systems for uninterrupted communication with devices. Jeweller detects jamming attempts, switches to the backup frequency in case of interference, and allows Ajax wireless devices to run on battery power for years. “Jeweller basically regulates the amount of power that the device needs to transmit to the hub effectively, and in so doing saves on power usage when closer to the hub,” says Mutinelli.

ReX is the radio signal range extender that boosts the range of all Ajax security system devices and manages their communication with the Hub2 Plus. The intelligent radio signal range extender enables users to place Ajax devices at a considerable distance from the hub for protecting multi-storey offices, detached buildings and even production plants. Connecting five ReXs to the security system extends its coverage to up to 35 km².

“ReX integrates the devices into an autonomous group within the system. The extender takes full control of the situation if the connection with the hub is interrupted for some reason. If one of its detectors sends an alarm signal, ReX may activate the siren to attract attention to the incident and scare off the burglar,” says Mutinelli.

Whenever MotionProtect Outdoor detects motion, LISA monitoring software analyses and compares signal forms from two sensors in real time. If the signal forms are similar, the alarm is raised.

The DoorProtect wireless opening detector notifies of first signs of room intrusion by means of a broken door or window. It can be mounted on all types of doors, including those with a metal base.

StreetSiren responds to alarms and tampering by activating the buzzer and LED frame in less than a second. The tamper button triggers when the enclosure is opened or broken, and the accelerometer triggers when somebody’s attempting to move or dismantle the siren. StreetSiren has a built-in LED to indicate when it is armed or disarmed, and it illuminates when the system goes into an alarm condition.

“The Ajax wireless range of products is ideal from a budgetary perspective for sites like this one, where range is critical and where existing hardwired products can be used,” says Mutinelli.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.