Johnson Controls releases Metasys 8.0
April 2017, Integrated Solutions, Security Services & Risk Management
Johnson Controls has released the latest version of Metasys, its building management/automation system. Neil Cameron, Johnson Controls area general manager, building efficiency – Africa, says Metasys 8.0 builds on the previous version of the product, released in December 2014 and offers a range of new functionality that puts it ahead of the BMS pack.
Cameron explains that version 8 allows for more effective control of multiple buildings from a single control centre in real-time. Johnson Controls has improved the alarm recognition and management capabilities in this version, which is able to handle a large number of alarms and automatically prioritises them according to the urgency of each one. Operators are presented with the highest priority alarms first and assisted in resolving the issues through the platform. Should an alarm not be acknowledged, if can be escalated via email or SMS until it is dealt with.
The platform is also able to intuitively handle multiple alarms. Cameron explains that often one alarm condition will cause other alarms, which would simply clutter the operators’ dashboard. Version 8 will link related alarms, allowing operators to handle these alerts in groups instead of one at a time.
Metasys 8.0 has also been written as an encrypted Java web app, doing away with proprietary software. This also means that there are no limits on what hardware or software customers can use to run the system. This also applies to the mobile app, allowing users to view a similar interface whether they are using a PC, tablet or smartphone to access the system. The application automatically configures its interface depending on what device you use to log in.
The graphics are also embedded in the site so that nothing is brought in from an external source. This allows for faster mapping and visual representation of sites and alarm conditions. Metasys supports BACnet Protocol Revision 12 to enhance its openness and ease of integration.
The system has also seen security improvements in the protocols it supports, and between sensors and platforms. This was done to adhere to US government requirements that prevent hacking via edge devices or sensors. Cameron says that even when running the system on a corporate network, the network must meet certain standards to ensure that the organisation can’t be hacked via the platform. Additional changes have been implemented to further enhance the system’s security overall.
Customers using a previous version of Metasys will have an upgrade path to version 8, but they will benefit from not being required to upgrade their hardware since the new system does not have set hardware standards. The system supports onsite and cloud solutions, depending on the client’s preference, although Cameron says locally, customers tend to prefer having their data onsite. Johnson Controls will continue enhancing the system with one major and one minor release per year going forward.
For more information contact Johnson Controls, +27 (0)11 921 7141, firstname.lastname@example.org, www.johnsoncontrols.com
- Securing your security
April 2017, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.
- Empowering the CCTV installer
April 2017, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Installers can differentiate themselves by offering remote monitoring as a service for a monthly fee.
- Management platforms in view
April 2017, Tyco Security Products, Visec International, Genetec, NUUO Inc., CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Security Services & Risk Management, Products
It goes without saying that the VMS is critical to surveillance installations. However, which VMS to choose is always an issue. Some are saying that the days of the smaller VMS solutions are over because ...
- Crisis management with a wall
April 2017, Vantage MDT, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What happens when a security crisis hits an organisation? Effective crisis management depends on making the right information available to the right people at the right time.
- Power management for surveillance
April 2017, Clearline Protection Systems, BT-SA, Eurobyte Technology, IT infrastructure, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Having a safe, reliable source of power is crucial for the continuous operation of any electrically powered piece of security equipment, and for the integrity of the overall installation.
- 360-degree perimeter protection
April 2017, Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Spotter allows for complete 360-degree situational awareness, providing peace-of-mind and allowing critical management decisions to be effected.
- Body-worn cameras to surge?
April 2017, Betatrac Telematic Solutions, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Body-worn cameras have become popular around the world, but South Africa is lagging international adoption trends.
- The future is software (and IoT)
April 2017, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
The Internet of Things will have a significant impact on the surveillance industry, and security as a whole. The MEA IoT market alone will be worth over $7 billion in 2017.
- Do you have a plan for data storage?
April 2017, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
One of the most important (and often overlooked) aspects of any successful surveillance system is choosing the most appropriate type of storage.
- Be prepared for these three cyber threats
April 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
A person or organisation with malicious intent can harm or sabotage a VMS system in several ways. This means that people or assets could be at risk.
- Ringmaster Security
April 2017, Ringmaster Security, Integrated Solutions, CCTV, Surveillance & Remote Monitoring
Established in 2010 by Vince Botha (MD), his sons Jason and Dale, and Robert Kgatle, Ringmaster Security provides integrated electronic, risk, safety and security solutions to medium and large enterprises. ...
- The ROI and TCO of surveillance
April 2017, Johnson Controls, CCTV, Surveillance & Remote Monitoring, Asset Management, EAS, RFID, Security Services & Risk Management
Managing surveillance costs over the life of an installation is possible with the correct planning and partners.