Control console from Mimic

April 2018 Security Services & Risk Management, Products

Every security camera needs a surveillance checkpoint. A designated controlled area or control room is where surveillance and monitoring of security-cameras takes place. This requires custom consoles for housing monitoring screens, servers and the like, for data storage and retrieval.

Mimic manufactures control consoles and desks for security control rooms. “Control consoles provide a surveillance checkpoint for operators to work from, be it one desk for one operator or a row of console desks for many operators,” says Edwin Wakefield, MD of Mimic Components. “There is no point to installing a security camera which is left unmonitored. Control consoles are fundamental to any security environment, be it a residential security room to larger commercial control rooms from which real-time surveillance and access to data should be available.”

ALUTECH is an aluminium extrusion system designed for a wide range of products. The range includes consoles, desks, wall-mount enclosures, floor-standing enclosures, cabinets, and is 19-inch rack compatible. A feature of ALUTECH is the modular application, allowing for assembly and dis-assembly, making future extensions or take-offs possible. This practical feature is conducive for deliveries, shipping and business relocations.

With ALUTECH’s robust aluminium frames designed to withstand 24/7 use and round the clock monitoring, leaves little impact on console wear and tear making ALUTECH a viable long-term investment.

For more information contact Edwin Wakefield, Mimic Components, +27 (0)11 689 5700, www.mimic.co.za/product/mimic-control-desks



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Meeting compliance obligations
Issue 7 2020 , Security Services & Risk Management
Helping businesses in SA understand and meet their compliance obligations to local regulations.

Read more...
Industrialisation or imperialism?
Issue 7 2020 , Security Services & Risk Management
4IR has to be a matter of national agenda; national economic and political sovereignty and national security - necessitating commensurate prioritisation.

Read more...
Password vulnerabilities in South Africa
Issue 7 2020, Kaspersky , Security Services & Risk Management
Research from Kaspersky has shown that people are putting their online safety at risk by making bad password decisions and simple password mistakes that may have far-reaching consequences.

Read more...
The greatest crime-fighting weapon is predictably
Issue 7 2020 , Security Services & Risk Management
Predictability fuelled by artificial intelligence (AI) and big data has the ability to reduce violent crimes by 25% by 2023 according to Aura.

Read more...
PCI DSS can be your PoPIA security blueprint
Issue 6 2020, Galix Group , Security Services & Risk Management
Some of the requirements of PCI DSS can also be used to comply with PoPIA, South Africa’s data privacy law.

Read more...
Monopoly: AI edition
Issue 6 2020 , Security Services & Risk Management
Due to the inherent nature of artificial intelligence (AI), AI-powered industries naturally tend towards monopolisation.

Read more...
eVisa solutions for Botswana
Issue 6 2020 , Security Services & Risk Management
Travelers to Botswana will soon be able to complete visa applications online and ease their entry into the country.

Read more...
Three steps to kick-start POPIA compliance
Issue 6 2020 , Security Services & Risk Management
Complying with data privacy, security laws and regulations can be a daunting task for any organisation.

Read more...
Digital evidence handling in the cloud
Issue 5 2020 , Security Services & Risk Management
Investigate Xpress is a free, cloud-based digital evidence management solution designed to make police forces more efficient and productive.

Read more...
The evolution of security in residential estates
Residential Estate Security Handbook 2020 , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Two large estates discuss their security processes and the ever-expanding scope of responsibilities they need to fulfil.

Read more...