Integrated solutions for home security

June 2019 Home Security, Access Control & Identity Management

From the neo-classical to the ultra-modern, our homes are like architectural tattoos, representing our individual tastes and personalities. There’s poetry in every passage and a dream in every doorway.

Indeed, we are no longer creating mere homes; we are creating worlds, veritable microcosms replete with functionality and convenience; monuments to humankind’s inborn desire to be the master of our surroundings. Much like an artist poring with furrowed brow over a blank canvas, we tackle each new project with a view to creating something that is beautiful as well as functional, applying brushstrokes of technology in order to paint the complete picture of security, convenience and aesthetics.

In the 1960, anthropologist Victor Turner popularised the concept of ‘liminality’ – a term that was coined by folklorist and ethnographer Arnold van Gennep and is derived from the Latin word limen, meaning ‘threshold’ – to describe the ‘middle stage’ of rites of passage amongst certain tribes. In the liminal phase, the initiates (or neophytes, as Turner often referred to them) were ‘betwixt and between’, existing in a state of disorientation and ambiguity and having been stripped of their pre-ritual status but not yet possessing the qualities and attributes that will be bestowed upon them once the rite is complete. They become, in essence, tabula rasa: a blank slate.

In a much more literal and tangible sense, our entrance gates are the thresholds between the outside world and us, the barrier between order and potential chaos, between the Apollonian and the Dionysian. As our first line of defence against criminal intrusion, this threshold must be protected at all costs.

The rising popularity of gate motors in domestic settings has led to massive innovation in this field, with local manufacturer Centurion Systems leading the charge. Jam-packed with high-security features – including beam automatic closing and integral intruder-detection alarms – and setting the standard in terms of reliability, functionality and performance, Centurion’s gate motors have become a staple of home security.

However, according to Centurion’s communications coordinator, Charl Mijnhardt, the operators’ true potential is unleashed by integrating and expanding the system with the company’s range of ancillary solutions, which includes the G-ULTRA GSM solution.

“The G-ULTRA is the ‘ultimate GSM solution’”, says Mijnhardt. “Combining wireless technology with an intuitive user interface, this device enables homeowners to remotely monitor and control a wide variety of appliances including automated gates, electric fences, alarms, sprinkler systems and even pool pumps – all using their smartphones”.

One possible, and popular, application is to use the device to remotely monitor and control a garage door. The homeowner would simply have the module installed at her garage door, and then use the G-REMOTE mobile app to open and close the door from virtually anywhere, as well as receiving notifications on her phone of the door’s status for added peace of mind. Harnessing the expandability of the G-ULTRA, the user can even create wireless connections to a pedestrian gate with Centurion’s WiZo-Link wireless input-output modules. This is ideal for allowing entry to armed response companies. To summarise, it is now easier than ever before to create a complete wireless solution for superior home security.

From an installer perspective, the solution can be easily set up onsite using the G-WEB ULTRA mobile application.

For more information contact Centurion Systems, +27 11 699 2400, charl.mijnhardt@centurionsystems.co.za, www.centsys.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Child fingerprint identification solution
July 2019 , News, Access Control & Identity Management
Gavi, NEC, and Simprints to deploy world’s first scalable child fingerprint identification solution to boost immunisation in developing countries.

Read more...
Versatile electronic lock cylinders
July 2019, Salto Systems Africa , Products, Access Control & Identity Management
Fully integrated with the SALTO System’s Space and SALTO KS platforms, the new Geo range of electronic cylinders are compact in size, making them a suitable solution for almost any type of door.

Read more...
SIA talks open APIs at ID4Africa
July 2019 , Editor's Choice, Access Control & Identity Management, Integrated Solutions
Pioneering industry-first open standards initiative from the Secure Identity Alliance assures interoperability for sovereign ID programmes and promises to eliminate vendor lock-in.

Read more...
Small business solutions with ­Access in a Box
July 2019, Impro Technologies , Editor's Choice, Access Control & Identity Management, Products, Commercial (Industry)
Access in a Box is specifically designed for small businesses, or businesses with only a few entry points such as gyms, medical practices or retail stores.

Read more...
IDM in a factory environment
July 2019, ZKTeco , Industrial (Industry), Access Control & Identity Management
There are many variables that need to be considered when an industrial company needs identity security but workers are hard to identify.

Read more...
National Home Security Month awards
July 2019, Yale Security (SA) , Home Security, CCTV, Surveillance & Remote Monitoring
National Home Security Month (NHSM) aims to create awareness around the importance of good home security, and how we can ensure our homes and families remain safe.

Read more...
Top ten tips to stay safe
July 2019, Yale Security (SA) , Home Security, Security Services & Risk Management
Yale Security offers Hi-Tech Home Security reader a few tips to help ensure your home remains a safe haven.

Read more...
Critical vulnerabilities in smart home controller
July 2019, Kaspersky Lab , Home Security, Cyber Security
Kaspersky researchers investigating the control device for an active smart home ecosystem have identified several critical vulnerabilities.

Read more...
Managing visitors effectively and responsibly
June 2019, Powell Tronics, IDEMIA , Vox Telecom, Technews Publishing , Access Control & Identity Management
Managing access for visitors has always been something of a balancing act between keeping unwanted people out, and letting authorised people in. Particularly in a business environment, it is also crucial to make guests feel welcome and safe.

Read more...
Foresight means secure offices
June 2019, Bosch Building Technologies , Commercial (Industry), CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property.

Read more...