classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Integration and communication
November 2017, Integrated Solutions

Integration and communication are two essential features when considering security systems and access control in a residential environment for both security and convenience of the residents. There are a few questions which need to be answered when investigating this field.

• What access control measures are in place and how integrated are they with CCTV and the intercom facilities?

• What features are available to allow the resident to monitor the situation from a remote location using modern devices like laptops, tablets or smartphones?

• And if they are available, how complicated are they to implement and to maintain?

The answer to these and many other security-related questions is in the technology that allows complete control and communication of different devices and systems from a web application, because today the Internet is available on the majority of the mobile devices. Connection is the key word and the Came Group have developed a technology which enables these features, called Came Connect.

In essence, it brings altogether, a wide range of systems that are connected to a cloud platform that enables remote control of all installed operators, from anywhere in the world. It can operate via GSM and Ethernet, and is compatible with all Came and BPT systems. There are also solutions available to allow systems from other manufacturers to be connected via the Came Connect platform.

All of these disciplines are brought together, allowing simple control for the end user and easier support for the installer. Here are some examples of what is possible.

For the end-user:

• Status of the installations.

• Full control over an automation motor.

• Setting of timers.

• Creating of schedules and scenarios.

• Location on map of devices.

• Error notifications send via email to user and/or installer.

• A support request can be sent to the installer automatically when the end user allows it.

• Schedules may be created to run certain scenarios at given days/times. This may be a hold open device or to activate another device by means of the input/output module. They may be altered online at anytime from anywhere.

For the installer:

• A dedicated installer interface to see all their installations.

• Location on map of installations.

• After support request from end-user the installer will be able to access the end-user interface with all the same functionalities.

• Remote assistance.

• Schedule of maintenance activities.

Think about all the systems in a residential environment: gate automation, barriers, audio and video intercoms, access control, turnstiles, home automation, CCTV, automatic doors and even carpark systems. Now they can all be connected, controlled and monitored from anywhere in the world.


Credit(s)
Supplied By: CAME BPT South Africa
Tel: +27 11 616 3222
Fax: +27 11 622 1384
Email: info@camebpt.co.za
www: www.camebpt.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.
  • Automated facial recognition
    November 2017, Access Control & Identity Management, Integrated Solutions
    NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.
  • Using biometrics to prevent financial crime
    November 2017, Access Control & Identity Management, Integrated Solutions
    Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.
  • Ding dong, it’s IP
    November 2017, Elvey, TOA Electronics, Zhejiang Dahua Technology, CAME BPT South Africa, This Week's Editor's Pick, Access Control & Identity Management
    IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.
  • Accommodating a multi-purpose solution
    November 2017, CAME BPT South Africa, Access Control & Identity Management
    Farm obtains an integrated intercom and CCTV solution for surveillance, access and internal communications.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.