classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Integration and communication
November 2017, Integrated Solutions

Integration and communication are two essential features when considering security systems and access control in a residential environment for both security and convenience of the residents. There are a few questions which need to be answered when investigating this field.

• What access control measures are in place and how integrated are they with CCTV and the intercom facilities?

• What features are available to allow the resident to monitor the situation from a remote location using modern devices like laptops, tablets or smartphones?

• And if they are available, how complicated are they to implement and to maintain?

The answer to these and many other security-related questions is in the technology that allows complete control and communication of different devices and systems from a web application, because today the Internet is available on the majority of the mobile devices. Connection is the key word and the Came Group have developed a technology which enables these features, called Came Connect.

In essence, it brings altogether, a wide range of systems that are connected to a cloud platform that enables remote control of all installed operators, from anywhere in the world. It can operate via GSM and Ethernet, and is compatible with all Came and BPT systems. There are also solutions available to allow systems from other manufacturers to be connected via the Came Connect platform.

All of these disciplines are brought together, allowing simple control for the end user and easier support for the installer. Here are some examples of what is possible.

For the end-user:

• Status of the installations.

• Full control over an automation motor.

• Setting of timers.

• Creating of schedules and scenarios.

• Location on map of devices.

• Error notifications send via email to user and/or installer.

• A support request can be sent to the installer automatically when the end user allows it.

• Schedules may be created to run certain scenarios at given days/times. This may be a hold open device or to activate another device by means of the input/output module. They may be altered online at anytime from anywhere.

For the installer:

• A dedicated installer interface to see all their installations.

• Location on map of installations.

• After support request from end-user the installer will be able to access the end-user interface with all the same functionalities.

• Remote assistance.

• Schedule of maintenance activities.

Think about all the systems in a residential environment: gate automation, barriers, audio and video intercoms, access control, turnstiles, home automation, CCTV, automatic doors and even carpark systems. Now they can all be connected, controlled and monitored from anywhere in the world.


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Key components of access control
    November 2018, Paxton Access, Access Control & Identity Management, Integrated Solutions
    Dan Drayton speaks to Hi-Tech Security Solutions about what the key components in modern access control systems are.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Applying the SaaS model to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    The software-as-a-service model has proven transformative to many organisations, and even entire industries. The benefits it can offer are undeniable, but in the security sector which is risk-averse by necessity, we wanted to hear the views of some local experts in access control as a service (ACaaS) to find out what some of the pros and cons are.
  • Cloud-based access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Running your access control through a cloud service has made people nervous in the past, but today’s solutions are hard to beat.
  • Controlling access in the cloud
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business.
  • They sure don’t make them like they used to
    November 2018, Technews Publishing, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The latest offerings in the market with respect to doorbells and intercoms, and what functionality they offer.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.