UPS from ERS

June 2008 IT infrastructure

Burglar alarms, CCTV systems and security devices have been dramatically affected by the intermittent source of electricity currently taking place. In some industrial areas, load shedding or 'electricity supply faults' have switched off power for seven or eight hours at a time. Added to this many criminals are switching off mains supplies and taking advantage of flat batteries installed in security systems.

Many security and CCTV installations do not have sufficient built-in backup power to keep the equipment operational for these extended time periods. In addition, many systems are being damaged by power surges when the 'mains' is switched back on.

At the request of their major clients, Emergency Reaction Services has gone into a joint venture with UTL of India, the exclusive distributors of the UTL range of UPS inverter systems. These range from 800 VA systems to 100 kV units and the systems were examined and approved for safety by Test Africa.

Currently there are four models available - 800 VA, 1400 VA, 2000 V and 3000 VA. The 5 kV, 7,5 kV and 10 kV systems are on the way. Larger units up to 100 kV can be ordered and shipped on request. The range includes pure sine wave UPSs which are a completely safe combination of a UPS, an inverter and a voltage stabiliser and provides pure sine wave output. It is powered by microcontroller digital technology. Users are able to run all types of appliances together including tube lights, fans, laser printers and computers, eliminating the need for two systems for similar applications.

For more information contact Emergency Reaction Services, +27 (0)11 234 6000, sales@ersos.co.za, www.emergencyreaction.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.

Read more...
Bringing the wonders of fibre to your estate
Residential Estate Security Handbook 2020, Vox Telecom , IT infrastructure
The Hi-Tech Security Solutions’ Residential Security Conference in Durban was a magnificent event where Vox showcased its visitor management solution.

Read more...
Protecting your electrical equipment
Residential Estate Security Handbook 2020, BFR Digital , IT infrastructure
Load shedding is a constant danger as the surges that occur when the lights come on cause damage to electronic equipment, including security equipment, unless it is protected.

Read more...
Hunting for backdoors in counterfeit Cisco devices
Issue 5 2020 , IT infrastructure
F-Secure’s investigation highlights challenges facing organisations that discover counterfeit devices in their IT infrastructure.

Read more...
Secure biometric access for SAP
Issue 4 2020 , IT infrastructure
An expanded partnership offering endpoint biometric security for SAP takes on new importance amid COVID-19.

Read more...
Security on the edge
Issue 4 2020 , IT infrastructure
From less than $1.5 billion in 2017 to an anticipated $9 billion by 2024, the worldwide edge computing market is set to show significant growth in the coming years.

Read more...
Tips on secure remote working
Issue 3 2020 , IT infrastructure, Cyber Security
NordVPN advises how to stay secure while working from home during the coronavirus outbreak.

Read more...
Wall-mounted solution for mission-critical IT
Issue 3 2020 , IT infrastructure
Schneider Electric’s latest iteration of its 6U wall mount has enabled convenient and easy deployment of edge computing systems.

Read more...
Secure backup for SMEs
Issue 3 2020 , IT infrastructure
Cleeks Cloud has announced the launch of its online, direct-to-cloud backup solution aimed at the South African SME market.

Read more...
Sophos Launches Xstream
Issue 3 2020 , IT infrastructure
SophosLabs research indicates 44% of prevalent information thieves use encryption to hide stolen data.

Read more...