Cellular security

October 2010 Asset Management, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Cellular communications finds a willing audience in the security world.

Cellular communications have changed the way we live. If you need to get hold of a friend or family member, you no longer call their office, or even their home, you now call them on their personal cell number.

Hans Vestberg, CEO of mobile phone maker Ericsson, told delegates at the 2010 Mobile World Congress that the last decade had seen the number of mobile subscriptions worldwide grow sixfold to 4,6 billion. To put this in perspective, the entire world population is 6,7 billion people. He also said that he envisaged 50 billion connected devices by 2020, and that patients would be connected remotely to hospitals, trucks would be online with logistics centres for efficient routing, and city students would be connected to students in rural villages halfway around the world.

Why has this technology, based on GSM (global system for mobile communication – the most popular standard for mobile telephony systems in the world), become so dominant in our lives? It all comes down to convenience, efficiencies and, more recently, necessity. People are no longer dependent on being at a specific location in order to communicate with their worlds. Devices can now communicate wirelessly with one another over continents. Connectivity at this level has now moved from being new and advanced to being expected and even demanded. So much so, that many security systems are now adopting it and using it as a cost effective and reliable means of telephony.

Security via GSM

Centurion has embraced this technology and its recently released GSM device, called the G-Switch, is a classic example of how it is being put to very practical use. The G-Switch, once connected to the GSM network, allows you to activate almost any type of device or appliance from anywhere in the GSM world. For example, the G-Switch can, via either of its two outputs, trigger your gate automation system if you are sitting in Paris but need to let your garden service into your property in Parys. Or you may wish to switch on your air conditioner whilst you are driving home so that you arrive at a cool, relaxing home after being stuck in the summer traffic snarl-up for a few hours. All this is done by simply making a free missed call, or by sending an SMS to your G-Switch.

Your G-Switch talks back to you too. It can receive information from various devices, through either of its two inputs, and can relay this back to you via an SMS. For example, it can be set up to alert you if someone has attempted to breach your electric fence, or you can even integrate this with your gate motor to warn you that someone has just opened the gate to your holiday home.

This technology is not new. It is just getting quicker, smarter and cheaper than ever before. In the same way that most of us never leave home without our cellphones, we will soon be using them to control our security systems, home automation and all sorts of other devices. Even our more rural friends are using these devices to switch on borehole pumps, saving them from a few kilometres of bundu bashing.

Harnessing and utilising the benefits of cellular technology is certainly the way of the future. So, why wait? Do not get left behind, get on board and get up to speed.

For more information contact Centurion Systems, +27 (0)11 699 2467, Adam.Butchart@centurionsystems.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
ASSA ABLOY acquires Amecor in South Africa
Amecor Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
ASSA ABLOY has signed an agreement to acquire Amecor, a well-known South African manufacturer of security communication equipment in the South African security market and beyond.

Read more...
Paxton appoints Werner Geldenhuys as Country Sales Manager for South Africa
Paxton News & Events Access Control & Identity Management
Paxton has appointed Werner Geldenhuys as its new Country Sales Manager for South Africa; To lead the team to continue providing smart yet simple-to-use security systems in South Africa.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...
Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

Read more...
Simplify AARTO compliance for fleets
Guardian Eye IoT & Automation Asset Management Transport (Industry) Logistics (Industry)
While there are challenges around the management and implementation of the AARTO Amendment Act, there are also benefits that need to be understood today to ensure compliance and value tomorrow.

Read more...