Power that is affordable

November 2004 IT infrastructure

Elvey Security Technologies together with Pyronix has a cost-effective and affordable solution to your security needs - the Matrix 816 alarm panel.

Full uploading and downloading capability ensures that all programming and system amends can be done from remote locations. This means that your companies will benefit through time saving and can maximise the revenue from each installation. Local or remote simple diagnostics can be made using the UDL software to detect battery voltage, fuse status, zone status, etc.

The Matrix 816 comes with eight fully programmable zones and can be expanded to 16 should further inputs be required. This can be done by means of an on-board input expander (MX-IX16). Zone operation may be programmed as normally open, (to enable the use of fire detectors), normally closed, double end of the line and single end of the line. There is the option to programme zones 4-16 to connect inertia sensors.

The icon keypad is aesthetically pleasing with a magnetic key cover lid and is extremely user-friendly. There are on-board PA, Fire and Medical keys and each Matrix 816 system is able to take up to four icon LCD keypads.

With 15 individual user codes plus one engineer code, the Matrix 816 is capable of meeting most of the needs for multiple users.

A 500-event memory log with time and date stamp can be accessed on-site or remotely and will provide an activity history as well as meeting ABI guidelines for signalling systems.

The panel has four arming modes and there is the option for single digit arming. Each of these can be timed, silent, final exit forced arm or keyswitch.

Heavy-duty lightning protection of 6,75 kV/125 A is standard on the Matrix 816.

For more information contact Elvey Security Technologies, 011 401 6700, [email protected], www.elvey.co.za


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

ALM a key element of data security
IT infrastructure
ALM is core to any data security framework in the digital age and it is an element that no business can afford to be careless with.

Integrate, integrate, integrate
IT infrastructure
Security and speed will always war for dominance in DevOps but it’s time to integrate the two as the landscape becomes increasingly fractious and complex.

Future-proofed intrusion detection for retail
Elvey Security Technologies Retail (Industry) Perimeter Security, Alarms & Intruder Detection Products
One of the ongoing challenges that has faced retailers during their adoption of security technology is the issues caused by non-standardisation of technology.

The benefits of Managed File Transfer
IT infrastructure Products
Blue Turtle Technologies looks into how a Managed File Transfer platform benefits businesses, as opposed to the usual FTP or SFTP suspects.

Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Keeping devices in check
Cyber Security Asset Management, EAS, RFID IT infrastructure
Kaspersky patents new technology for analysing relationships between electronic devices to counter cyberattacks launched through connected IoT devices.

IQ WiFi 6 supporting users and security installers
IT infrastructure Products
The IQ WiFi 6 is a new purpose-built mesh router solution for homes and businesses with security, automation and Wi-Fi devices.

Considering cloud downtime insurance?
Arcserve Southern Africa Cyber Security IT infrastructure Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.

A robust OT cybersecurity strategy
Editor's Choice Cyber Security IT infrastructure Industrial (Industry)
Cyber experts are still struggling to convince senior management to spend money to protect their control system assets, resulting in a lack of even basic measures to protect control systems.