Cellular security

October 2010 Asset Management, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Cellular communications finds a willing audience in the security world.

Cellular communications have changed the way we live. If you need to get hold of a friend or family member, you no longer call their office, or even their home, you now call them on their personal cell number.

Hans Vestberg, CEO of mobile phone maker Ericsson, told delegates at the 2010 Mobile World Congress that the last decade had seen the number of mobile subscriptions worldwide grow sixfold to 4,6 billion. To put this in perspective, the entire world population is 6,7 billion people. He also said that he envisaged 50 billion connected devices by 2020, and that patients would be connected remotely to hospitals, trucks would be online with logistics centres for efficient routing, and city students would be connected to students in rural villages halfway around the world.

Why has this technology, based on GSM (global system for mobile communication – the most popular standard for mobile telephony systems in the world), become so dominant in our lives? It all comes down to convenience, efficiencies and, more recently, necessity. People are no longer dependent on being at a specific location in order to communicate with their worlds. Devices can now communicate wirelessly with one another over continents. Connectivity at this level has now moved from being new and advanced to being expected and even demanded. So much so, that many security systems are now adopting it and using it as a cost effective and reliable means of telephony.

Security via GSM

Centurion has embraced this technology and its recently released GSM device, called the G-Switch, is a classic example of how it is being put to very practical use. The G-Switch, once connected to the GSM network, allows you to activate almost any type of device or appliance from anywhere in the GSM world. For example, the G-Switch can, via either of its two outputs, trigger your gate automation system if you are sitting in Paris but need to let your garden service into your property in Parys. Or you may wish to switch on your air conditioner whilst you are driving home so that you arrive at a cool, relaxing home after being stuck in the summer traffic snarl-up for a few hours. All this is done by simply making a free missed call, or by sending an SMS to your G-Switch.

Your G-Switch talks back to you too. It can receive information from various devices, through either of its two inputs, and can relay this back to you via an SMS. For example, it can be set up to alert you if someone has attempted to breach your electric fence, or you can even integrate this with your gate motor to warn you that someone has just opened the gate to your holiday home.

This technology is not new. It is just getting quicker, smarter and cheaper than ever before. In the same way that most of us never leave home without our cellphones, we will soon be using them to control our security systems, home automation and all sorts of other devices. Even our more rural friends are using these devices to switch on borehole pumps, saving them from a few kilometres of bundu bashing.

Harnessing and utilising the benefits of cellular technology is certainly the way of the future. So, why wait? Do not get left behind, get on board and get up to speed.

For more information contact Centurion Systems, +27 (0)11 699 2467, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...
Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Advances in electric fence management
Nemtek Electric Fencing Products News & Events Perimeter Security, Alarms & Intruder Detection
Nemtek will demonstrate its newly enhanced FG7C+ Fence Controller, now featuring an advanced software upgrade that connects all Nemtek devices, aggregating data to a single point for efficient electric fence alarm monitoring and control.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Smart protection for modern living
Products & Solutions Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry)
Recognised globally for their performance and sleek design, AJAX solutions combine professional-grade security with user-friendly control, making them ideal for both residential and commercial environments.

Read more...
Know where your asset is - not was
IoT & Automation Asset Management
To properly prevent loss of movable assets, companies need an early warning system, traceability throughout the chain of custody, and intelligence on parameters such as temperature, humidity, and impact.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.