No excuse for slow alarm responses

September 2013 Perimeter Security, Alarms & Intruder Detection, Products & Solutions

At best, a monitoring company’s slow response to an intruder alarm will infuriate the property owner who may decide to move his business to another service provider as a result. At worst, it could result in injury or loss of life.

That’s why it’s critical for alarm monitoring companies to use the fastest, most reliable communicators available, says Zane Greeff, technical director of Elvey Security Technologies.

Fast response times will not only forestall disaster, they will also ensure an alarm company’s continued existence in what has become an incredibly competitive market, he maintains, adding that customers are less forgiving of tardy reactions to intruder alarms.

“There’s no excuse for sluggish responses, given the sterling job that South African Internet service providers are doing with regard to connecting residential and business owners to networks,” says Greeff, who says constant advances in Internet and GPRS technology are not only making life easier, but they’re actually saving alarm companies money in the process by enabling them to bypass the costly old telephone line.

The traditional landline or PSTN network still has a place in modern-day communication systems, he continues, but no longer as the primary connection. “Many of the leading alarm companies are using the Internet as their primary connection, with PSTN or RF radio as a secondary system. Others are backing up their Internet connections with GPRS. Since both options use wireless technology, communication between end-user and control room is impervious to Internet downtime.”

The use of cellular technology in alarm systems might come as a surprise to some, owing to its reputation for dropped calls and poor connections, but, says Greeff, used in a static environment, it’s an extremely reliable form of communication. “Whereas cell phone users are usually on the move, the alarm communicator remains in a fixed position at a location that offers good reception. This ensures that communication to the control room is extremely reliable.”

Testimony to this is market leader RDC’s new GPRS bi-directional communicator, which is equipped with dual SIM-redundancy on both the MTN and Vodacom networks. This enables the system to roam from one service provider to another in the event of a GSM network outage or any other technical problem without hampering the path of a trouble signal to the control room.

GPRS alarm communication offers a number of advantages to the modern-day security installer, he continues.

RDC’s GPRS unit contains nine hardwired inputs and Contact ID connection as well as two onboard relays for simple home automation. Security installers can programme the system to trigger either of the two relays which can be used to control any electronic devices stipulated by the user. The system is also able to report the exact zone that triggered the alarm.

Another of the unit’s time saving benefits is that installers can access and programme it remotely via a PC application – subject, of course, to the property owner’s approval. Security installers can also download up to 100 event logs without going to the end-user’s premises.

“This is an important feature,” says Greeff, “because it provides protection to the installer in the event of a burglary taking place during the time the alarm is deactivated. Further to this, the event logs, which store event information, will show if the owner forgot to switch on his alarm system.”

GTXConnect

For property owners wanting the ultimate in GPRS-based communication, Greeff recommends RDC’s GTXConnect. “This is a Web-based portal that makes RDC’s GPRS-based communication system more powerful than any other system on the market,” he asserts.

The portal features various access levels, allowing only the appropriate features to be available to security company technicians and end-users. SIM activations, user accounts and access levels are managed through a simple and easy-to-use interface. The ‘Mobi Site’ essentially empowers end-users with the ability to log in to the mobi site, which gives them access to control the onboard relays. Since end-users will be logging on from various mobile devices and tablets, the layout of the site makes it easy for them to navigate. Further, property owners can access a variety of control functions as value-added or chargeable services through a generic branded Web interface linked to their own website.

For more information contact Elvey Security Technologies, +27 (0)11 401 6700, [email protected], www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.