Solutions

Access control provides security by giving flexible control over who is allowed to enter your premise and when. Our Access Control System recognizes, authenticates and authorizes entry to the premise thereby ensuring ultimate protection for your premise, staff and assets.

  • Access Controls: The security features that control how users and systems communicate and interact with one another.
  • Access: The flow of information between subject and object
  • Subject: An active entity that requests access to an object or the data in an object
  • Object: A passive entity that contains information

Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint, or mesh wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores.

CCTV Cameras: CCTV systems have become extremely popular over the last few decades as the technology has improved and become more affordable. The majority of CCTV cameras in use today are usually for surveillance and security purposes. CCTV systems can be found in almost every bank, casino, mall, and large department store. In fact, CCTV systems have become so affordable, majority of smaller mom and pop stores also have CCTV systems in them for security purposes.

There are many types of CCTV cameras. They can be categorized by the types of images they are able to capture, the amount of frames they can take per minute, the type of connection to the monitor or video recording device, whether they are able to move position, and special functions they can provide.

Types of Images:CCTV cameras generally take both black and white or color video images. In addition, many CCTV cameras even have night vision capabilities that allow a CCTV camera to view and record low light images using special technology.

Frames per Second: Frames per second is the amount of full frames that a video camera captures and sends to a recording device or monitor per second. While most CCTV camera systems easily capture 30 or more frames per second, the amount of video tape or digital storage would be enormous to record every moment of everyday. For most stores, speeds of 1 to 6 frames per second are more than enough to catch and record a perpetrator committing a crime.

Pan Tilt Zoom Cameras:These types of CCTV cameras allow a person controlling the surveillance of an area to move the camera remotely, usually with an RF or wired controller. Most movable cameras allow the person monitoring it to move the camera from right to left , up and down.

Cameras with Special Accessories:Certain CCTV cameras have special functions that are made for specialty uses. For instance, there are extremely small surveillance cameras that are used for spying (Nanny Cams), night viewing, are vandal resistant, and that are specifically made for indoor or outdoor uses.

Wired Vs. Wireless Connection:There are two main types of connections for CCTV cameras: a fixed cable or a wireless connection.

Fixed Cable Connection:Fixed cable connection means that the camera is physically connected to the monitor or recording device via a cable. Coaxial cables that are similar to normal home TV cables are usually used. Lengths come in 25, 35, 50, 100, or 500 feet. As the distance increases, signal quality decreases. For distances longer than 100 or 200 feet, purchase higher quality coaxial cables such as RG59 coaxial cable for distances up to 600 feet and for distances more than 600 feet, but less than 2,000 feet, purchase CAT5 cable.

Wireless Connection:Most wireless CCTV cameras use the 2.4 Gigahertz frequencies to transmit their video images to a monitor or DVR (digital video recorder). Usually, frequencies can be slightly changed to have more than one group of cameras in a specific space. Wireless CCTV cameras that use this frequency can easily transmit through most walls and obstacles. However, each individual location will have its own operating limits. Expect most wireless CCTV cameras to send data to a range of about 200 feet. However, many will more likely work well when transmitting less than 150 feet. A clear line of sight transmission will always work best. Obviously a wireless connection allows greater freedom to place CCTV cameras almost anywhere. While wireless CCTV cameras transmit their video images to a digital video recorder or monitor, many of these types of cameras must be plugged into an electrical outlet. There are, however, some CCTV cameras that are battery operated.

Tape vs. Digital Video Recorders: There are two main ways to record video images that CCTV cameras capture. They are analog tape and digital video recorders. Most analog video recorders use VCR tapes or standard VCRs to record the images or special security time-lapse VCRs to record images for a longer period of time.

VCR Tape Recorder: A tape recorder such as a security-time lapse VCR can record CCTV camera images in either black and white or color for 2, 4, 6, 8, all the way up to 960 hours, which is 40 complete days. The determining factor is how many frames per second users intend to record and how many cameras are hooked up to the VCR for recording. For instance, if a user records 30 frames per second (real time video), he/she will only be able to get a few hours of video captured on the recorder. If users record one frame per second or less, they can record for dozens of hours before the video tape is full. VCRs are very practical, very reliable, and extremely affordable.

Digital Video Recorders:There are two types of DVRs (Digital Video Recorders). They are either stand alone devices or hard drives that are connected to a computer system. DVRs work similar to VCRs, but the images they capture from the CCTV camera is digital. The amount of digital images captured on a DVR is determined by a few factors including the frames per second recorded, the amount of cameras hooked up to the DVR device, the resolution that the DVR saves the images at, and the video compression used (e.g. MPEG4). For a common set up, where 4 cameras are shooting at 30 fps and an image resolution of 320 X 240 is being used, each camera only records when motion is on, and MPEG4 compression is used, users should be able fill up a 20 to 25 GB hard drive in about 80 hours.

Analog CCTV:In most security situations, Analog CCTV is an appropriate technology choice due to its durability and lower initial costs. Standalone setups, where remote integration with WAN, and constant remote surveillance is not required- are ideal for Analog CCTV installations. Analog CCTV essentially refers to a solution that utilizes electronic CCTV cameras that send raw video feeds to a Digital Video Recorder (DVR), through a dedicated data cable network.

IP CCTV: IP CCTV Systems utilize the TCP/IP networking protocol for transmitting video data to a Network Video Recorder in digital format. These systems may utilize existing LAN/WAN networks for their connectivity. IP CCTV is ideal in setups where there is a need for remote surveillance, use of existing networks and integration into a WAN. Apart from the higher initial costs, IP CCTV's advantages are that it is very easily expandable- more cameras and video storage can be added without any major changes to the installation.

Biometrics refers to or metrics) related to human characteristics and traits. Biometric identification (or biometric authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.

More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.

Most common biometric systems:
  • Fingerprint
  • Palm Scan
  • Hand Geometry
  • Iris Scan
  • Signature Dynamics
  • Keyboard Dynamics
  • Voice Print
  • Facial Scan
  • Facial Scan
  • Hand Topography

A network video recorder (NVR) is a software program that records video in a digital format to a disk drive, USB flash drive, SD memory card or other mass storage device. An NVR contains no dedicated video capture hardware. However, the software is typically run on a dedicated device, usually with an embedded operating system. Alternatively, to help support increased functionality and serviceability, standard Linux and Windows operating systems are used with standard Intel processors and video management software. An NVR is typically deployed in an IP video surveillance system.

Network video recorders are distinct from digital video recorders (DVR) as their input is from a network rather than a direct connection to a video capture card or tuner. Video on a DVR is encoded and processed at the DVR, while video on an NVR is encoded and processed at the camera, then streamed to the NVR for storage or remote viewing. Hybrid NVR/DVR security systems exist which incorporate functions of both NVR and DVR; these are considered a form of NVR.NVR home security systems are wireless (there are also wired systems), tend to be easy to set up, can be accessed through a web browser, and allow the user to be notified by email if an alarm is triggered.

A fire alarm system is a set of electric/electronic devices/equipment working together to detect and alert people through visual and audio appliances when smoke/fire is present. These alarms may be activated from smoke detectors, heat detectors, water flow sensors, which are automatic or from a manual fire alarm pull station.

Wiring: Addressable alarm systems connect devices using a loop. This is where one wire connects all devices to the control panel. Both ends of the wire loop connect to the control panel. With addressable systems, one wire loop will connect several devices. Addressable systems have a range of other facilities that can help save money. For instance, addressable alarm panels monitor the air flow through smoke detectors to prevent the occurrence of false alarms, which can be costly to a business.

Addressable alarm panel is the more reliable of the two. This is because the wire connects to the control panel at both ends (see the diagram above). If one end of the loop becomes severed, signals can still be sent to the control panel via the other end of the loop. Loop isolation modules are also used to separate devices on the loop. This means that if one device becomes disconnected, it won't disable the circuit.

Functionally, the addressable fire alarm unit is superior, which can help prevent costly activities and save time when detecting a fire. It's also cheaper and easier to install.

Wiring:With a conventional alarm, each device will be connected to the control panel via its own wire, rather than a shared one. One end of the wire will be touching the device, and another touching the control panel. Conventional alarm panels cost a lot less to buy but are more expensive to install. Conventional systems require more wire and more man hours during the installation phase.

With a conventional system, if a wire has become severed, the device will become disconnected.

In terms of just buying price, a conventional system is cheaper, and will meet the functional needs of small premises where a sophisticated system is not necessary.

It is a centralized amplifier based system that's been designed to provide voice paging and to broadcast alarm tone during emergencies. The system can transmit alarm tone and routine voice messages, from a central location, to all or selected areas of the facility, in a reliable and safe manner, by the use of loudspeakers. The entire operational area / facility can be divided into one or more zones, which can be accessed independently either for announcements or for alarm broadcasting. The loudspeakers are installed in these zones. There are no limitations to number of zones in the system or number of loudspeakers in each zone. Each loudspeaker is connected to the central equipment for amplification and other control functions.

Depending on the surrounding environment, either flameproof loudspeakers (for hazardous atmospheres) or weatherproof loudspeakers (for safe & non-hazardous atmospheres) or indoor loudspeakers (for indoor areas) are installed in each zone. The loudspeakers are available in different wattage, sizes, types and constructions. The system is designed to offer clear reproduction of sound and intelligibility of speech even in high noisy areas. Multiple control desks can be installed in the same system, for paging access (with priority) from more locations. The system uses high reliability amplifiers with built in over load protection circuitry, short circuit protection, open circuit protection and thermal protection.

Simple PA systems are often used in small venues such as school auditoriums, churches, and small bars. PA systems with many speakers are widely used to make announcements in public, institutional and commercial buildings and locations. Intercom systems, installed in many buildings, have microphones in many rooms allowing the occupants to respond to announcements.

Multi Apartment Video Door Phone, a security system every residential building deserves. It is tailor-made to meet the security needs of the high-rise buildings. The device provides unparalleled protection by enabling interaction with the visitor at 2 levels - at the building entrance and just outside the apartment. The Multi-Apartment Video Door Phone also has an intercom feature for inter flats communication within the building or even between buildings within a complex and can be installed in any room of the house. We have also launched a new range of IP based Multi Apartment Video Door Phones.

Benefits -
  • Enables you to view and interact with the visitor without opening the door
  • 2 - Way Communication
  • Clear Speaker system
  • More than one indoor monitor can be attached with outdoor camera
  • Dual way Intercom
  • Outdoor Units and Lobby Stations

Visitor management refers to tracking the usage of a public building or site. By gathering increasing amounts of information, a visitor management system can record the usage of the facilities by specific visitors and provide documentation of visitor's whereabouts.

Because a visitor management system provides a record of building use, these systems are frequently used to complement building security systems and access control systems. As electronic visitor management systems become more common and more powerful, these systems are taking over many of the functions of building security and access control.

Advantages-
  • Improves efficiency of the visitor Check IN Process
  • Monitors visitor traffic and waiting times
  • Effective Verification of visitors
  • Helps in Prior Planning for Resource booking
  • Visitor Categorization
  • Better control over visitor movements
  • Restricted accessibility to visitors

Special rules & regulation can also be integrated within system. E.g. ID card validity checking, Same ID card is not applicable for same day with same shift time.

Also known as patrol management, touch probe, security wand, data logger, pipe, guard stick, attendance verification and a number of other names. The general idea is the same. A probe-like item that can be carried around by staff to ensure they have been where they are supposed to be.

They see most use in the security patrols industry, where time and attendance are a crucial part of the everyday management and growth of the organization. Many companies even rely on guard tour systems to get paid every month!

The door interlocking system is used to control the entry of a person to a secure area such as a clean room, research lab, etc. where dust or small particles may be a problem or security is of high concern. In its simplest form, the door interlocking is composed of 2 doors that are electrically interlocked in such a way that the doors cannot be opened simultaneously.

The Door Interlocking system is used to control the entry of any person in secured areas, where dust or small particles may be a problem such as a clean room, Research labs, By definition the door interlocking system comprises of minimum 2 doors that are interlocked in such a way that the doors cannot be opened simultaneously i.e.; until and unless any of the opened door is closed no other door can be opened. The door interlocking systems are used in many situations but it is basically used to control the unwanted passage from one area to another.

Many organizations provide Canteen as an additional subsidized facility to their employees as a welfare measure. The usage of the canteen by the employees depends on many factors like centralized food distribution center with swift and simplicity in operations. CMS design provides a user friendly system that facilitates quick and efficient operations to cover larger section of employees within a specified time. CMS is paperless and has almost cashless transactions. This system is also compatible in an environment where multiple caterers operate in a closed environment or at multiple locations.

  • CMS can be implemented in an organization where the employees have cards (any type of identification cards) for unique identification.
  • Using smart card as an ID card will facilitate the system to be used as a Debit/Credit card.
  • Loading of cash into the smart card (for debit application) can be done at the cash counter.
  • CMS can be integrated with an existing (or new), Personnel Information system, Time and Attendance System, and Access Control System etc.
  • CMS can be integrated with different POS terminals depending on the customer needs.
  • CMS takes care of subsidies provided by the companies to their employees.
  • Manual entry of transactions is feasible.
  • CMS can be linked with shift management system.
  • Daily limit on the amount for the usage of canteen facility can be preset.
  • Daily menu creation by the caterer is possible using CMS.
  • SodexHo coupons can be used for making transactions.
  • Ease in selection from menu by Caterers.
  • Advance information on the usage of the canteen facilities by the employees on any particular day or shift can be notified to the caterers.
Benefits
  • CMS is independent of the technology used for identification of employees.
  • Provides cashless and paperless transactions.
  • Provides a choice to the employee on the mode of operation (debit/credit).
  • Accounting is made easier between the company and the caterers.
  • Reconciliation between caterers is made easy.
  • Provides salary-debit facility for employees in credit scheme, for canteen facilities used.
  • Provides a fast and efficient service.
  • Use of SodexHo coupons instead of cash.
  • Reduces wastage.
  • Daily menu creation by the caterer is possible using CMS.
  • SodexHo coupons can be used for making transactions.
  • Ease in selection from menu by Caterers.
  • Advance information on the usage of the canteen facilities by the employees on any particular day or shift can be notified to the caterers.

Intrusion detection systems and burglar alarms help safeguard your facilities, people and operations. By securing your facilities against burglary and theft, your organization reduces the risk of business disruption and loss. Security includes infrared sensors, photo-electric sensors, motion detection, door and window sensors and more. These solutions are customized to your specific needs for detection.