Security Systems

Software automates building management access control.

Software automates building management access control.

WAPAC-PRO handles over 4000 alarm inputs and relay outputs through use of card-holder technology. Based on Microsoft SQL Server, software is equipped with alarm graphics as well as alarm prioritization. It is expandable up to 80,000 card holders per unit. Features include real time communications, input/output mapping, and database integration capability with one-card systems.

Read More »
DVR replaces VCRs in security system applications.

DVR replaces VCRs in security system applications.

With on-board networking capabilities for integration into networked systems, self-contained Model WJ-HD220 provides 8 channel inputs plus camera control functionality. It offers 120 Gb recording capacity, pre-alarm screening, time lapse recording, as well as playback and monitoring capabilities. Featuring coax control up to 3,000 feet using Panasonic VD2 for dome camera pan/tilt/zoom operations,...

Read More »
Perimeter Access Guarding Device offers 30 m range.

Perimeter Access Guarding Device offers 30 m range.

Explosionproof Perimeter Access Guarding Device PA4600-EP features 16 ms response time and 2 PNP safety outputs designed to directly switch machine primary control elements. Selection of scan codes allows installer to choose scan frequencies, avoiding cross-talk with adjacent systems or other IR emitting devices. Offering torso detection, multiple-beam system is suitable for safeguarding...

Read More »
Design & Manufacturing Process of a Coil
Sponsored

Design & Manufacturing Process of a Coil

Because the design and manufacturing of electromagnets are critical to the successful operation of the application, it's important to spend time defining your requirements before purchasing coils for an application. This eBook will guide you through the process of evaluating the application's constraints, identifying the needed specifications, and collaborating with a manufacturer to develop an appropriate coil solution for the application.

Read More »

Spam Filtering Appliance supports Linux OS.

Natively integrated with Microsoft OutlookÂ-® and Novell GroupWiseÂ-®, MessageScreen(TM) v4.3 appliance-based content and spam gateway filter stops spam, viruses, and explicit content before it enters network. It uses deep scanning technology, such as Real-Time Block Lists, Sender Server Verification, lexical scanning, predictive analysis, and heuristic scoring, to inspect header, body,...

Read More »

Two-Way Remote Starter includes security features.

Informer Series confirming remote start model features visual confirmation of alarm system status or remote start on LCD screen on transmitter from up to 1,400 ft away. It incorporates dual-stage city shock sensor, LCD clock-alarm/parking meter timer, and selectable remote start run times of 5, 10, 15, and 20 min. Other features include 24 hr auto-start timer, 0Â-

Read More »

Remote Monitoring System warns of intruders/malfunctions.

Working with MikroSpec(TM) R/T software, DualVision 724 intranet/internet-enabled package produces composite IR and visual image as well as separate images of each. System consists of thermal imaging and video cameras with Internet IP addresses and password protection. Up to 32 regions of interest can be defined on thermal image in any complex shape, enabling system to trigger alarms at approach...

Read More »

Software streamlines visitor ID process.

ID WorksÂ-® allows organizations to verify visitor identity and issue secure ID card or adhesive name tag in seconds. Security personnel can scan approved credential, such as driver's license or other government-issued ID, and automatically capture photo and personal information. Software uses information to create visitor database and print ID card or name tag. When visitor returns, identity...

Read More »

Security System has telephone interface module.

With built-in keypad and 85 dB siren, Allegro security system for apartments and condominiums has up to 20 zones of burglary and fire protection. Control panel is physically separated from Dialog(TM) Telephone Interface Module. DTIM is battery-operated communication link between control panel and central monitoring station. Unit receives radio signals from panel, then uses phone line to report...

Read More »

Data Security System adheres to NERC requirements.

iKey authentication tokens and NetSwift iGate IPW security solution is for protection of SCADA and distributed control systems. USB authentication key and NetSwift iGate combines two-factor authentication with always-on security via SSL to create IPW for utility customers. iKey and iGate manage remote access needs of field personnel, control center personnel, corporate users, vendors, and...

Read More »

All Topics