PSI Magazine October 2024

Page 1


EURO 76

The same renowned, quality software as the EURO 46.

Reliable supply in distribution, supporting your business.

One hybrid panel range for Grade 2 and 3 installations 1 to 76 Zones.

EDITOR

Andy Clutton

Tel: 020 8295 8308

E: aclutton@westernbusiness.media

Twitter: @SecurityDrum

DESIGN & PRODUCTION

Matt Jarvis

Tel: 020 8295 8300

E: mjarvis@westernbusiness.media

Alex Romer

E: aromer@westernbusiness.media

ADVERTISEMENT DIRECTOR

David Lewis

Tel: 020 8295 8309

E: dlewis@westernbusiness.media

DISPLAY ADVERTISING

Paul Amura

Tel: 020 8295 8307

E: pamura@westernbusiness.media

ADMINISTRATION

Tracey Cole

Tel: 020 8295 8306

E: tcole@westernbusiness.media

CONSULTANT

Mark Quittenton

DIRECTORS

Mark Sennett, Keith Gabriel, Danny Kosifou

With the widespread adoption of IP technology comes concerns about the security of

A problem shared is a problem managed, says the

security and fire sectors

The latest movers and shakers in the security and fire industry

The latest door station is put through its paces by an independent reviewer

on social media Instagram posts from across the sector. Are you on there?

The pick of the latest security products with information from the manufacturers plus handy QR codes

Mark Gilbert, MD at Alarminsure, talks to PSi about buying the insurance cover that is best for you

Jonathan Rickard, i-PRO sales engineer, explains the hidden costs of maintaining legacy security systems

How can cloud-based security benefit you and your customers? PSi met up with Karen Uppal of installer ecl-ips to find out

The PSi Panel reveal the top tips for installers (and their customers) on keeping networked security systems safe and secure

This time, we discuss life in the sector with Sam Jennings of ABCA Systems Group in Newcastle

Simon Cook of Genetec outlines the journey ahead for those navigating the route into cloud

An overview of some recent successful security installations and case studies

Here we highlight some of the most recent switches and routers to hit the market

Capture LR50/LR50-W

Advanced Protection for Extended Spaces

Maximise Your Security Installations

Introducing the Capture LR50, a state-of-the-art 50m Long Range Corridor PIR motion detector designed to provide unparalleled security coverage for long and narrow spaces. Whether it’s a hallway, corridor, or any elongated area, the Capture LR50 ensures you have the most reliable and accurate intrusion detection.

Why choose the Capture LR50?

•50m x 2m Coverage: Designed for long corridors and narrow spaces, offering extensive monitoring capabilities.

•Quad Element Pyro Sensor: Ensures precise detection and minimises false alarms, providing reliable security.

•Wireless Option with Ricochet™ Mesh Technology: Enjoy the flexibility of wireless installation with Ricochet technology, enhancing the robustness and range of your security network.

•Flexible Installation: Versatile mounting options to suit various installation needs and environments.

•EN50131-2-2 Grade 2: Complies with industry standards, ensuring high-quality performance and reliability.

SHARING IS CARING

Whose job is it to manage best cyber practice when it comes to IP security systems?

In the worlds of human resources and business continuity there have been multiple studies that indicate the most important factor in the success of any company are its employees (although I’ve always felt that a constant electricity supply is probably more essential). In the land of IT however it is a slightly different picture because the end user brings another dynamic to the process.

There is an oft aired train of thought in overworked IT security departments that the most risky aspect of the system is the involvement of a person - a common cause of computer error is human error. It’s likely therefore that once computers can operate without humans they will suffer from fewer problems, although there will be other issues on the back of that, but let’s not go down that AI doomsday route just yet.

Looking back on the development of IP security systems, those of you old enough will remember the original concerns about having a security system operating over the net. The early worries came on the back of the fact that those initial dial-up connections were anything but robust compared to hard-wired analogue installations. A common point of worry came on how often connection was lost thus diminishing the efficiency of the security side of things. Another concern was, of course, the security of the security system itself. Could IP cameras facilitate a risk from cyberattack or malicious actions?

Perhaps some of the early resistance to migration also came due to the marketing messages that were being used at the time. I remember talking to one installer about networked cameras and he said: “The main selling point is that you only need one cable, but the analogue wiring is already in place”.

As we now know, the worries about the connection and management of IP-based security were quickly dealt with as the innovations came thick and fast and the benefits of IP connectivity and integration across the entire spectrum of technologies and daily life were developed and experienced.

Nowadays, we’re all much more IT savvy and the next generation of installers joining the sector are even more clued up on IT having grown up with smartphones and tablets. The next generation of user is also more cyber aware, so system security is something of a shared responsibility led by the installer as explained in this month’s Panel feature. Teamwork makes the Net work - see what I did there?

ADI ADDED VALUE

INDUSTRY NEWS

Yuasa partners with Skills for Security

next generation of fire and security professionals.

Yuasa’s support will enable Skills for Security to expand its educational initiatives, including the development of training modules and the facilitation of apprenticeship programmes across the UK.

“We are thrilled to announce Yuasa’s sponsorship of Skills for Security,” said David Scott, managing director at Skills for Security. “This partnership reflects Yuasa’s dedication to supporting education and innovation within the

Three acquisitions for ABCA Systems

NEWCASTLE-BASED ABCA Systems Group has completed the triple acquisition of Maintec, A.G.S. Tech and HBS Fabrication Northwest, thereby adding a further £10m+ in combined annualised revenues to the business thanks to backing from Trimountain Partners and Santander UK.

The acquisitions of Maintec and A.G.S. will further enhance the Group’s expertise, capabilities, reach and customer base in fire and security compliance, providing opportunities to accelerate growth through additional scale, cross-sell avenues and investment in future innovation. Similarly, the partnership with HBS Fabrication Northwest will enable ABCA to provide in-house another critical and complementary, value-added offering to existing and new clients.

“We are delighted to welcome these three leading companies into the Group,” said CEO Phil Miller. “They will help us provide an even higher level of service and satisfaction to our clients, especially those in the social housing sector. I’m particularly excited as two of the key players who will be joining us, Chris King and Colin Prescott were previously part of the ABCA Systems Group many years ago before successfully growing A.G.S. organically into the business it has become today, whilst in parallel acquiring and expanding HBS.

“Also joining us and strengthening the leadership team is Steve Cranshaw of Maintec, who brings to the table a wealth of knowledge and experience that will help us to grow even more.

With Phil Miller recently stepping up into the CEO role, the position of managing director of ABCA Systems Group has been taken up by

industry, aligning perfectly with our goals to elevate standards and empower future professionals.”

James Taylor, general manager commercial at GS Yuasa Battery Sales UK, added: “This collaboration represents our shared commitment to nurturing talent and driving excellence within the security sector. We look forward to contributing to the success of Skills for Security’s programmes and initiatives while raising awareness of the benefits choosing Yuasa brings.”

former commercial director, Phil Batson who said: “The acquisitions add tremendous value to our business and will propel us to the next level.”

YUASA HAS announced its partnership with Skills for
Security, to help advance the education and training of the

ADI ADDED VALUE

Security award for community allotment

A COMMUNITY allotment in Kent has been given Burg-Wächter’s ‘Secure Communities Scheme’ award to help keep the grounds and

equipment secure.

Touchbase Care in Folkestone applied for BurgWächter’s ‘Secure Community Scheme’ after looking online

for support for the group’s community allotment. Being chosen for this award meant that Burg-Wächter was able to provide Touchbase with a donation of locks and hasps to help keep the allotment equipment locked away and secure when people aren’t there.

Touchbase Care is dedicated to improving the quality of life for their neurodivergent and disabled members by providing a range of support, advice, and training opportunities to develop abilities, learn new skills, encourage social inclusion and enabling them to live independently. One way they do this is through their community allotment where members learn to grow salads and vegetables which are then used for the group’s lunches.

Jim Lockey, funding and compliance manager at Touchbase Care, said: “A lot of our tools have been adapted for our disabled and neurodivergent members

THE SSAIB recently celebrated two achievements in marketing and auditing for employees Sam Ogilvie and Lauren Dunlavy.

Sam, who serves as the marketing assistant at SSAIB, has completed an 18-month Marketing Assistant apprenticeship with the Oxford Professional Education Group, earning a Distinction. To achieve the qualification, Sam undertook a project focused on organising and assessing The Fire Event at the NEC Birmingham, held in April this year. This project not only allowed Sam to apply his learning in a real-world context but also showcased his ability to handle complex marketing tasks effectively.

Meanwhile, Lauren, who serves as a fire schemes administrator, has continued to build on earlier achievements by completing the ISO9001 Lead Auditor Course. This five-day course covered essential topics such as business management systems, the principles of business process management, and advanced auditing techniques. With this new qualification, Lauren is now equipped to conduct audits against ISO9001 and SP205 standards, ensuring compliance with industry regulations and best practices.

Commenting on the accomplishments, SSAIB CEO Paul Phillips stated: “I am incredibly proud of Sam and Lauren for their hard work and dedication. Their achievements are a testament to SSAIB’s commitment to nurturing talent and promoting excellence within our team.”

In Brief

• Paxton has become carbon neutral certified in the UK, France, Germany, and South Africa.

• Hanwha Vision has obtained ISO 37301 certification, the standard for compliance management systems (CMS).

• CIE Group has announced a new agreement to become the UK’s strategic distribution partner of Stid.

and this means they are able to work more independently in the allotment. Thanks to Burg-Wächter we are now able to safely lock these away and know that they are secure when we’re not there. We are very thankful for their support.”

Distributor of Choice for Security, Fire and AV

Kentec expands training with northern hub

KENTEC ELECTRONICS

has expanded its training provision with the opening of a Northen Training Hub. Established to work alongside the company’s existing Dartford training centre, the hub is based at the Nigeria Conference Centre, in Sheffield. It will enable Kentec to provide classroom-based training packages to a larger audience.

Courses already include how to effectively install, commission, maintain, expand and update the Kentec Taktis Control panel and the associated Vision Repeater Unit. Kentec Syncro 8000 series (AS) fire detection panel courses begin in October.

Lee Oxley (pictured), technical support engineer and lead trainer at the Sheffield hub, said: “We are very excited to announce our new Kentec Northern Training Hub for faceto-face, hands-on training. There is no better way to learn than by working with the panels themselves, and the new centre means more installers and distributors than ever before will have the opportunity to do just that.”

Reliance High-Tech launches new venture

RELIANCE HIGH-

TECH has announced the launch of a new venture, Reliance Technology Care Solutions, which will utilise its 24/7 alarm monitoring expertise in order to help individuals maintain independent and healthy lifestyles, while offering peace of mind.

Reliance Technology Care Solutions aims to integrate a range of medical technology solutions with the alarm management services of its inhouse alarm receiving centre.

“I’m delighted to announce that our first strategic partnership is with My Medic Watch – a developer of smartwatch apps that

enable people with epilepsy, or at risk of falls, to get immediate care and assistance when an incident is detected via the smartwatch apps,” explained Chris Allcard, director at Reliance High-Tech.

The My Medic Watch apps use algorithms to detect falls and uncontrollable movements associated with seizures. When the app detects an incident it notifies nominated family members and carers. If they can’t help, it escalates to the Reliance ARC alongside user location and real time heart rate information. The ARC’s alarm handling operators can then use this to get help to the user or to the emergency services as required.

APPOINTMENTS

BEN YOXALL

OLIVER LINCOLN

i-PRO EMEA has announced the appointment of Oliver Lincoln as its new senior sales manager, overseeing the UK and DACH regions. Oliver brings extensive expertise from his previous role at Securitas, where he led the UK sales team for eight years.

Oliver says: “I am thrilled to join i-PRO and embark on this next career chapter. I’m excited to work alongside driven and passionate teams that inspire and elevate one another.

In my new role, I will lead the UK and DACH regions, where we see tremendous potential to expand i-PRO’s presence and strengthen our collaboration with security professionals.”

REECE PAPROTNY

AMTHAL GROUP Companies has announced Reece Paprotny as its new managing director, highlighting an impressive journey from apprentice to leader.

Reece joined Amthal as a finance apprentice in 2015 and has since demonstrated exceptional skills, dedication, and leadership. He joined the Senior Management team in 2018 and was promoted to Commercial Director in 2023.

In his role, Reece will be responsible for driving strategic initiatives, overseeing day-to-day operations, and spearheading projects to enhance Amthal’s market presence and customer service.

EARLIER IN the summer, Secure Logiq announced the promotion of Ben Yoxall to commercial director. Ben joined Secure Logiq in 2018 as the UK sales director and quickly advanced to global sales director in 2022 when he was appointed to the Board of Directors. Over the past six years, Ben has played a pivotal role in driving the company’s sales strategy, expanding the customer base and fostering strong relationships with key stakeholders.

In his new role, Ben will expand his responsibilities beyond the day-to-day management of the Sales and Design teams to include elements of operations, legal, finance, and all commercial activities. His extensive industry knowledge and strategic mindset will be invaluable as he leads Secure Logiq into its next phase of growth.

NIGEL TAYLOR

MUL-T-LOCK UK, part of the Assa Abloy group, recently announced the appointment of Nigel Taylor as the new director and head of Locksmiths UKI – Commercial Group.

Nigel brings a wealth of experience from the industry having held prominent roles at companies such as Chubb, Marcus (ISEO), and Hoppe. His career journey includes his tenure as sales director at Exidor, where he played a pivotal role in driving sales and expanding market presence following the acquisition of Exidor by Assa Abloy.

In his new role, Nigel will oversee operations to ensure customers have access to not only Mul-T-Lock’s products but also to a broader range of brands and product lines offered by Assa Abloy.

JAMES BUCKLE & LOREDANA SCIARAFFA

THE KEY Safe Company recently announced two appointments with group sales director James Buckle joining to orchestrate expansions plans overseas and Loredana Sciaraffa hired as EU business development manager with a focus on growing the brand’s footprint in Europe.

After spending more than eight years in the Army, including operational tours in Afghanistan and Sierra Leone, James entered the business world in the

defence sector focusing on international trade.

Since 2004, James has travelled to more than 70 countries, conducting business in most.

Loredana, the company’s first internationally focussed sales professional has held posts as a product manager, clients support manager and even worked as a victim support manager for the police.

PRODUCT TEST

DNAKE S617 door station (with H618 indoor monitor)

The Dnake S617 door station includes a portrait mode 8” capacitive touch screen for user input and display using the Android operating system. It uses a 2MP 120° wide angle lens camera with wide dynamic range capability and automatic lighting support. It is IP65 environmental and IK08 impact rated.

Access can be granted using Card, PIN code, Bluetooth, facial recognition technology or remote connection. Its user display screen resolution is 1280 x 800 pixels. Three output relays are available for door lock control.

The door station was supplied with an H618 indoor monitor, a 10.1” touch-screen LCD that can support up to 16 IP cameras. This also has a 1280 x 800-pixel resolution with ethernet and Wi-Fi connectivity.

As a system these devices can be configured as a one-to-one standalone entry, or up to 9 door stations and in excess of 9000 indoor viewers can be

installations. Up to 20,000 users, 20,000 faces, and 60,000 cards can be stored with 500 unlock logs being recorded.

Both devices support SIP 2.0 (Session Initiation Protocol) for VoIP communication.

GETTING STARTED

Both devices can be PoE or 12v DC supplied, with the door station requiring PoE+ 16W operating power (8W standby) and the indoor display 10W (3W standby). In use these gave actual PoE readings of up to 12W on loading, 8.5W on display and ~6.5W on standby; the indoor unit read ~9.9W on loading followed by approximately 4.5W in use and 1.8W on standby.

Dimensions of the flush mounted door station are 140 x 300 x 38mm and

WHAT’S IN THE BOXES?

• Door station

• Cable locking plate

• Wall fixings

• Misc. fittings and diodes

• Quick Start Guide

• Indoor viewer

• Wall mounting bracket

• Connection cables

• 8 x Diodes

• Quick Start Guide

for the indoor viewer, 265 x 160 x 22 mm, although the rear mounted RJ45 connector must be taken into account. At the rear of the door station are two twelve-way push-fit connectors either side of the RJ45 PoE network connector. The left-hand connector provides for 12v input, Ground, Weigand D0 and D1, then four inputs with associated ground connections. The right-hand connectors are for three relay outputs consisting of normally open and closed with associate commons and then an RS485 pair for serial communications.

THE DOOR STATION WILL NORMALLY WAKE FROM STANDBY ON APPROACH AND WILL ATTEMPT TO IDENTIFY THE FACE OF A SUBJECT IN ITS MAIN FIELD OF VIEW

A VERY STYLISH DOOR ENTRY SYSTEM WITH ENORMOUS FLEXIBILITY AND OPTIONS FOR INTEGRATION WITH SECURITY AND HOME AUTOMATION APPLICATIONS

stationforperimeterdoorreleaseArear

With the relay connectors of the device being on the insecure side of the building, care must be taken if using the door ifidlA

station for perimeter door release. A rearmounted tamper switch can be enabled to create an alarm if the unit is compromised.

Both devices had DHCP on by default so could be found on the target network and the door station connected to the indoor viewer, though these may have been preconfigured prior to the testing.

Time and date are likely to be configured for Beijing time (GMT +8) so must be set on both devices. NTP is on by default and this service can be changed to suit the installation.

OPERATION

The door station has an illuminated card reader just below the display area, the screen wakes when approached and starts the facial recognition process if enabled; the camera view is shown so you can position correctly for identification. Alternatively, a home symbol in the top left can be selected to display the home screen. This presents options to select Call, PIN, Face or Contacts list. Access to the configuration commands is by using the PIN entry keypad and entering the default engineer code followed by the # key. This then has four icons for Device, Network, Version, and Other settings. “Other” allows a device Reboot or Factory reset.

Approaching or touching any part of the indoor viewer screen wakes up the system and gives access to its selection icons. These are for Call, Doors, Message, and Quad Splitter (for optional camera display). Swiping left from the home screen shows a second page of icons for Call, Doors, Quad Splitter, Phonebook, Message, DND, QR Code, Security, Concierge, Elevator, SOS, and Settings. Detailed settings require the passcode to be entered for access to additional menus for Network, Wi-Fi, SIP and Passcode management.

On connection to the door station the internal microphone is muted until selected. Three door symbols allow either of the door relays to be momentarily opened.

All necessary time durations and volume levels are readily configurable. Although stated as a password to access both devices, these require a numeric code and there is no forced entry of a secure code. It is down to the installer to ensure that a suitable passcode is created in place of the simple 6-digit default.

A camera is included in the top right corner of the viewer but not required for door entry use. This can be used by other Android applications if required, but from a security perspective should perhaps be covered if used in a domestic or secure setting.

BROWSER MENU OPTIONS

In addition to the device home screen selection capabilities, the devices both have browser configuration support. Connecting to the door station web server provides access to the system settings as follows:

General: Information, Basic, Time, Password, System.

Intercom: Device, Network, Ring Group, Phonebook, Call Logs.

Access: Access Control, Person, Unlock Logs.

Advanced: Video, More.

The indoor station has a similar appearance to the door station but slightly different options:

General: Information, Basic, Time, Password, System.

Intercom: Device, Network, SIP, Call, Phonebook, Call Logs.

Security: Zone, Scene.

Advanced: Video, Relay, More.

User and card details can be added to the system along with access rights to the relevant building and areas as appropriate to the scheme.

PERFORMANCE

The door station will normally wake from standby on approach and will attempt to identify the face of a subject in its main field of view. An anti-spoofing algorithm is used to protect against static images and videos being used to try and trick the recognition process. Accuracy is stated as >99%.

Alternatively, the screen can be used to enter a PIN, present a card or suitably enabled device to the reader area. If access is denied, a large “X” symbol and Access Denied message is displayed along with a warning tone, otherwise a “Welcome!”

message and large green tick is displayed with a short audio chime.

In addition to the S617’s hardware commands, it can also be accessed with the Dnake Smart Pro app (Android or iOS) for remote user management of the system. Also, the Dnake Cloud service can be used for remote system management of multiple sites, buildings, locations, and intercom devices.

The S617 door station has multiple methods to unlock, including facial recognition, PIN code, IC (13.56MHz) & ID (125kHz) cards, App, Bluetooth, QR code, landline, Apple Watch. Scheduled access codes or devices can be added and remotely managed for convenience. Users of the app can be alerted to site activity.

CONCLUSION

A very stylish door entry system with enormous flexibility and options for integration with security and home automation applications.

SECURITY ON SOCIAL MEDIA

A look at what’s been happening on PSI’s Instagram feed this month (apart from all the sport...)

@psimagazine

Introducing the new premium line of CCTV cameras from Serage, designed for top-tier security in any environment. These cameras feature advanced capabilities to meet diverse surveillance needs.

Our C-Colour cameras deliver full-colour images even in extremely low light, ensuring around-the-clock detail integration into existing setups.

For specialised use, Thermal cameras detect heat signatures, ideal for night surveillance or areas with smoke or fog. With Serage’s premium range, enjoy unmatched versatility and security.

Serage is a leading brand in the security and surveillance industry, renowned for its commitment to innovation, reliability, and high-quality products. With years of experience, Serage has built a strong reputation for delivering cutting-edge security solutions that cater to a diverse range of industries, from small businesses to large-scale enterprises.

Our comprehensive product line includes state-of-the-art CCTV cameras, video recorders, and intelligent surveillance features, all designed to ensure maximum protection and peace of mind.

At Serage, we prioritise customer satisfaction by experts, Serage continues to push the boundaries of security technology, ensuring our clients receive the best in safety, performance, and innovation.

EDITOR’S CHOICE

The security industry is busy and complex, so it’s easy to miss new products and services as they get lost in day-to-day activities. Here are a few recent launches that caught our eye.

Digital communicator for smart upgrade

OPTEX HAS announced the launch of Olarm MAX – a Graded Dual-Path (DP) digital communicator that can be installed alongside new and existing alarm panels to enable “smart” functionality. Coming at a time when the old Public Switch Telephone Network (PSTN) is being phased out, and users will be obliged to switch to a digital communicator, Olarm MAX provides an

Updated rapid deployment surveillance

VEMOTION INTERACTIVE has launched a new version of its Polecam rapid deployment camera. Featuring an onboard HD camera with 23x Optical Zoom, and full 360-degree PTZ with continuous rotation, the new Polecam transmits 2 x full HD video streams, with the power to view two scenes of view at the same time. This, for instance, could enable system operators to monitor a specific area of interest within a camera scene, at the same time as viewing a wider situational overview.

Alternatively, a live scene can be viewed at the same time as rewinding, pausing or viewing a previously recorded scene from the same Polecam. With its on-board storage, video from the new Polecam can be transmitted via any mobile network/SIM card. This enables not only instant deployment and easy set up, but maximum flexibility in the choice of SIM cost and signal strength in the area the camera is to be deployed. vemotion.com

50m long range corridor PIR

TEXECOM HAS announced the launch of the Capture LR50, a 50m long range corridor PIR motion detector designed to deliver security coverage for long and narrow spaces.

upgrade solution that enables technologies to be managed remotely via the Olarm app.

Compliant with industry standards, including features such as LoRaWAN protocol for low power, wide area networks, WiFi and dual sim connectivity, it has a variety of security features built in, such as tamper protection and critical failure notification. optex-europe.com

The Capture LR50 is engineered for environments

area. This makes it ideal for applications including residential homes, commercial offices, retail spaces, warehouses, and educational institutions.

Key features include a quad element pyro

for environments where standard motion detectors may fall short. Whether securing a residential hallway, a commercial corridor, or a narrow warehouse aisle, the Capture LR50 provides protection with its 50m x 2m coverage

a element pyro sensor, wireless option with Ricochet mesh technology and versatile mounting options to suit various installation needs and environments. texe.com

Wireless alarm links up to 20 units

CHECKFIRE HAS launched the Commander Wireless Site Alarm, the latest addition to its Commander Site Alarm range. The new wireless unit, model number EE-AL-002-SIT, offers enhanced connectivity allowing up to 20 units to be linked within a 100-metre range in open air, depending on the environment in which the alarms are installed.

The alarm features a 105dB siren and a flashing LED strobe, ensuring alerts are heard and seen even in the noisiest and most challenging environments. Manufactured from ABS plastic, the alarm

is both tough and waterresistant, making it suitable for use in various settings, including construction sites, holiday parks, outdoor events, and festivals. checkfire.co.uk

Compact solid-state drive AI recorder

HANWHA VISION has released the XRN-426S1T recorder, a compact NVR with an built-in 1TB solid-state drive (SSD). The 4-channel recorder supports AI search, when integrated with Hanwha Vision AI cameras, as well as resolutions of up to 4K.

The recorder’s compact size of 20cm

by 14cm means it is versatile in its applications. The XRN-426S-1T is particularly well suited to more confined spaces being up to 50% smaller than comparative 4-channel models and it offers features such as AI search, video playback and export, and event rule management. hanwhavision.eu

Hybrid panel with connection flexibility

JOHNSON CONTROLS has introduced IQ Pro, its new hybrid panel. IQ Pro supports PowerG’s sensor technology along with a portfolio of life safety and security devices. It also supports traditional hardwired sensors as well as addressable sensors on loop based on JCI’s MX technology.

IQ Pro provides installers the flexibility to connect over

Black detectors available in three options

APOLLO FIRE Detectors has introduced the Reach Black range to its hybrid wireless family.

Reach Black is being released with three detector types: optical with a dual-optical chamber; heat with a selectable A1R & BS mode; and a multi-sensor combining the dual-optical chamber with an A1R heat sensor. All options come in a device measuring 110mm wide and 70mm deep.

Audio visual additions include a sounder or sounder VAD base. The new VAD base offers up to a C-3-15 coverage with the white flash and C-3-10 with the red flash version, and both have the ability to operate standalone, or in conjunction with

Wi-Fi or Ethernet, while simultaneously communicating via LTE. Additional features include IQ Installer Interface for easy installation, addressable loops, and capacity for eight partitions, more than 100 zones, and more than 1,000 users. johnsoncontrols.com/ security

SURE ABOUT INSURANCE?

If you own or run an installation business, how do you know that your insurance policy is the right one for you? Mark Gilbert, MD at Alarminsure, talks to PSi about buying cover

“Do you need some good advice?” might sound like a daft question to ask, but if you buy your insurance online or direct from the insurer you might not be getting any advice about how suitable your insurance is for you.

Many people now turn to the internet to buy insurance, this could be for their car, home, holiday or pet but more and more people are also buying their business insurance online. This can often be quick and feel stress-free; however, the onus then is on the buyer to understand what they are buying and if it is suitable to provide them with the right cover.

Disaster strikes when it comes to making a claim and you find out that you haven’t got the cover you thought you had and you’re left with a big bill to pay, one that you weren’t expecting that can have a severe impact on your cash flow. For example, it is common to think that you have cover for a security system that fails to perform as intended, this is more often not the case as efficacy insurance (with failure to perform cover) is generally not included in a standard insurance policy. Alarminsure are one of the only insurance providers to include this cover as standard on every policy.

If you go direct to an insurer to buy insurance online, be mindful that the sales teams could be selling on a nonadvised basis and can only give you very limited information for you to decide on.

If you are in any doubt as to what cover you need or have a business that needs more specialised cover then you probably

need advice, and to get this advice you need to talk to an insurance broker (making sure they can give advice, not all do). At Alarminsure, for example, all our policies are sold on an advised basis.

ADVISED AND NON-ADVISED INSURANCE

An advised sale includes the broker:

• explaining why the particular product or provider would be suitable based on the information you give them about your business.

• recommending a specific insurance policy(ies) to you that match your needs.

In non-advised sales, the insurer or broker do not make any personal recommendation, and it is up to you, the customer to decide if you want to buy the insurance. It is important to say that you will still receive enough information to enable you to make an informed decision as to whether the insurance is right for you.

WHY IS THIS IMPORTANT?

This is important because if you are not getting any advice you can find yourself in a position where you need to decide if the insurance is suitable and this can mean reading the policy wording, understanding it and making sure that, in

the event of a claim, the policy would pay - this could leave most people wanting to lie down in a dark room. People who enjoy reading insurance policies are rare to find! The alternative is to find an insurance broker who can give you the advice you need.

DO I NEED ADVICE WHEN BUYING INSURANCE?

This is something to seriously consider; by getting the advice you need from a broker you are tapping into their expertise to assess your needs and find the right insurance for you, usually from a range of insurers and present these back to you with enough information to help you decide on the best cover and explaining to you what it does and doesn’t cover.

Your broker is also on hand throughout the lifetime of the policy if things change and, in the event, you have to make a claim, this can be a very useful extension to your business as these things can take up a lot of time, having someone with experience can be invaluable.

DISASTER STRIKES WHEN IT COMES TO MAKING A CLAIM AND YOU FIND OUT THAT YOU HAVEN’T GOT THE COVER YOU THOUGHT YOU HAD

DO YOU HAVE LEGACY ISSUES?

Jonathan

Rickard, i-PRO sales engineer, talks to PSi about the hidden costs of maintaining legacy security systems

In today’s evolving interconnected digital landscape, the importance of robust and current security systems cannot be overstated. However, many organisations continue to rely on outdated security networks, often underestimating the risks and costs associated with maintaining legacy systems.

Out in the field, we frequently discover systems that have not been supported for some time. They often get noticed when a new camera is installed and there are compatibility issues with the original hardware, software, or VMS.

In a lot of cases this reliance on older technology is a simple matter of costs –frankly, it is a major capital expense to rip out and replace legacy systems. Equally, updating the software that controls the hardware is also expensive, as is the

updating of network infrastructure.

As budgets are squeezed, customers may try to save money by cutting back or cancelling scheduled maintenance as well. It may be moved in-house where staff lack the skills to perform necessary tasks. Furthermore, it may well be an additional responsibility on top of their day-to-day operations.

If the system is working, a simple record and playback check may seem adequate, but this is a false economy as there may be underlying issues. If issues

are not addressed, they will eventually lead to poor reliability and failure of the entire system. However, there are equally strong arguments as to the inherent risks of maintaining an old network.

Running a legacy security network is not just a financial burden, but also a potential risk to organisational safety and compliance.

CYBERATTACK VULNERABILITY

One of the most significant risks associated with legacy security systems

“OUT IN THE FIELD, WE FREQUENTLY DISCOVER SYSTEMS THAT HAVE NOT BEEN SUPPORTED FOR SOME TIME. THEY OFTEN GET NOTICED WHEN A NEW CAMERA IS INSTALLED”

is their vulnerability to cyberattacks. Outdated systems often lack the latest software patches and updates, making them easy targets for hackers. These cybercriminals can exploit the vulnerabilities in such systems to gain unauthorised access, disable critical security features, or even manipulate video feeds.

Older products may contain default login credentials applied by the manufacturer during production. If these are not changed during installation or at some point in the network’s lifecycle, the integrity of the system could be compromised and exposed to cyber risk.

To put this in context, recovering from a ransomware attack in October 2020 was reported to have cost Hackney Council £12 million.

As cyber threats continue to evolve, legacy networks are increasingly exposed to potentially devastating breaches.

POOR IMAGE QUALITY

Simply put, legacy security cameras often have lower resolution and outdated imaging technology, and therefore provide inferior image quality when compared to modern alternatives. This can be a critical flaw, as it hinders

the ability of security staff to accurately identify individuals, pick up certain objects, or distinguish exactly what is happening in an incident.

Having a modern camera with WDR and high, clear resolution plus features such as Object Detection can make an enormous difference. In a security scenario where every detail matters, having outdated cameras can severely diminish the overall effectiveness of the entire surveillance system, making it difficult to respond appropriately to security events.

INCOMPATIBILITY WITH MODERN SYSTEMS

Another legacy tech challenge is incompatibility with modern systems. Older hardware doesn’t often integrate well with newer network components or software, resulting in operational inefficiencies that can lead to

unaccounted-for tech downtime. This lack of compatibility can lead to gaps in security coverage, reducing the overall effectiveness of the network.

Consider as well that a modern VMS can often bring a host of advanced features to an integrated network, but all that extra power is useless if the devices at the edge don’t have the capacity to perform as the system demands or worse – the system simply switches off.

Actual failure of a system often occurs at the worst possible moment when stakeholders are trying to investigate an incident and realise the recorded footage is not available. At this point in time, it is often too late, which leaves the company in a difficult position.

As security needs evolve, the inability to properly integrate and streamline operations will create significant risks and inefficiencies, and result in a security network that is being left behind.

“MAINTAINING AN OUTDATED SECURITY NETWORK CAN ALSO BE SURPRISINGLY COSTLY. OLDER HARDWARE IS MORE PRONE TO BREAKDOWNS AND OFTEN REQUIRES

HIGHER MAINTENANCE COSTS

Maintaining an outdated security network can also be surprisingly costly. Older hardware is more prone to breakdowns and often requires frequent repairs or replacements. Sourcing parts or finding technicians familiar with obsolete systems can be difficult and expensive. These ongoing maintenance costs can quickly add up, turning a cost-saving measure into a significant financial burden. This false economy adds up over time, to the point where an older system is costing more to maintain than it is worth.

In a recent McKinsey survey, CIOs reported that 10% to 20% of the technology budget dedicated to new products is diverted to resolving issues related to tech debt. Worse still, CIOs estimated that tech debt amounts to 20% to 40% of the value of their entire technology estate before depreciation.

LIMITED SCALABILITY

As a company grows, their security needs evolve. This will eventually mean the expansion of their network. However, legacy systems can be a major obstacle here as well. Outdated equipment may not support newer technologies so adding additional devices can be tricky. Replacing analogue CCTV cameras with new IP cameras means less drilling and electrical work for example, which has an impact on the bottom line.

Keeping outdated devices limits the company’s ability to scale the security network to match the growth of the organisation and equally limits potential business opportunities.

REGULATORY AND COMPLIANCE RISKS

In many industries, there are nowadays strict regulations regarding security and data protection. Outdated security networks often fail to meet current standards, putting a company at risk of non-compliance.

This can result in severe fines, legal penalties, and reputational damage. By relying on legacy systems, people not only risk falling short of regulatory requirements but also jeopardise the safety and privacy of the data they are tasked with protecting.

Reviewing and changing credentials after a certain time should be part of the overall site security and GDPR policy.

LACK OF FEATURES

While this one may seem obvious, new cameras have a host of options available that enhance their functionality. For example, with AI now incorporated into a

“WHILE IT MIGHT BE TEMPTING TO CONTINUE USING LEGACY SECURITY SYSTEMS TO AVOID THE IMMEDIATE COSTS OF UPGRADING, THE RISKS AND LONG-TERM EXPENSES FAR OUTWEIGH THE SHORT-TERM SAVINGS”

camera it is possible to perform advanced security functions ‘at the edge’, such as missing object detection, automated alerts and detecting anomalous behaviours. Older systems are static and require a high degree of human intervention to monitor situations. As such, they are heavily reliant on the vigilance of those watching in the SOC.

A recent study by The Access Group concluded that UK companies waste up to three hours per day working with inefficient systems, but, over time, adds up to a considerable amount of money.

With a modern camera capable of being programmed to ‘learn’ its environment and respond to certain stimuli, a lot of the manual heavy lifting is removed.

The question remains though, how does the industry respond to this situation? From a vendor’s point of view, it makes sense to design systems that can be integrated with legacy systems so that customers can phase out older technology gradually, rather than rip it all out at once and deal with the major capital expense.

It also makes sense to have a clear value proposition and be able to explain to a customer that a modern system – with all

its increases in functionality – can become an operational revenue generator, by giving a lot back to the enterprise in terms of data analysis, increased efficiency and heightened security.

Installers have the capacity to be that trusted advisor to their clients and proactively point out inefficiencies with older systems when they are called upon to perform maintenance and suggest the time-and-cost savings possible with more efficient modern systems.

While it might be tempting to continue using legacy security systems to avoid the immediate costs of upgrading, the risks and long-term expenses far outweigh the short-term savings. Vulnerabilities to cyberattacks, poor image quality, incompatibility with modern systems, higher maintenance costs, limited scalability, and compliance risks all combine to make running an outdated security network a risky and costly proposition.

New UltraHD NVR

ResolutionUp to 12MP

Channels4, 8, 16 & 32ch NVRs available

AI FunctionsFace Recognition, ANPR and much more

Operating SystemLinux embedded Alarms Hardwired inputs & outputs

Centrally

THE CLEAR BENEFITS OF CLOUD

What is cloud security and how can it benefit you and your customers? PSi met up with Karen Uppal of installer ecl-ips to find out

In the modern age of security, cloudbased systems are transforming how businesses and individuals monitor their premises. These advanced solutions leverage cloud storage to offer scalable, flexible, and remotely accessible options for enhancing security measures.

Here, Karen explains the technology behind cloud security solutions and its benefits.

WHAT IS CLOUD-BASED CCTV?

By integrating with the Internet of Things (IoT), cloud CCTV provides realtime data and analytics, making it easier than ever to oversee operations and respond swiftly to incidents. Cloudbased CCTV is a surveillance camera system with remote server storage for camera footage. This means that unlike

traditional CCTV systems users do not need to purchase or maintain the conventional storage hardware, such as network video recorders (NVRs) on site. Upgrades to the video surveillance management software are provided automatically via the cloud ensuring users always have the latest capabilities of the system.

CCTV with cloud storage works by using the latest cameras or cloud connectors to stream footage using the internet. Some security cameras will stream the footage directly to the

cloud but this could take up a lot of bandwidth so users may need to increase the number of ports on the network and could lose footage if your internet connection fails.

Hybrid security cameras, like Avigilon Ava cameras, have built-in camera storage but then back up the recorded footage to the cloud. Users only need to stream footage and take up bandwidth on the network if reviewing events on the surveillance system. If the internet connection is disrupted, footage is not lost as it is being stored on the security

THE VIEWS FROM CCTV CAMERAS ARE AVAILABLE ANYWHERE AND AT ANY TIME FROM ANY MOBILE DEVICE WITH AN

3 reasons Installers are switching to Eaton

Free Remote Servicing

• Free to Eaton registered installers and their customers.

• Backed up by a world-leading Cyber Secure infrastructure.

• Free tools including Estate Management, Remote Servicing and an end-user app.

Free Cloud Connectivity –Out of the box

• All our cloud-enabled panels come with a built-in ethernet port.

• Connect to a router and take advantage of the free SecureConnect Installer tools.

• Wi-Fi or 4G plug-in modules offer additional flexibility and are set up in seconds with WPS.

Free High Street Vouchers

• Earn points for panels.

• Eaton Installers enjoy MyScantronic points, inside the box of our best selling panels and kits.

• Convert to high street vouchers.

surveillance footage into fast answers, empowering security operators.

WHAT IS CLOUD-BASED ACCESS CONTROL?

Adopting cloud-based access control means users can manage doors and gates remotely via an internet-connected device. Additionally, everything from employee credentials to relevant access information is stored entirely digitally, making it less susceptible to corruption or physical damage.

Cloud access control is often adopted by businesses with a high number of employees as it can be scaled up easily. It offers a quick and efficient means of editing door schedules and distributing access permissions on the go from a single software device. Users can also manage their entire database from any web browser, on any device, wherever they are.

BENEFITS OF CLOUD-BASED ACCESS CONTROL

Like with CCTV, the benefits of cloudbased access control systems come from the ease of scalability and of the control of multiple sites. Administering the system is straightforward allowing users to add and remove access credentials entirely through their digital platforms. Additionally, organisations can save costs due to automatic system-wide updates. Other key features of cloudbased access control are instant access alerts and warnings and live occupancy monitoring.

FURTHER CLOUD-BASED SECURITY OPTIONS

Intruder alarm systems can now be linked to a dedicated control app on a smart device. This allows for remote management and control of the system, including being able to set and unset the alarm. Additionally, cloud-based intruder alarm systems mean installers can maintain and support organisations remotely reducing the need for costly on-site visits.

Smart sensors can provide monitoring in areas where privacy is a concern, such as hotel guest rooms or changing rooms. When installed with CCTV there are features, such as abnormal noise detection, that can support security. It is easier to manage a large number of these devices if they are connected to the cloud.

ENSURING CLOUD DATA SECURITY

Whatever cloud service is being used, ensuring data is kept secure is very important. The video analytics platform

that operators use is a software as a service (SaaS). The UK’s National Cyber Security Centre recommends using SaaS cloud providers because then users can delegate responsibility for cybersecurity to them and they also gain the security benefits of the provider working at scale.

The National Cyber Security Centre has developed 14 principles for those considering a cloud-based service to help them choose a provider. This includes aspects such as ensuring data is adequately protected against tampering and eavesdropping as it transits networks inside and external to the cloud. Assets stored should also be protected against physical tampering. Protections should include meeting data protection laws and undertaking mitigations such as encryption, data centre security, secure erasure and service resilience. Cloud services should also be designed, developed and deployed in a way that minimises and mitigates threats to their security.

When selecting a cloud security provider, it is essential that data is transferred with end-to-end encryption,

two-factor authentication is used to access systems and that automatic updates will be sent as required to protect the system. Additionally, it is important to install a fully compliant cloud storage system to be certain data privacy is always maintained. By storing the footage in the cloud, users should then have a robust backup for video recordings. These systems then remove the risk of physical threats associated with an onsite NVR and local camera storage.

The delivery of cloud security may be via a managed service provider (MSP) that will handle the service on behalf of the end user. To ensure the system is maintained the MSP will need to have privileged access to the service so that they can support the client properly.

LOOKING TO THE FUTURE OF SECURITY

Those looking to future proof security systems should examine the cloud options available in order to ensure reliability in the long-term, as well as providing the benefits now in terms of flexibility and scalability.

THOSE LOOKING TO FUTURE PROOF SECURITY SYSTEMS SHOULD EXAMINE THE CLOUD OPTIONS AVAILABLE IN ORDER TO ENSURE RELIABILITY IN THE LONG-TERM

Empowering Installers, Unmatched in Durability.

The new LOGOS monitors are designed to streamline door entry system upgrades. With the integration of NFC technology and the MyComelit app,

can now complete programming swiftly, even with the monitor still in its packaging. This streamlined approach eliminates complexities, ensuring a hassle-free setup experience. Crafted for durability, these monitors withstand daily wear and tear, maintaining peak performance and reliability over time, even with heavy usage. Say goodbye to worries about accidental damage.

Tactile markings using the MyComelit app on a smartphone, even when the monitor Program the monitor via NFC technology

with tactile and audible feedback.

Micromechanical buttons for visually impaired users.

Magnetic handset hook

to avoid accidental dropping.

UNIVERSAL ENCLOSURE RANGE

Compatible

With any third-party device, including control boards, communicators and modules.

Ease of installation

Third-party devices easily installed without drilling holes; all fixings supplied.

UNIVERSAL-1224-L

Selectable 12V, 8A /24V, 4A, PSU in large tampered enclosure with universal backplate

A flexible equipment enclosure with ease of fitting third-party modules such as control boards and communicators without the need for precision drilling.

Tamper-Proof

Provided with front and rear tampers as standard.

Versatile

Available in medium and large variants to accommodate a range of device sizes (or multiple devices).

UNIVERSAL-ENC-L

Large tampered enclosure with universal backplate

UNIVERSAL-ENC-M

Medium tampered enclosure with universal backplate

SAFEGUARDING SECURITY SYSTEMS

How concerned should you be about the security of today’s electronic security systems and who is ultimately responsible for managing best practices after installation? We asked the PSi Panel for any tips on how installers can encourage end users to be vigilant.

Ric Martin – Pinnacle Systems

As the industry evolves rapidly towards IP connectivity, cloud-based systems, apps, and Wi-Fi technologies, there is growing concern regarding the security of today’s electronic security systems.

These technologies may offer increased functionality, flexibility, remote management and convenience, but they also present new challenges in terms of cybersecurity vulnerabilities. We believe the responsibility for managing best practices after installation does not lie solely with one party, but is shared among manufacturers, installers, and end-users alike.

Training, awareness, and understanding of the problem are absolutely key. Installers must stay informed and continuously update their knowledge of the latest threats and countermeasures in electronic security systems. This ensures they are well-equipped to be confident in setting up robust and resilient solutions.

Equally, end-users must be educated on the importance of vigilance in maintaining their security infrastructure. End users must be aware of the risks and take proactive steps such as regularly updating passwords, applying firmware updates, and monitoring system logs.

Balancing security against practical use is an ongoing challenge, and everyone will have different views on where that balance lies depending on their specific scenarios and past experiences.

For some, heightened security protocols may be prioritised, while others may favour usability and convenience. Installers must work closely with their clients to ensure they strike the right balance, customising solutions to match the unique needs of each environment.

Tips for installers include encouraging clients to adopt multi-factor authentication, implementing network segmentation to limit unauthorised access, and promoting regular system audits.

Encouraging an ongoing dialogue with clients ensures they remain vigilant and aware of potential security risks, making them active participants in securing their systems long after installation is complete. By creating and continuing to manage this partnership and open a line of communication through the supply chain, security can evolve to meet the demands of an increasingly connected world.

Jamie Allam –Amthal Group Companies

The adoption of IP connectivity, cloud services, mobile apps, and Wi-Fi technologies in electronic security systems is undoubtedly transforming the industry at a rapid pace.

These advancements offer real-time flexibility, remote monitoring, and seamless integration capabilities, making security systems across many sectors more instant, efficient and accessible, especially in the realm of remote

management and monitoring.

But as with any technological leap, these benefits come with significant security concerns that must be carefully identified to protect against emerging threats.

We are aware of the increased risks that come with interconnectivity, including a larger attack surface and greater complexity in system management. Security systems now interact with a variety of networks and devices, creating multiple potential points of vulnerability

Ensuring the security of these systems is a shared responsibility between installers, end users and cloud service

Installers and integrators have the critical role of configuring systems securely from the start, using strong passwords, encryption, and secure communication protocols. They must educate end users on the importance of ongoing maintenance, such as updating firmware and monitoring for suspicious activity.

End users must take an active role in maintaining security after installation. This

Chris Carroll & Stephen Wragg – Comelit-PAC

In today’s digital landscape, where IP connectivity, cloud technologies, and Wi-Fi are becoming standard, safeguarding electronic security systems is crucial. These may provide enhanced functionality but also introduce new potential vulnerabilities that must be addressed with diligent security and planned practices.

A critical element of maintaining security is ensuring a reliable and protected server. Essential practices include creating strong, unique passwords, generating SSH key pairs for secure communication, and keeping the server updated with the latest patches to protect against vulnerabilities.

Implementing firewalls helps block unauthorised access while using Linux as a web server operating system can add an extra layer of security. Limiting superuser or root access, utilising VPNs and private networks for secure remote connections, and deploying a multiserver environment

for added resilience are also important measures.

Installers should choose manufacturers that offer server-based solutions incorporating these security features. It’s also advisable to encourage clients to sign maintenance agreements that include regular health checks and back-end security assessments.

Advising clients to share passwords only with authorised individuals and setting up guest networks where applicable can further mitigate risks. For example, clients should be made higher risks with public compared to

includes keeping systems up-to-date, regularly reviewing security settings, and collaborating with installers to address potential vulnerabilities.

Cloud service providers must secure the infrastructure and data, as their practices significantly impact the overall security of the system. To help maintain robust security for modern day, often complex systems, we recommend the following for installers:

Secure defaults: Configure solutions with strong security settings from the outset, including robust passwords and encryption.

Regular updates: Emphasise the importance of keeping firmware and software up-to-date to protect against emerging threats.

User education: Provide thorough training on security best practices, highlighting the need for ongoing vigilance.

We advise to maintain regular communication with end users, offer security audits, and creating a culture where security is an ongoing priority. Encouraging users to think of security as an ongoing process, not just a one-time setup. By working in this way together, we can keep electronic security systems resilient against evolving threats.

The responsibility for managing ongoing security lies with the client, but we have a duty of care and responsibility as an industry to educate and ensure an understanding of the need to be vigilant. Installers should guide clients through best practices and stress the importance of a comprehensive maintenance contract that includes routine security checks and updates.

With the increasing reliance on internetconnected devices, selecting systems that offer robust protection is essential. Proprietary cloud services offer high reliability with built-in redundancy, enhanced security through encryption and threat detection, and compliance with regulations like GDPR. Such systems also provide flexible access control, ensuring the appropriate individuals manage the relevant system areas efficiently.

The increasing adoption of IP connectivity, cloud, apps and Wi-Fi technologies presents varying concerns around security vulnerabilities. These technologies move quickly, and the knowledge gap in the industry means many individuals may struggle to keep up with evolving threats.

Responsibility for managing best practices after installation is shared.

Manufacturers must stay proactive by releasing regular firmware updates, conducting vulnerability and penetration tests, and following industry best practices. This includes keeping up with emerging legislation, such as the Cyber Resilience Act and the PSTI Act of 2024.

Manufacturers should focus on educating users, partners and installers through platforms like cyber security compliance training programmes.

The more knowledge that can be shared, the better equipped everyone will be at maintaining security and responding to new risks.

At Abloy, we’ve prioritised this approach by ensuring our solutions are meeting high standards, such as receiving the Secure Connected Device accreditation from Secured by Design for our digital key system.

These days, installers play a big role in maintaining solutions post-

installation. Unlike 20 years ago, the role now involves ongoing updates and communication with customers to ensure firmware is current and the system remains secure. Ongoing education for installers is key – initial product training isn’t enough as products and threats evolve quickly.

My tip for installers would be to stay informed about updates and encourage end users to do the same. Help them sign up for newsletters, educate them about the importance of firmware updates, and ensure they understand the balance between software features and physical security. After all, it is important to consider how the solution will perform in the type of environment that it’s in.

For end users, building long-term relationships with manufacturers and installers is essential in staying vigilant ensures they stay vigilant and informed about updates and security patches.

Dave Tate – Ajax Systems

The widespread use of internet connectivity in security systems caused several risks, including exposure to hacking and cyberattacks due to users’ failure to follow digital hygiene practices. It also includes network unreliability when the system’s functionality relies on internet connectivity and concerns about data privacy.

The most common issue is susceptibility to hacking, as users often do not pay enough attention to using unique passwords for different accounts and resources, password managers, etc. The installers have to provide valuable assistance by explaining the importance of setting a strong password, using two-factor authentication, and periodically changing the password. It is also crucial to communicate to the end user the necessity of creating a guest Wi-Fi network with restricted access. It should be treated not just as a recommendation but as a rule that must be maintained.

Regarding data privacy, the manufacturer should be responsible for developing tools that allow users without specialised knowledge to limit access to sensitive content, including for the installer. The manufacturer must also allow end users to see what is happening with access to their system, whether it’s a security system, network, or smart home.

These issues can be addressed with an approach we provided to protect the privacy of sensitive data, such as photos from detectors with a photo verification option and video and audio from surveillance cameras. The user can control and block installers’ access to sensitive content; meanwhile, the user doesn’t have access to make any changes in settings that can impact the stability of the security system.

Pip Courcoux – Abloy UK

Ringable, Scalable, Sellable

Open doors like never before. From a single doorbell with no subscription to hundreds of offices or flats.

Door unlock from door monitor or app Easily Integrates into TVT NVRs Key Fob & Key Code Entry No Subscriptions Face Recognition Entry from

Meet the NSI installer

MEET THE NSI INSTALLER

Security life with Sam Jennings of ABCA Systems Group

WHAT ARE YOUR COMPANY’S MAIN BUSINESS ACTIVITIES?

ABCA Systems specialises in the installation, servicing and repair of fire safety and security systems, operating primarily in the social housing market. With nearly 40 years of experience under our belts, our skilled and varied workforce combined with industry accreditations allows us to work across a wide variety of system types in the industry, specialising in active and passive fire safety and electronic security systems.

WHAT EMERGING TECHNOLOGIES DO YOU SEE SHAPING THE FUTURE OF THE INDUSTRY, AND HOW IS YOUR COMPANY ADAPTING TO STAY AHEAD?

As with virtually every industry, artificial intelligence and machine learning are proving to be vital tools in the implementation of security systems. For example, AI-driven facial recognition is becoming more accessible to clients, whilst machine learning offers possibilities for automated analytics of video footage, such as slip and spill detection. We are constantly scanning the market and proactively engaging with both system manufacturers and AI developers, ensuring that we remain at the forefront of emerging technology and are first to identify and implement opportunities to improve the service that we deliver for our clients.

IN WHAT WAYS DOES NSI CERTIFICATION DIFFERENTIATE YOUR COMPANY FROM COMPETITORS AND ENHANCE YOUR CREDIBILITY WITHIN THE INDUSTRY?

NSI certification is imperative in assuring potential customers of our skills and experience in the industry. Customers know that when choosing an NSI certified

organisation like ABCA, the initial step of time consuming due diligence has been carried out for them by NSI, so they can be assured they are appointing a professional and competent organisation for their project.

HOW HAS THE RISE OF SMART/ HOME AUTOMATION TECHNOLOGY INFLUENCED YOUR BUSINESS AND THE SERVICES YOU OFFER?

The rapid advancements in technology have significantly impacted our clients’ needs and expectations, prompting us to evolve the solutions we recommend. The growing demand for integrated systems has necessitated a collaborative, holistic approach in system design, allowing us to create truly bespoke solutions that enable clients to manage their systems from a single, centralised platform. Additionally, the rise of smart technology has introduced automated maintenance for fire safety and security systems, which we have embraced to ensure we consistently provide our clients with the most up-todate and cost-effective solutions.

IN YOUR OPINION, WHAT IS THE MOST COMMON MISCONCEPTION OR MYTH ABOUT THE SECURITY INDUSTRY?

A common misconception is that all security systems are the same. With the increasing availability of consumer products like Ring doorbells and lowend CCTV cameras from platforms such as Amazon, some customers may undervalue the importance of a comprehensive security system for their home or business. While these products can be useful, they are often vulnerable to tampering and reliability issues, falling short in comparison to an integrated security solution tailored specifically to the property’s unique needs.

WE ARE CONSTANTLY SCANNING THE MARKET AND PROACTIVELY ENGAGING WITH BOTH SYSTEM MANUFACTURERS AND AI DEVELOPERS, ENSURING WE REMAIN AT THE FOREFRONT OF EMERGING TECHNOLOGY

Name: Sam Jennings

Job title: Integration Director Time in security/fire: 12 years

Company name: ABCA Systems Group

Location: Newcastle

WHAT DO YOU FIND MOST REWARDING ABOUT WORKING IN THE SECURITY INDUSTRY?

At ABCA, we take great pride in knowing that the work we do directly protects the lives and properties of our customers. It is highly rewarding to understand that the successful completion of each project contributes to our customers’ safety, providing them with the peace of mind that their home or business is secure.

HOW DOES YOUR COMPANY APPROACH THE INTEGRATION OF SECURITY SYSTEMS WITH OTHER BUILDING TECHNOLOGIES, SUCH AS IOT AND CLOUD-BASED PLATFORMS?

With extensive experience in installing and maintaining a wide range of systems in the fire and security industry, ABCA has been a leader in the growing trend of integrated systems. For every new project, we collaborate directly with manufacturers to create tailored solutions that meet our clients’ specific needs. By leveraging cloud-based management platforms, we enable our clients to seamlessly manage multiple systems across their properties from a single, centralised interface.

HOW IS YOUR COMPANY PROACTIVELY PREPARING ITS CUSTOMERS FOR THE UPCOMING PSTN SWITCHOVER TO ALL-IP, AND WHAT STEPS ARE YOU TAKING TO ENSURE A SMOOTH TRANSITION FOR THEM?

To effectively manage this change and avoid disruption, we are taking several key steps, from early customer engagement to upgrading technology and providing ongoing support. The first essential step is to educate and inform customers well in advance of the switchover. Many customers may not fully understand the impact the PSTN switch-off will have on their existing systems, especially those that rely on legacy communication infrastructure. Following this we are undertaking a thorough audit of our customers’ existing systems. This involves evaluating the compatibility of each fire and security system with IP-based networks. Older systems may need upgrading or replacement to function properly in an All-IP environment, and identifying these requirements early is crucial for a smooth transition.

Collaboration with telecommunications providers will also be an essential part of this process. This collaboration can help avoid delays, ensuring that new equipment is installed and configured well before the cut-off date. Coordinating with telecom providers can also facilitate

smoother integration between our customer’s systems and the new IP network.

To ensure the success of these efforts, ABCA will provide our customers with ongoing support and training. As new IP-based systems are installed, it is critical to train customers on how to operate them effectively, ensuring that they are comfortable using the new technology.

Meet the NSI installer

Finally, establishing a clear transition timeline is essential for a structured and well-organised migration process. By developing a phased implementation plan, we can ensure that each customer’s systems are updated well before the PSTN switch-off deadline.

IN LIGHT OF THE CHALLENGE THE INDUSTRY IS FACING IN ATTRACTING SKILLED ENGINEERS, WHAT STRATEGIES OR INITIATIVES DO YOU BELIEVE ARE MOST EFFECTIVE IN ADDRESSING THIS SHORTAGE?

We have consistently prioritised the retention of our valued workforce by investing in their career development and offering genuine opportunities for growth within the company. When additional engineers are needed due to business expansion, we rely on our nationwide apprenticeship program to attract new talent to the industry. This approach enables us to develop skilled engineers in-house, addressing the shortage of qualified professionals in the market.

WHAT HAS BEEN ONE OF THE BEST BUSINESS DECISIONS YOU HAVE EVER MADE?

Originally established as a Time and Attendance system installer in the North East, our successful expansion into nationwide fire and security systems has been a key factor in our business growth.

OUR ONGOING STRATEGIC EXPANSION OF SERVICES HAS BEEN CRUCIAL TO OUR SUCCESS, ENSURING THAT OUR CLIENTS RECEIVE THE HIGHEST LEVEL OF PROTECTION

This development has also enabled us to enter the social housing market, where we now primarily operate. We have maintained this approach by consistently broadening the range of systems we install and maintain, staying at the cutting edge of new technology. Our ongoing strategic expansion of services has been crucial to our success, ensuring that our clients receive the highest level of protection for both their personnel and properties.

IF YOUR STAFF WERE ASKED WHAT MAKES YOUR COMPANY GREAT TO WORK FOR, WHAT DO YOU THINK THE MAJORITY WOULD SAY? We are committed to continuous growth and improvement, both as a business and for each individual team member. We recognise that our people are the foundation of our success, which is why we work to cultivate a positive and supportive environment where employees feel valued and empowered to reach their full potential.

• Reach more customers with a scalable security platform

• Drive customer retention with intelligent software and services

• Save time and money with remote maintenance For more information resideo.com/ProSeriesEMEA

Do you want to target security installers with your next marketing campaign? Here are some handy points to consider:

• PSI is the only UK magazine aimed solely at the installers/integrators of electronic security technology

• PSI is the only UK magazine that carries independent, third-party product testing

• PSI was the first UK security magazine to launch a regular podcast

• PSI interviews NSI Gold approved security installers to promote excellence

• PSI is the host of the Premier Awards, recognising innovation and contribution to the industry

• PSI has targeted advertising campaigns that include print, online, podcasts, e-blasts and social media

• PSI was the first magazine to launch an Open Door programme giving advertisers control over their online presence on the PSI website

From our own research we discovered that:

• Two thirds of PSI readers claim to have been influenced by the magazine when it comes to purchasing decisions

• Almost 40% of installers that read PSI do not regularly read any other UK security magazine

These are just a few of the reasons why PSI (Professional Security Installer) is the best platform for you to promote to security installers. And we didn’t even mention the PSI Golf Day!

OPENING NEW REVENUE STREAMS

For those still thinking about navigating the opportunities presented by cloud, Simon Cook of Genetec outlines the journey and the benefits for integrators

Historically the physical security industry hasn’t been able to get cloud or software as a service quite right. Many approaches have undercut the role of the very channel partners who are central to customer and project success.

Yet, done right, the advent of cloud technology facilitates faster and easier physical security deployments. This signals a new era of opportunity for channel partners who can adapt to the expectations of oranisations who want the option of a hosted solution, either as an alternative or in addition

to their on-premises physical security infrastructure.

THE BEST OF ALL WORLDS

As businesses rationalise their costs, concerns, and approach to migrating to the cloud, hybrid-cloud deployments are gaining traction across the physical security industry. Preliminary data from Novaira Insight’s latest annual report on the market for video surveillance hardware and software shows the rapid pace of this transition to the cloud. It estimates that the market for cloud

video management software will grow by almost 50% in the world, excluding China, in 2023.

According to Josh Woodhouse, lead analyst at Novaira Insights, “Most of these deployments use a hybrid architecture combining a primary tier of local storage with cloud-based video management and system administration.” Hybrid-cloud deployments enable organisations to keep their existing infrastructure and systems and deploy cloud applications in sites or applications where it makes

sense. This allows them to transition to the cloud gradually, at their own pace, without having to rip and replace everything.

Technology should serve as a tool to achieve objectives rather than dictate strategies. Businesses ought to retain full autonomy in deploying their systems across different locations. Rather than being constrained by the limitations of a singular technological approach, deployments should be in line with business goals. With an open ecosystem that allows them to implement solutions based on their needs rather than location (either on-prem or in the cloud), organisations can unify, upgrade, scale,

OFFERING LONG-TERM CONTRACTS FOR HOSTED SERVICES PROVIDES INTEGRATORS WITH A STABLE AND PREDICTABLE MONTHLY RECURRING REVENUE

THAT HELPS COMPLEMENT INCOME FROM PROJECT SALES

and deploy systems faster, streamline processes, and strengthen their cybersecurity in new ways.

For example, businesses with numerous locations need to consider each site’s unique requirements. They might run all their physical security systems on local servers and networks at their headquarters locations. Yet, they might choose a full-cloud deployment for smaller remote sites, while another location might require cloud connectivity with additional storage on site. With a flexible hybrid-cloud deployment, there are always options.

No matter how many systems are running on local servers or connected to the cloud, organisations should be able to bring them all back to a central head end and enjoy a seamless experience where all systems can be accessed from one platform.

EMBRACING TRANSFORMATION FOR GROWTH

As the purchase process and technical integration of on-prem, cloud, and hybrid-cloud systems come together, channel partners need to consider a new approach. Reconfiguring their business models to support subscription services may initially seem daunting, but the benefits can be substantial.

Offering long-term contracts for hosted services provides integrators with a stable and predictable monthly recurring revenue that helps complement income from project sales. Costs associated with customer acquisition and setup are reduced while building ongoing revenue streams. This can give you the freedom to expand your service offering and capture new opportunities by selling new value-added services that go beyond the traditional ways of selling on-prem systems. Visibility into user adoption can allow you to sell more and help users close the consumption gap. Customers remain satisfied and loyal over the long-term, helping you further expand their use of the solution. But you can also cross- or up-sell services such as user training and enablement, system

health monitoring, system integrations to expand your customers’ ecosystem, and more.

Having a solid stable of clients delivering recurring monthly revenue can also increase the valuation of your business. Whether you’re looking for growth financing, planning for the future sale of your business, or looking to reinforce your financial footing, there’s no question that building a new stream of predictable, repeatable, and reliable income offers financial value.

EXTENDING VALUE BEYOND SECURITY

While selling and deploying security systems is essential, the real future opportunities lie in helping to enhance customer operations. Systems integrators can become trusted advisors, offering insights into productivity gains and operational efficiencies. By focusing on customer needs and tailoring services, integrators elevate their role from service providers to strategic partners. No matter how savvy the user, it’s the systems integrators and their trusted software partners who do this work, day in and day out, who have the knowledge and expertise that comes from having built systems that protect hundreds of thousands of customers daily.

Hosted systems can help reshape your customer relationships from transactional or commoditised to monetising your expertise beyond your ability to repair cameras, wire doors, or update software to increase customer engagement. It’s the kind of value that isn’t so easily replaceable, and that sets you apart from competitors, creating differentiation so that you don’t only have to compete on price. With a hosted solution that’s easy and fast to deploy and managed and maintained by the provider, you can reduce overhead costs, staff training, and truck rolls via remote customer support. As a result, you can allocate more time to new business possibilities, including new projects, services, consultation, and customer engagement. These benefits also allow

WHILE SELLING AND DEPLOYING SECURITY SYSTEMS IS ESSENTIAL, THE REAL FUTURE OPPORTUNITIES LIE IN HELPING TO ENHANCE CUSTOMER OPERATIONS

BY EMBRACING CLOUD AND HYBRID SOLUTIONS, INTEGRATORS CAN UNLOCK NEW REVENUE STREAMS, ENHANCE CUSTOMER RELATIONSHIPS,

AND STAY AHEAD OF TECHNOLOGICAL ADVANCEMENTS

you to spend time developing greater expertise in your customers’ processes. Using this newfound knowledge, you can tailor your services towards potential productivity gains for your customers and turn them into additional sales. This way, you make sure your customers get the most out of the technology that is available and that they have already purchased.

STAYING AHEAD OF THE TECHNOLOGY CURVE

In a cloud-based system, fixes and upgrades are pushed continuously by the software provider as soon as they are ready for release. You can control the update and upgrade schedule that best suits your customer to ensure a seamless and unintrusive experience. Deployment time can be much more flexible, and there is no need to go from machine to machine to update each server or device individually. It’s a more fluid and nimble approach that also enables rapid break/fix response and facilitates system resiliency.

What’s more, it’s easier to practice good cyber hygiene on hosted systems.

System hardening, cybersecurity configuration, and data management are critical but time-consuming, and keeping on top of the latest threats is a job in itself. With hosted solutions, the manufacturer helps alleviate some of this burden.

CHOOSING THE RIGHT PARTNER

In a growing number of companies, the responsibility for purchasing security systems no longer rests solely on a security or facilities team. Increasingly, stakeholders from IT and senior management are involved in making the purchase decision. Usually, they come to the table already familiar with the mechanics of SaaS. Systems integrators who don’t adjust to respond to this demand risk being left behind.

Luckily, you don’t need to do this alone. A reliable and supportive SaaS manufacturer partner can help you evaluate whether a fully hosted or hybrid model is the best solution for a particular customer. This means choosing a software partner that offers unified, open-architecture, and

scalable solutions. Your ideal partner will also allow you to choose the cloud deployment that works best for your clients. It will give you the option of selecting either a true cloud system, with no servers on-premises, or a hybrid model that helps you move clients to the cloud at their own pace.

It is also critical to ensure your SaaS partner has a proven track record of building cyber-resilient solutions with multiple lines of defense and demonstrates:

• a commitment to proactive risk identification and mitigation,

• promotes transparent communications, and

• works exclusively with a network of trusted partners.

EMBRACING THE FUTURE OF PHYSICAL SECURITY

As the physical security industry undergoes this profound shift, systems integrators must adapt to thrive in this new landscape. By embracing cloud and hybrid solutions, integrators can unlock new revenue streams, enhance customer relationships, and stay ahead of technological advancements. With the right partnerships and a forwardthinking mindset, systems integrators can navigate this transformation and take advantage of new opportunities being presented by evolving technology.

APPLICATIONS

ALARM SYSTEM FOR POLAR BEAR PROTECTION!

LOCKING SYSTEM SECURES START-UP

MUL-T-LOCK’S MTL 300 Break Secure 3XP has been installed by Shearline Locksmiths and designed on a one-key system for the security and convenience of start-up running specialist, Kinisi Run Hub in Bristol.

LIVING NEXT to polar bears in Svalbard in order to film them presents safety risks for expedition leader Oskar Strøm and his crew. Hungry polar bears often dare into human camps to search for food and can threaten crew members or damage valuable equipment.

Designlarm’s task was to develop a system to detect intrusions and alert the crew immediately. The solution had to protect personnel and equipment, including generators and filming gear, while also including fire and carbon monoxide detection. The security setup had to function effectively and self-sufficiently in Svalbard’s harsh environment, where technical support is not readily accessible.

Designlarm chose the Ajax ecosystem to address all the expedition’s security needs. Wireless operation allowed for flexible placement of devices across the entire site, ensuring protection without the need for wiring.

The security system for the Arctic expedition is built around Hub 2 Plus Jeweller. This control panel uses Ajax proprietary radio protocols Jeweller to ensure communication between all devices without leaning on internet access. This feature is crucial in the Arctic, where 2G/3G/4G coverage is nonexistent, and the team relies on Starlink internet access. Thanks to two-way communication, Hub 2 Plus Jeweller receives alarms from detectors and delivers them to users. This ensures no alarm will be missed. At the same time, occasional internet connections allow for system updates.

Four DualCurtain Outdoor Jeweller detectors are placed around the camp’s perimeter to guard the camp against intrusions. Each device features two narrow-angle motion detectors facing opposite directions and providing a total detection range of up to 30 metres (15m in each direction). This way, the bear’s approach will be registered in advance. The viewing angle can be adjusted by 3 degrees horizontally on each side, eliminating blind spots and ensuring coverage. To minimise false alarms caused by snow or small animals, the detectors use a software algorithm that analyses signals from IR sensors. When triggered, DualCurtain Outdoor Jeweller detectors send alarms to indoor and outdoor sirens, effectively alerting the crew if a polar bear enters the camp.

MotionCam Outdoor (PhOD) Jeweller detectors serve as a second line of defence and provide motion detection with visual verification of alarms. When a polar bear crosses the perimeter, monitored by DualCurtain Outdoor Jeweller detectors, the system triggers an alarm. While the bear moves around the camp, the built-in camera from MotionCam Outdoor (PhOD) Jeweller takes a series of photos, which the crew can see in the Ajax app when connection to the internet is available.

Indoor and outdoor sirens were installed in the camp to alert the team of security violations and deter curious or aggressive bears. HomeSiren Jeweller devices are installed inside sleeping pods to wake the crew if a polar bear breaches the camp perimeter.

The Ajax SpaceControl Jeweller key fob allows control of the alarm system even without the internet. With the key fob, users can arm, disarm, set night mode, or trigger an alarm manually. Its 1,300-metre connection range to the hub ensures system control from various points around the camp.

Before the store’s launch, Kinisi management wanted to ensure protection for its employees and visitors. The team partnered with Shearline Locksmiths, who following a site survey, specified the locking solution.

Jamie Williamson, managing director of Kinisi Run Hub says: “As a new business, there is so much to consider, including making sure our retail space is as secure as possible. After making several enquiries, Shearline Locksmiths presented the necessary support and delivered exactly what we needed.

“Tom recommended Mul-T-Lock’s MTL 300 Break Secure 3XP not only for the standard of security but also for simplifying authorised access for our team with the convenience of a single key.”

The MTL 300 Break Secure 3XP was fitted to the side entrance doors of the commercial premises. Working to enhance the security installed and minimise disruption, Shearline Locksmiths installed deadlocks and key and thumb turn cylinders, all keyed alike for ease of use.

Tom Davison of Shearline Locksmiths added: “The installation of the locks has streamlined access for Kinisi’s staff, reducing the need to manage and carry multiple keys. This ease of use and the patented key solution, combined with the security features of the system, ensures that Kinisi can operate for the benefit of its customers, smoothly and securely.”

TOWN CENTRE UPGRADES TO IP

360 VISION Technology has enabled a town centre CCTV network extension and replacement programme for Plymouth City Council.

“Starting over two years ago, 360 Vision has assisted us to make a painless transition from an analogue camera network to an IP one, by the use of its Invictus Hybrid camera technology,” says Stuart Venn, CCTV and street lighting engineer, Street Services, Plymouth City Council. “To explain, at the time, we were operating a completely analogue network and needed to replace some of our cameras that were beginning to fail. However, we didn’t want to just replace them with the same style of analogue technology, because we had a longterm vision to upgrade to completely IP transmission, once funding and the right technology became available.

“Additionally, and ideally, we wanted a solution we could apply piecemeal, one area at a time, in our vast system. Not only would budgets not allow us to replace the entire camera network in one hit, but we

could not afford the system downtime that switching all the network to IP transmission in one go would require.

“So, to bridge the gap and having consulted with camera manufacturers at the time, we found 360 Vision Technology offered a system that would fit the bill for us, and therefore deployed the Invictus camera, with Hybrid technology. This enabled us to procure replacement analogue cameras with all the modern functionality and quality we required, but with the built-in capability to turn them into IP transmission devices once our network had become IP ready.

to ‘switch’ our new cameras’ transmission when we did this was critical to the project.

“Additionally, as well as transmission, we were also looking to update our control room VMS to IP technology, so the ability

FIRE SAFETY BOOST FOR RESIDENTS

RESIDENTS AT The Manors Extra Care scheme in Prudhoe, Northumberland, are feeling extra safe in their homes thanks to the completion of a fire safety enhancement programme including a full building sprinkler system from landlord Karbon Homes.

Jon McDonald, Head of Supported Housing at Karbon Homes said:

“By making this investment, we’ve significantly improved the overall safety of the scheme, given residents a greater level of reassurance at home and, in turn, made the scheme a great place to live and a place where people want to move.”

Working with contractor Harmony Fire, the project took three months to complete and saw all 46 apartments and

“To date in this rolling project, we have installed 70 Invictus Hybrid cameras across the network, updating an area at a time as and when necessary and our budgets allowed. This meant that we had several small projects of camera replacement, instead of one big one.”

all the building’s communal areas fitted with the system.

Kevin Smith, Fire Safety Manager at Karbon Homes, said: “We’re really pleased with the results of this project, which has had a positive impact on the safety of everyone who uses The Manors. Due to the higher vulnerability levels amongst residents, including those with visual impairments, cognitive impairments and mobility issues, as well as providing essential protection for those individuals in the event of a fire, the sprinkler system also helps limit false alarms and unnecessary full building evacuations.

Resident engagement played a key role throughout the project. Residents were given opportunities to ask questions, see plans, better understand the system itself and influence the works programme timeline. Alongside this the team carried out fire safety awareness sessions, ensuring everyone was clear on what to do in the event of a fire and alert to the most common causes of fires developing.

Matt Ford, Head of Mechanical and Electrical at Harmony Fire, commented: “The work at The Manors not only enhances safety for residents today but also supports a proactive approach to fire prevention, ensuring a safer living environment going forward.”

PRODUCT FOCUS

Network connectivity means that technology such as routers and switches are a regular fit for the modern security installer. Here we take a look at some of the latest innovations...

Allied Telesis – IE220 Series

THE IE220 Series of industrial-grade switches from Allied Telesis are ruggedised for enduring performance in harsh environments, such as those found in OT networks and outdoor installations.

The PoE++ Gigabit interfaces offer up to 95W per port. Along with a generous power budget, this makes the IE220 Series the ideal companion for surveillance cameras, monitors, point of sale, access systems, PoE

– RUT955

THE RUT955 4G LTE router from Teltonika is an industrial LTE Wi-Fi router with embedded 4G modem for IoT applications the ruggedized 4G mobile router delivers high performance cellular communication in harsh and operating temperature range

environments. The router is equipped with four Ethernet ports, external 2xSIM holders, digital input/output and signal strength status LEDs indicators. External SMA antenna connectors make it possible to attach desired antennas. teltonika-networks.com

D-Link – DSS-200G

lighting and other devices that require over 30W to operate.

alliedtelesis.com/gb/en/

DSS-200G SERIES gigabit smart surveillance switches from D-Link come with surveillance-enhanced features with optimised traffic handling, PoE support, easy configuration, troubleshooting tools and simplified deployment. They also come equipped with an

intuitive web interface and layer 2 network management features, making it easy to add management capabilities to business networks without complicated setups. The optional Surveillance Mode automatically detects D-Link and third-party IP cameras and NVRs, giving real-time access to device and system information.

Ruijie Rayee

– RG-ES206GC-P

The RG-ES206GC-P switch has four PoE ports and two uplink ports. All are up to 1Gb/s capacity, with a total switching capacity of 12Gb/s. The PoE ports provide up to 54W total and include an extended PoE mode of up to 250 metres. The layer 2 switch can be WEB, Cloud or App managed and also supports per-port VLAN configuration for port isolation. Configurable ACL (Access Control Lists) can be used to restrict access. IP camera and NVR recognition are supported for compatible devices and its dimensions are 148(w) x 78(d) x 26(h) mm with a weight of 0.79kg. ruijienetworks.com

THE speeds: two separate high

Proroute – H685

Barox – RY-LGSO38-10 10Gb SFP

BAROX EXPANDED its 10Gb Ethernet switch range, with the release of the RYLGSO38-10 10Gb SFP Light Core Ethernet switch. The 19” device

features 10 x 10Gb port capability with a 200Gb backplane, DMS, security features, dynamic routing and OSPFv2/v3 and RIPv1/ v2. Device features protect

THE PROROUTE H685 is an industrial grade compact 4G router with embedded LTE 4G module for high-speed mobile broadband data transfer speeds. The common way to use the router is with a 3G or 4G fixed IP SIM card to provide the H685 router with a mobile

means when the router connects to the mobile network it will receive a private IP address on the mobile network providers

ACCESS CONTROL INNER RANGE

PSI Magazine Directory

Units 10-11, Theale Lakes Business Park, Moulden Way, Sulhampstead, Reading, Berkshire RG7 4GB United Kingdom

Tel: +44 845 470 5000 ireurope@innerrange.co.uk www.innerrange.co.uk

ACCESS CONTROL HID

3 Cae Gwyrold Green Meadow Springs CARDIFF CF157AB United Kingdom

Tel No: +44 29 2052 8500 emeamarketing@hidglobal.com www.hidglobal.com

ACCESS CONTROL GROSVENOR TECHNOLOGY

Unit S, The Fulcrum Centre Vantage Way, Mannings Heath Poole, Dorset BH12 4NU

Tel No: +44 (0)1202 621 700 info@grosvenortechnology.com www.grosvenortechnology.com

DRIVING INNOVATION TO AN AIOT FUTURE DAHUA TECHNOLOGY UK & IRELAND

Quantum, 60 Norden Road, Maidenhead, SL6 4AY

Tel: +44(0)1628 882210 sales.uk@dahuatech.com www.dahuasecurity.com/uk

CCTV HANWHA VISION

Heriot House, Heriot Road, Chertsey, Surrey, KT16 9DT

Tel: +44 (0)1932 57 8100 www.hanwhavision.eu hvesecurity@hanwha.com

CCTV HIKVISION

4 The Square, Stockley Park, Uxbridge UB11 1ET United Kingdom

Tel: +44(0)1628 902 140 info.uk@hikvision.com www.hikvision.com

ONE SOLUTION. ONE COMPANY IDIS GLOBAL 1000 Great West Road, Brentford, Middlesex TW8 9HH

Tel: +44(0)203 657 5678 Email: uksales@idisglobal.com wwww.idisglobal.com

CONTACT: Tracey Cole 020 8295 8306 tcole@westernbusiness.media

QUALITY, RELIABILITY, VISION

SERAGE UK LTD

PSI Magazine Directory

SERAGE, an NDAA-compliant British CCTV equipment brand, established over a decade ago, is trusted for its dedication to quality, reliability, innovation and unwavering support to CCTV installers. Our commitment to excellence is evident in rigorous testing, cutting-edge technology, and innovative solutions. Recognizing installers as the industry backbone, SERAGE provides extensive marketing, technical, and training support. Committed to community-building, we foster collaboration through online forums and workshops.

35-37 Whitton Dene, Hounslow TW3 2JN

Tel: 020 3963 0100 sales@serage.co.uk www.serage.co.uk

FOLLOW PSI MAGAZINE

ADI GLOBAL DISTRIBUTION

Tel: 0161 767 2990 Fax: 0161 767 2999 sales.uk@adiglobal.com

DISTRIBUTION DYNAMIC CCTV

9b / 9c Bowes Road, Riverside Park, Middlesbrough TS2 1LU United Kingdom

Tel: +441642 220166 sales@dynamic-cctv.com www.dynamic-cctv.com

TO ADVERTISE HERE CONTACT: Tracey Cole 020 8295 8306 tcole@westernbusiness.media

WORLD-LEADING MANUFACTURER OF ELECTRONIC SECURITY EQUIPMENT PYRONIX LTD

Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire S66 8QY

Tel: +44(0)1709 700 100 sales@pyronix.com www.pyronix.com

SECURITY YOU CAN TRUST TEXECOM INTRUDER

Bradwood Court, St Crispin Way, Haslingden, Lancs BB4 4PW

Tel: +44(0)1706 212524 sales@texe.com www.texe.com

TECHNICAL RESOURCES LTD

We lead in specialist recruitment for the Fire & Security, Telecoms, and M&E sectors.

With over 20 years of trading, Technical Resources work with the best permanent and contract staff, helping our clients to deliver their services.

Whether it’s permanent, contract, or larger recruitment programs - we deliver the right candidates to our clients. To do this, we have a great team of hard-working recruiters who know that getting recruitment right the first time is key to the success of the businesses we serve and the professionals we find jobs for. What makes us different? We reference check ALL our candidates. The projects you have need to be delivered. So, we will only send you candidates that we have previously used or successfully referenced. This saves you crucial time and ensures successful project delivery.

Concerned about compliance? Quality and compliance is in our DNA. Compliance checks are a key part of our weekly processes. And we don’t stop after placing the candidates with you. We run weekly checks on all contractor timesheets and will check in with you and your contractor too.

Rivermead House, Hamm Moor Lane, Addlestone, Surrey, KT15 2SF 01932 837 777 info@tecres.uk.com www.technicalresources.co.uk

SECURE CONNECTIVITY PROVIDERS

CSL GROUP

T: +44 (0)1895 474474 sales@csl-group.com www.csl-group.com

SECURITY MADE SIMPLE.

PAXTON ACCESS LTD

Paxton House, Home Farm Road, Brighton, BN1 9HU

With nearly 40 years of experience, we design and manufacture market-leading security solutions for a range of buildings. Around 30,000 buildings are secured globally by Paxton products, every year. We utilise the latest technology to provide powerful, yet easy-to-install and use security solutions. Our products are designed for a wide range of sectors including education, healthcare, retail, leisure, commercial, the public sector and more. All our products are manufactured in the UK and are backed by our 5-year guarantee and hassle-free returns policy.

Tel: 01273 811080 support@paxton.co.uk www.paxton-access.com

Our subscription free , unified web-based platform r educes hardware, installation and maintenance costs.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.