TECHNOLOGY SOLUTIONS


  • Access Control
    • Three main types of access control systems are: Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC). We offer all these types of access control solutions at Status Security.
    • “In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.”
  • Alarm Systems
    • A security alarm is a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. Security alarms used in residential, commercial, industrial, and military properties protect against burglary (theft) or property damage, as well as personal protection against intruders.
    • Security alerts in neighbourhoods show a connection with diminished robbery. Some alarm systems serve a single purpose of burglary protection; combination systems provide fire and intrusion protection. Intrusion-alarm systems are combined with closed-circuit television surveillance (CCTV) systems to record intruders’ activities and interface to access control systems for electrically locked doors. There are many types of security systems. Homeowners typically have small, self-contained noisemakers. These devices can also be complicated, multirole systems with computer monitoring and control. It may even include a two-way voice which allows communication between the panel and monitoring station.
  • Biometric Systems
    • Biometrics Systems are body measurements and calculations related to human characteristics. Biometric authentication is used as a form of identification and access control.
    • Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics, which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, and odor/scent.
  • CCTV Systems
    • CCTV Systems also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
    • It differs from broadcast television in that the signal is not openly transmitted and is used for surveillance in areas that require additional security or ongoing monitoring. In industrial plants, CCTV equipment may be used to observe parts of a process from a central control room, for example when the environment is not suitable for humans. CCTV systems may operate continuously or only as required to monitor a particular event. A more advanced form of CCTV, using digital video recorders (DVRs), provides recording for possibly many years, with a variety of quality and performance options and extra features (such as motion detection and email alerts). More recently, decentralized IP cameras, perhaps equipped with megapixel sensors, support recording directly to network-attached storage devices, or internal flash for completely stand-alone operation, and a host of crime prevention measures throughout the world.
  • Electric Fences
    • An electric fence is a barrier that uses electric shocks to deter animals and people from crossing a boundary. They are used to protect high-security areas. Electric fences are designed to create an electrical circuit when touched by a person or animal.
    • A component called a power energizer converts power into a brief high voltage pulse. One terminal of the power energizer releases an electrical pulse along a connected bare wire about once per second. Another terminal is connected to a metal rod implanted in the earth, called a ground or earth rod. A person or animal touching both the wire and the earth during a pulse will complete an electrical circuit and will conduct the pulse, causing an electric shock.
  • Gate Automation
    • Automatic gates are used to control access into a secured area. Most commonly, automatic gates are used at the entrance to the facility and are used to control vehicular access on and off the site.
    • Automatic gates are used to control access into a secured area. Most commonly, automatic gates are used at the entrance to the facility and are used to control vehicular access on and off the site. For example, a manufacturing plant may use an automatic gate at its main entrance.
  • 24 Hour Control Centre
    • Our Control Centre which is manned 24 hours a day to monitor our customer’s premises and to facilitate customer service requests. We have a pool of dedicated Control Centre, Operations, Customer Service and Technical Support Teams to support and service any technical problem round-the-clock, providing our customer with peace of mind for their security requirements.
    • Our Control Centre which is manned 24 hours a day to monitor our customer’s premises and to facilitate customer service requests. We have a pool of dedicated Control Centre, Operations, Customer Service and Technical Support Teams to support and service any technical problem round-the-clock, providing our customer with peace of mind for their security requirements.
  • Intercom Systems
    • Intercom Systems – (“intercommunication device”) or interphone is a stand-alone voice communications system for use within a building or small collection of buildings, functioning independently of the public telephone network. Intercoms are generally mounted permanently in buildings and vehicles. Intercoms can incorporate connections to public address loudspeaker systems, walkie talkies, telephones, and to other intercom systems.
    • Some intercom systems incorporate control of devices such as signal lights and door latches. There are simple house intercoms and intercoms developed for collective apartments. Some are equipped with video, and its wiring (electrical installation), can be connected to the outside with few pairs (4-6 pairs) while controlling an electric strike. The last generations are even compatible with computers and some models include TCP/IP.
  • Panic Systems
    • Panic Systems are also called “duress alarms”, “hold-up alarms”, or “panic buttons”. Panic alarms are used when it may be unsafe or uncomfortable to call for help in other ways.
    • A panic alarm can provide a quick and convenient way to summon help without drawing attention.