Sur-Gard launches new receiver

July 2012 Perimeter Security, Alarms & Intruder Detection

In its 2012 report on crime and safety in South Africa, OSAC (Overseas Security Advisory Council) states that violent confrontational crime such as home invasion robberies and burglaries ‘is a major concern’.

The Council has reason to be concerned, says Valerie Bingham, product manager for Elvey Security Technologies. “According to a report by the South African Institute of Race Relations, a shocking 678 burglaries were committed every day in South Africa during 2010/2011.”

She believes home and business owners will be pleased to hear of the launch of the Sur-Gard System III, a virtual receiver which she says is superior to conventional receivers, owing to its super-fast, reliable ability to receive and handle burglar and fire signals.

One of Tyco Security Products’ brands, its new receiver sports features such as automation output over TCP/IP using an RS-232 serial output as a back-up, and expandability to accommodate up to 24 mix-and-match lines.

Residing in two 19-inch rack mount cages, this set-up allows for automatic switching redundancy of all internal components should the primary CPM (central processing module) fail, in which case the secondary unit would then immediately take over.

Bingham says the receiver has been designed for easy and economical expansion. It can be configured to run from one to up to 24 line cards, and a combination of phone and network line cards allows for the creation of one integrated monitoring solution. The benefits of this include increased account volume and improved signal processing. Additionally, the CPM polls each line card to get consistent, up-to-the-minute information.

The System III is also equipped with a self-diagnostics feature, which allows it to pick up component problems instantly. The CPM provides continual supervision of automation software to ensure automatic backup to a redundant port. “So,” says Bingham, “if the automatic system goes off-line, the CPM will switch from the primary Ethernet port to a secondary or serial port, before going into manual mode.”

The use of an E1 circuit greatly improves disaster recovery capabilities, she adds. “In the event of system failure, the receiver can be re-routed via the E1 circuit and directed to an alternate disaster recovery facility. This prevents any down time and ensures that activities can continue as normal.”

Bingham points out that the System III makes use of SG-DRL3-IP line cards to ensure top level security alarm monitoring. “The cards, which are FIPS/NIST, UL AA High-Line Security and ULC Level 3/4/5 listed, offer 128-bit AES encryption and an anti-hack design that isolates internal communications from external data transmissions.”

Line testing

System III offers integrated end-to-end testing of up to 1024 telephone numbers. Line tests can be initiated on demand or automatically, she says, using daily or weekly schedules. A unique test signal using SIA or Contact ID is programmed for each phone number, and results are individually logged via Sur-Gard Console Software. System III can also send test signals to other compatible receivers in a central monitoring station.

System III can be programmed locally by referencing the unit’s menu-driven 1/4 VGA display, or remotely over a network Ethernet connection using Sur-Gard Console Software. Bingham says the easy-to-use Windows-based software can also be used to upgrade the unit’s flash memory with new operating software, without the need to handle hardware, pull chips or disrupt the activity of other components.

Used to configure the System III virtual receiver, the software, which connects via the receiver’s Ethernet port from any network computer, also provides a number of remote diagnostic tools. These include communications debugging and real-time status of all subsystems. Other features, she notes, include a flash memory upgrade utility, date and time synchronisation, edit and archive configuration options, and a virtual event log.

For more information contact Elvey Security Technologies, +27 (0)11 401 6700, [email protected], www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Elvey to distribute Tiandy
Elvey Security Technologies Editor's Choice Surveillance News & Events
Tiandy’s presence in South Africa was boosted in November with the announcement that Elvey Security Technologies will distribute a broad range of Tiandy equipment through its channel partners and provide project assistance.

Read more...
Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...