Smart intruder detection solutions

October 2017 Perimeter Security, Alarms & Intruder Detection

Elvey’s focus on providing quality technology includes the introduction of smart solutions from DSC, UTC and Risco that leverage the Internet of Things (IoT).

DSC’s iotega panel is a self-contained wireless system that provides security and all the benefits of DSC’s high-end technology, using GPRS, Z-Wave, IP and wireless connectivity. The iotega also makes use of FIBARO Z-Wave plug & play devices which are simple to install and use. Added video verification makes for a powerful package.

The FIBARO product range is compatible with voice control technologies – one simply tells the system what to do, and it expedites one’s commands within seconds. FIBARO allows homeowners to monitor the amount of electricity used by home devices, thereby easily identifying which items of hardware are responsible for high energy usage. The system can be programmed to increase energy savings for homeowners.

The scalable DSC solutions allow homeowners to start with security-only and to upgrade to a full home automation system that can support over 200 security and smart home devices. Support is provided for multiple communications protocols, such as Ethernet, as well as a wide range of wireless options such as Wi-Fi, Z-Wave Plus, PowerG and optional cellular (3G and LTE).

The security backend on the DSC iotega panels is powerful due to the fact that DSC has outsourced the backend development to the creators of the cloud-based monitoring platform SecureNet. This platform has fully encrypted VPN communication from the security system directly to the central station and allows users to arm and disarm with zone bypass, view real-time system and zone status, and view history, as well as receive notifications and alerts.

Adding the Risco Smart Home Gateway to a Risco LightSYS2 or Agility3 intruder alarm system allows home automation system management using the iRISCO App. The RISCO Home Gateway connects to the highly secure Risco Cloud via the user’s router and is compatible with a selection of FIBARO Z-Wave devices. Similarly UTC’s Zero Wire panel offers a fully fledged wireless alarm panel that offers home automation through FIBARO Z-Wave devices as well as video verification, all driven through its app.

Elvey employs a specialist technical support team that guides clients through any challenges they may face, including the selection of the best possible solution for their specific application and circumstances.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
What not to do: Key ‘don’ts’ in perimeter security systems
Fang Fences & Guards Perimeter Security, Alarms & Intruder Detection
Many people know what to do when securing a perimeter; in this article, Johan van Wyk highlights the important ‘don’ts’ to consider when implementing a turnkey perimeter security solution.

Read more...