Cellular security

October 2010 Asset Management, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Cellular communications finds a willing audience in the security world.

Cellular communications have changed the way we live. If you need to get hold of a friend or family member, you no longer call their office, or even their home, you now call them on their personal cell number.

Hans Vestberg, CEO of mobile phone maker Ericsson, told delegates at the 2010 Mobile World Congress that the last decade had seen the number of mobile subscriptions worldwide grow sixfold to 4,6 billion. To put this in perspective, the entire world population is 6,7 billion people. He also said that he envisaged 50 billion connected devices by 2020, and that patients would be connected remotely to hospitals, trucks would be online with logistics centres for efficient routing, and city students would be connected to students in rural villages halfway around the world.

Why has this technology, based on GSM (global system for mobile communication – the most popular standard for mobile telephony systems in the world), become so dominant in our lives? It all comes down to convenience, efficiencies and, more recently, necessity. People are no longer dependent on being at a specific location in order to communicate with their worlds. Devices can now communicate wirelessly with one another over continents. Connectivity at this level has now moved from being new and advanced to being expected and even demanded. So much so, that many security systems are now adopting it and using it as a cost effective and reliable means of telephony.

Security via GSM

Centurion has embraced this technology and its recently released GSM device, called the G-Switch, is a classic example of how it is being put to very practical use. The G-Switch, once connected to the GSM network, allows you to activate almost any type of device or appliance from anywhere in the GSM world. For example, the G-Switch can, via either of its two outputs, trigger your gate automation system if you are sitting in Paris but need to let your garden service into your property in Parys. Or you may wish to switch on your air conditioner whilst you are driving home so that you arrive at a cool, relaxing home after being stuck in the summer traffic snarl-up for a few hours. All this is done by simply making a free missed call, or by sending an SMS to your G-Switch.

Your G-Switch talks back to you too. It can receive information from various devices, through either of its two inputs, and can relay this back to you via an SMS. For example, it can be set up to alert you if someone has attempted to breach your electric fence, or you can even integrate this with your gate motor to warn you that someone has just opened the gate to your holiday home.

This technology is not new. It is just getting quicker, smarter and cheaper than ever before. In the same way that most of us never leave home without our cellphones, we will soon be using them to control our security systems, home automation and all sorts of other devices. Even our more rural friends are using these devices to switch on borehole pumps, saving them from a few kilometres of bundu bashing.

Harnessing and utilising the benefits of cellular technology is certainly the way of the future. So, why wait? Do not get left behind, get on board and get up to speed.

For more information contact Centurion Systems, +27 (0)11 699 2467, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simplified fire and facilities management from one screen
Fire & Instrument Services Facilities & Building Management Fire & Safety Asset Management
Fire & Instrument Services (F&IS) and Scansoft are simplifying the complexities of facilities management, including fire safety, with iBMS Adrenaline, an integrated building and facilities management system enabling companies to monitor, control, and manage system hardware through a single interface.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
Autonomous construction site protection
Ajax Systems Editor's Choice Perimeter Security, Alarms & Intruder Detection
Ajax provides an autonomous security solution for a German construction site that is easy and flexible to install. It provides security against intrusions and theft via a 360-degree view.

Read more...
Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...