Cellular security

October 2010 Asset Management, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Cellular communications finds a willing audience in the security world.

Cellular communications have changed the way we live. If you need to get hold of a friend or family member, you no longer call their office, or even their home, you now call them on their personal cell number.

Hans Vestberg, CEO of mobile phone maker Ericsson, told delegates at the 2010 Mobile World Congress that the last decade had seen the number of mobile subscriptions worldwide grow sixfold to 4,6 billion. To put this in perspective, the entire world population is 6,7 billion people. He also said that he envisaged 50 billion connected devices by 2020, and that patients would be connected remotely to hospitals, trucks would be online with logistics centres for efficient routing, and city students would be connected to students in rural villages halfway around the world.

Why has this technology, based on GSM (global system for mobile communication – the most popular standard for mobile telephony systems in the world), become so dominant in our lives? It all comes down to convenience, efficiencies and, more recently, necessity. People are no longer dependent on being at a specific location in order to communicate with their worlds. Devices can now communicate wirelessly with one another over continents. Connectivity at this level has now moved from being new and advanced to being expected and even demanded. So much so, that many security systems are now adopting it and using it as a cost effective and reliable means of telephony.

Security via GSM

Centurion has embraced this technology and its recently released GSM device, called the G-Switch, is a classic example of how it is being put to very practical use. The G-Switch, once connected to the GSM network, allows you to activate almost any type of device or appliance from anywhere in the GSM world. For example, the G-Switch can, via either of its two outputs, trigger your gate automation system if you are sitting in Paris but need to let your garden service into your property in Parys. Or you may wish to switch on your air conditioner whilst you are driving home so that you arrive at a cool, relaxing home after being stuck in the summer traffic snarl-up for a few hours. All this is done by simply making a free missed call, or by sending an SMS to your G-Switch.

Your G-Switch talks back to you too. It can receive information from various devices, through either of its two inputs, and can relay this back to you via an SMS. For example, it can be set up to alert you if someone has attempted to breach your electric fence, or you can even integrate this with your gate motor to warn you that someone has just opened the gate to your holiday home.

This technology is not new. It is just getting quicker, smarter and cheaper than ever before. In the same way that most of us never leave home without our cellphones, we will soon be using them to control our security systems, home automation and all sorts of other devices. Even our more rural friends are using these devices to switch on borehole pumps, saving them from a few kilometres of bundu bashing.

Harnessing and utilising the benefits of cellular technology is certainly the way of the future. So, why wait? Do not get left behind, get on board and get up to speed.

For more information contact Centurion Systems, +27 (0)11 699 2467, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Gallagher Security obtains SOC2 Type 2 recertification
Gallagher News & Events Access Control & Identity Management
Global security leader Gallagher has achieved renewal of attestation status for System and Organisation Controls (SOC2 Type 2) as related to the cloud-hosted services of its integrated security solution, Command Centre.

Read more...
Invixium launches Enterprise Series biometrics
Products & Solutions Access Control & Identity Management
Invixium announced the launch of its new Enterprise Series, which is made up of the IXM ROSTO facial biometric and the IXM TOUCH 3 fingerprint biometric devices.

Read more...
AI making South African roads safer
Asset Management Transport (Industry) AI & Data Analytics
Driver fatigue is a significant contributor to road accidents globally. While reliable statistics for South Africa are hard to come by, it has been estimated that fatigue is a factor in 25% - 30% of fatal crashes.

Read more...
Gallagher Security opens Cape Town office
Gallagher News & Events Access Control & Identity Management
Acknowledging a significant period of growth for the company in South Africa, opening a second office will enable Gallagher to increase its presence across the region with staff based in Johannesburg and Cape Town.

Read more...
Glovent’s SOS Suite triple protects estate residents
News & Events Access Control & Identity Management Residential Estate (Industry)
One hundred and fifty-three years since the world’s first panic button was introduced in New York City, Glovent offers estate residents three different ways of summoning emergency assistance at the touch of a button.

Read more...