 
4 4   ·   d e t e k t o r   i n t e r n a t i o n a l
Security News Every Day  
www. securityworldhotel.com
Visonic Powermaster-30 G2 
is a wireless alarm panel with 
PowerG technology. The system 
can handle some 120 wireless 
detectors with 64 groups, 32 
control panels, 8 sirens and 4 ra-
dio repeaters. PowerG combines 
several wireless technologies, like 
those used in cellular networks 
and Bluetooth, with the AES 
encryption method. The greatest 
innovation in PowerG is having 
these technologies operate on 
non-rechargeable batteries while 
still keeping all devices connected 
and online.  All devices are 
configured from the panel  no 
hardware switches and no need 
to re-open the peripherals once 
closed. Devices dynamically op-
timise their route to the control 
panel using available repeaters 
according to changes in the en-
vironment. Visible signal quality 
indication shown on the device 
enables the installer to choose the 
optimal location without hav-
ing to walk to the panel during 
mounting.
Product: Wireless Video  
Verification
Company: Risco Group
The Wireless Video Verification 
verifies the alarm in a sequence 
of images sent to the customer's 
smartphone via Risco Cloud 
Server over GSM /GPRS.
According to Risco, with the 
Wireless Video Verification, false 
alarms are weeded out as video 
verification allows immediate 
confirmation of a crime-in-
progress instead of a standard 
alarm signal. 
Some of the main features of 
the Wireless Video Verification 
are notification  remote visual 
notification when an alarm is 
triggered, verification  reduce 
false alarm costs through visual 
verification with a sequence of 
images and remote viewing upon 
user demand  view the secured 
site whenever you want to from 
anywhere (smartphone, laptop 
PC, etc.).                             n
PIE-1 supports both PoE and 
PoE Plus, switching automati-
cally between them as required by 
the sensor. With IP Encoder and 
PoE, the PIE-1 both converts the 
alarm signal to IP and powers the 
remote device. This is the typical 
mode for use with Optex Redwall 
passive infrared detector and 
Fiber Defender optical fiber-based 
perimeter security systems. PIE-1 
has an input for alarm and tamper 
and power of the detector. The 
system is easily integrated with for 
example CCTV so that the right 
camera can verify the event.
Product: Sioux
Company: Cias Elettronica
Sioux is a fence mounted perim-
eter intrusion detection system 
which comprises a multitude of 
mems type tri-axial accelerometer 
sensors, organised in sub-systems 
made up of 1 master sensor and 
6 slave sensors: each is individual 
and provides its own signal on 
a different channel to its master 
sensor. Each of these sub-systems 
is connected, in series with the 
others, to a central analyser, which 
will perform additional correla-
tions not possible at the individual 
master sensors. The detectors are 
mounted with 5 metres intervals 
to max 2x350 metres length 
per controller. By exploiting the 
capabilities of the mems sensors 
with respect to the acceleration 
of gravity it is possible to gain 
information about the position 
of the accelerometer in free space. 
During installation the position 
of the mems accelerometer will 
be memorised. If it alters by more 
than a pre-set, variable number of 
degrees (e.g. 5°) it will produce a 
tamper alarm. 
Product: Visonic  
Powermaster-30 G2
Company: Tyco 
for access control, biometrics, 
vending, time and-attendance, 
and many other applications.   
Product: UDC500I
Company: Assa
The UDC500I is a gateway unit 
and an intelligent connection 
terminal block. It allows a Hi-O 
door environment to be con-
nected to a traditional non-Hi-O 
access system (integration with 
access control systems from other 
manufacturers). The UDC500I 
connects to an EAC using the Assa 
Abloy device protocol. With Hi-O 
(Highly intelligent Opening), the 
units have a built in processor 
and encrypted communication 
with each other for plug-and-
play installation. Hi-O enables 
intelligent supervision of door 
behaviour, in real time. UDC500I 
has built in function for Hi-O 
motor locks, alarm bypassing and 
door monitoring. Hi-O is a smart 
system that sends error codes 
when the lock is slow or when a 
fault has occurred. This means the 
service personnel can be proactive 
and replace the part before their 
system crashes.
Alarm & Detection
The nominated alarm & detection 
products are:
Product: PIE-1 Alarm IP  
Encoder
Company: Optex
The PIE 1 Encoder provides the 
dual functions of PoE power 
delivery to remote Optex devices 
and conversion of alarm signals 
to an IP protocol for delivery 
to video management systems 
or network video recorders. The 
also offers TCP/IP, PoE and Wifi 
features.
Product: The Aesco module
Company: Idesco
The Aesco package from Idesco is 
the industry's first card-reader-host 
encryption solution. Partnered 
with the Access 8 CD 5 2.0 AES 
readers, it safeguards an entire 
access control system with the pro-
tection of Desfire AES encryption. 
Crucially, Aesco maintains its deep 
protection of user identities for the 
entire distance to the controller. 
There the module decrypts them 
back into transparency and parity 
with the controller. This is because 
the Aesco module is designed to 
ensure seamless decryption of 
data back into transparency with 
the system's controller. In turn, 
this ensures the Aesco decryp-
tion module can be conveniently 
implemented with an existing sys-
tem, or even logically-integrated 
into the user's own controller, pro-
viding one of the fastest pathways 
to protecting an entire system.
Product: Iclass SE Readers
Company: HID
The multi-functional Iclass SE 
Readers can be updated with 
software in order to meet the 
demands for different card 
technologies such as EM, Mifire, 
Desfire, HID Prox, Indala, Iclass, 
etc. It offers a standards based, 
technology-independent and flex-
ible identity data structure based 
on Secure Identity Object (SIO), a 
new portable credential methodol-
ogy. SIOs can reside on any card 
technology, microprocessor-based 
cards, NFC smartphones, USB to-
kens, computer drives, and other 
formats. SIO is device independ-
ent, providing an additional layer 
of security with additional key 
diversification, authentication and 
encryption. SIOs are defined using 
open standards that can support 
any piece of data, including data 
detektor international award