background image
4 4 · d e t e k t o r i n t e r n a t i o n a l
Security News Every Day ­
www. securityworldhotel.com
Visonic Powermaster-30 G2
is a wireless alarm panel with
PowerG technology. The system
can handle some 120 wireless
detectors with 64 groups, 32
control panels, 8 sirens and 4 ra-
dio repeaters. PowerG combines
several wireless technologies, like
those used in cellular networks
and Bluetooth, with the AES
encryption method. The greatest
innovation in PowerG is having
these technologies operate on
non-rechargeable batteries while
still keeping all devices connected
and online. All devices are
configured from the panel ­ no
hardware switches and no need
to re-open the peripherals once
closed. Devices dynamically op-
timise their route to the control
panel using available repeaters
according to changes in the en-
vironment. Visible signal quality
indication shown on the device
enables the installer to choose the
optimal location without hav-
ing to walk to the panel during
mounting.
Product: Wireless Video
Verification
Company: Risco Group
The Wireless Video Verification
verifies the alarm in a sequence
of images sent to the customer's
smartphone via Risco Cloud
Server over GSM /GPRS.
According to Risco, with the
Wireless Video Verification, false
alarms are weeded out as video
verification allows immediate
confirmation of a crime-in-
progress instead of a standard
alarm signal.
Some of the main features of
the Wireless Video Verification
are notification ­ remote visual
notification when an alarm is
triggered, verification ­ reduce
false alarm costs through visual
verification with a sequence of
images and remote viewing upon
user demand ­ view the secured
site whenever you want to from
anywhere (smartphone, laptop
PC, etc.). n
PIE-1 supports both PoE and
PoE Plus, switching automati-
cally between them as required by
the sensor. With IP Encoder and
PoE, the PIE-1 both converts the
alarm signal to IP and powers the
remote device. This is the typical
mode for use with Optex Redwall
passive infrared detector and
Fiber Defender optical fiber-based
perimeter security systems. PIE-1
has an input for alarm and tamper
and power of the detector. The
system is easily integrated with for
example CCTV so that the right
camera can verify the event.
Product: Sioux
Company: Cias Elettronica
Sioux is a fence mounted perim-
eter intrusion detection system
which comprises a multitude of
mems type tri-axial accelerometer
sensors, organised in sub-systems
made up of 1 master sensor and
6 slave sensors: each is individual
and provides its own signal on
a different channel to its master
sensor. Each of these sub-systems
is connected, in series with the
others, to a central analyser, which
will perform additional correla-
tions not possible at the individual
master sensors. The detectors are
mounted with 5 metres intervals
to max 2x350 metres length
per controller. By exploiting the
capabilities of the mems sensors
with respect to the acceleration
of gravity it is possible to gain
information about the position
of the accelerometer in free space.
During installation the position
of the mems accelerometer will
be memorised. If it alters by more
than a pre-set, variable number of
degrees (e.g. 5°) it will produce a
tamper alarm.
Product: Visonic
Powermaster-30 G2
Company: Tyco
for access control, biometrics,
vending, time and-attendance,
and many other applications.
Product: UDC500I
Company: Assa
The UDC500I is a gateway unit
and an intelligent connection
terminal block. It allows a Hi-O
door environment to be con-
nected to a traditional non-Hi-O
access system (integration with
access control systems from other
manufacturers). The UDC500I
connects to an EAC using the Assa
Abloy device protocol. With Hi-O
(Highly intelligent Opening), the
units have a built in processor
and encrypted communication
with each other for plug-and-
play installation. Hi-O enables
intelligent supervision of door
behaviour, in real time. UDC500I
has built in function for Hi-O
motor locks, alarm bypassing and
door monitoring. Hi-O is a smart
system that sends error codes
when the lock is slow or when a
fault has occurred. This means the
service personnel can be proactive
and replace the part before their
system crashes.
Alarm & Detection
The nominated alarm & detection
products are:
Product: PIE-1 Alarm IP
Encoder
Company: Optex
The PIE 1 Encoder provides the
dual functions of PoE power
delivery to remote Optex devices
and conversion of alarm signals
to an IP protocol for delivery
to video management systems
or network video recorders. The
also offers TCP/IP, PoE and Wifi
features.
Product: The Aesco module
Company: Idesco
The Aesco package from Idesco is
the industry's first card-reader-host
encryption solution. Partnered
with the Access 8 CD 5 2.0 AES
readers, it safeguards an entire
access control system with the pro-
tection of Desfire AES encryption.
Crucially, Aesco maintains its deep
protection of user identities for the
entire distance to the controller.
There the module decrypts them
back into transparency and parity
with the controller. This is because
the Aesco module is designed to
ensure seamless decryption of
data back into transparency with
the system's controller. In turn,
this ensures the Aesco decryp-
tion module can be conveniently
implemented with an existing sys-
tem, or even logically-integrated
into the user's own controller, pro-
viding one of the fastest pathways
to protecting an entire system.
Product: Iclass SE Readers
Company: HID
The multi-functional Iclass SE
Readers can be updated with
software in order to meet the
demands for different card
technologies such as EM, Mifire,
Desfire, HID Prox, Indala, Iclass,
etc. It offers a standards based,
technology-independent and flex-
ible identity data structure based
on Secure Identity Object (SIO), a
new portable credential methodol-
ogy. SIOs can reside on any card
technology, microprocessor-based
cards, NFC smartphones, USB to-
kens, computer drives, and other
formats. SIO is device independ-
ent, providing an additional layer
of security with additional key
diversification, authentication and
encryption. SIOs are defined using
open standards that can support
any piece of data, including data
detektor international award