Tag Archives: CCTV

Jan 24

Setting up a CCTV system in a remote location, so you can view cows which are cavling for example, couldn’t be easier. When a barn is located a few kilometres away, and CCTV is required, setting up a wireless bridge is a simple solution which will save you time and money if it is a site that requires checks regularly.

Using a pair of our wireless access points to create a wireless bridge is as simple as the flick of a switch to pair the two devices, once the CCTV cameras are in place at the remote location and the recording unit is set up locally in your home or business.

This is just one example of where as wireless bridge can be utilized to save time and money for somewhere that may need constant attention or regular attention to make sure there are no problems on site.

For further information on this application feel free to contact our experienced sales team on 02890 329480

Jan 14

Today, more and more people begin to appreciate the need for integrated housing protection. Reliable door and window grating represents the first barrier. A security system that provides control over the environment and informs about events represents the second barrier. If an incident occurs, it needs to be responded to immediately and as effective as possible. Professional monitoring service is unchallenged in this field.

Demand breeds supply — the number of new security and service companies that ensure protection of a specific area of a city, residential compound or cottage estate is growing. They rely on new technologies, and efficiency, quality of service, and reliability represent the key success factors of their business. People are willing to pay for such security services.

Ajax fits perfectly into the new security business model — users love it and it has proven its reliability to professionals. Because of such advantages as quick installation, remote administration, simple service, and ultra-high reliability, more and more security companies choose Ajax as its standard equipment. The Ajax applications for smartphones and computers have already saved thousands of hours for installers and engineers.

Ajaxs’ aim is to offer a comprehensive solution to ensure the protection of a residential area — hundreds of private houses or thousands of apartments with professional monitoring and effective response around the clock. The updated Ajax PRO Desktop application is the right solution.

New features

Starting a monitoring service based on a standard console software requires careful preparation. A new company needs to set up equipment, adapt the application, and train its staff. However, these are not all the difficulties — every facility will have to be connected to the console manually, and this procedure cannot be automated in any way.

In October 2017, Ajax released a mobile application: Ajax PRO: Tool for Engineers, and half a year later, they released a version for computers — Ajax PRO Desktop. The programs are accompanying the Central Monitoring Station (CMS) simplifying the management of the Ajax security systems for installers and engineers.

Today, Ajax present the monitoring feature in Ajax PRO Desktop. The application allows the operator to process alarms arriving from up to 2500 facilities, configure security systems remotely, perform detector adjustment at the customers’ requests, and manage access rights. Facilities are connected automatically in just a few minutes and no additional settings are required, and there is nothing superfluous in Ajax PRO Desktop — a short briefing is enough to get started.

Ajax PRO Desktop is a free alternative to the Central Monitoring Station for security and service companies that ensure safety of residential compounds and cottage estates.

Implementation of monitoring
is a simple task

Having chosen the Ajax PRO Desktop as a monitoring solution, you do not need to spend time setting up the application and security systems as well as transfer information manually. You can just log into the administrator account, request access to the hubs, and specify the addresses of the facilities.

Thanks to the Ajax Cloud server, all Ajax applications contain up-to-date information about the security systems: composition of devices, settings, user rights, and events.

Connecting the security system featuring 5
detectors to the monitoring program

Central Monitoring Station (CMS) applicationAjax PRO Desktop featuring monitoring function
Connection procedure14 minutes 1. Set up monitoring at the central monitoring station.
2. Create a facility card at the CMS.
3. Describe the detectors.
3 minutes 1. Invite the PRO user.
2. Fill in the facility address and description.
Employees involved2 persons Engineer at the site and CMS operator.1 person Ajax PRO Desktop operator.
Error probabilityHigh The facility profile in the CMS is filled in manually.Excluded Data is synchronized between the Ajax applications.

What can Ajax PRO Desktop do?

Using the Ajax PRO Desktop application, a single operator of security or service company can manage up to 2500 Ajax security systems.

The monitoring functions are opened in a separate window and do not block other features of the Ajax PRO Desktop application. By monitoring security system events, you can change their settings, manage access rights, and view the statuses of the guarded facilities.

The event window is as informative as possible and provides filtration by types of alarms, malfunctions, general events, and security events. Each type of event is assigned a specific color, which simplifies navigation:

How does the system respond to alarms?

When a guarded facility is trespassed, caught on fire or is flooded, the operator receives an audible notification of an event in Ajax PRO Desktop. All the necessary information is available in the Alarm handling menu:

  • Where exactly the incident occurred.
  • What caused the alarm: entrance door opening detector and subsequent movement in the hallway detected trespass; smoke detected in the kitchen; alarm button is pressed in the application or on the keyfob; the user was forced to enter the code, etc.
  • The real-time update of the facility security system event history.
  • Who are the users of this security system and their contacts.

The operator sends an alarm to the rapid response teams by radio or other means adopted by the company. He/she reports on the nature of the event — this affects how exactly the security guards will act. If there is reason to believe that residents are in danger, it is crucial to get to the apartment (house) as fast as possible. In the event of a robbery, it makes sense to cordon off the building first and check for suspicious vehicles nearby. The best way to prevent flooding is to shut off the water supply to the floor or the building.

Having notified the rapid response team, the operator contacts the security system users and reports on the measures taken.

When the problem is resolved, the alarm is marked as processed in the Ajax PRO Desktop and is supplemented with comments of the operator and the security guards. Comments, together with the information about the time of alarm reading and processing stored in the event history, will be useful in the case of client’s complaints.

The Ajax PRO Desktop application is designed for macOS, Windows 7/8/10. Minimum computer requirements:

CPUIntel / AMD 1.2 GHz
GPU3D accelerator
RAM2 GB
ROM400 MB
Jan 06

AJAX Wireless Alarm System. The Professional Grade wireless security system meets the strictest security demands. Ajax propietary technology, devices and production have proven theur reliability in independent laboratoy tests in Europe, earning certification reserved for the most trustworthy professional security systems.

AJAX Wireless Alarm System

No wires. No worries

Ajax looks more like a smart gadget rather than a piece of complicated security equipment. No hard sell or lenghty consultations, Ajax is easy to understand. It provides the opportunity to protect property from intruders, fire, and leakage, allows you to connect IP cameras for monitoring and turn on home appliances, all remotely with a few taps from your smartphone. More than 200,000 people all over the world have entrusted the security of their property to the Ajax Wireless Security System.

AJAX Wireless Alarm System

AJAX Wireless Alarm System can connect to devices of up to 2,000 metres away, making it suitable for apartments, houses and commercial premises. Devices can operate up to 7 years on the bundled batteries, that come complete with all devices, and are configured remotely via the APP providing effortless maintenance for installers.

As well as effortless maintenance, the Ajax system can be effortlessly installed too, with the average time of a full system install and confirguration, consisting of 9 devices, averaging just 26 minutes!

The secuirty system is managed through the free apps, available for the installer and end user. The Hub Operating System will receive regular updates for free adding new features. All users who are authorised to operate the system are notified of any significant event via push notifications, SMS and calls. The system may also be monitored by a trusted central station to alert secuirty or police for the end user.

Shop our full product range on Ajax Wireless Alarm Systems here.

You can find more information and FAQ on Ajax Systems website here .

Aug 15

How to setup Hik-Connect
Hik-Connect is a new platform from Hikvision designed to make setting up remote access quicker and easier than using a DDNS or static IP. With this setup guide, you will no longer need any port forwarding. It’s as easy as registering your customer an account, then scanning the QR code on the recorder.

Before you start you’ll need your customer’s email address or mobile number, you’ll need access to their chosen email or phone to receive a verification code, and you’ll need access to the NVR or DVR.

Setting up the recorder
1. First, gain access to the DVR/NVR
2. Right click and navigate to Menu>Configuration>Network>Platform Access, and tick the Enable box
3. You’ll now be asked to read and accept the terms and conditions
4. When prompted, set a Verification code.  This can be any alpha-numeric code between 6 and 12 characters
5. The Status will now show Online.  If not, please see troubleshooting at the end of this guide.

Setting up the Hik-connect app
6. From yours or the customers phone, download the Hik-Connect App from the App store or Google Play
7. Once installed, open the app and you’ll be presented with the login screen, tap on Register
8. Follow the on screen instructions to setup a Hik-connect account. You will need to verify the account by using a valid email address or phone number

10. You have now registered the Hik-Connect account. Make a note of the username and password. These login details will need to re-enter if their phone is reset, the app is reinstalled, or they want to use Hik-connect on another device.

Adding the recorder to Hik-connect
11. You’ll now be taken into the app and prompted to add a device. Click the + symbol to add a device and the phones camera will open.
12. Now on the recorder navigate to the Platform Access page, right click and go to Menu>Configuration>Network>Platform Access.
13. Scan the QR code with the phones camera.
14. If prompted, enter the verification code you created and skip the port settings
15. The cameras connected to the recorder will now be visible on the mobile Hik-Connect app.  Select the camera you want to view and click Start Live View

 

Troubleshooting

I haven’t received a verification code: Please check your spam folders and email filters. If the problem persists consider registering with a different email or mobile number.

Hik-Connect status is offline: Ensure the enable box is ticked on the ‘Platform Access’ page and that your unit has a working connection to the internet.  Check the network settings are correct for the network you are connected to.

I get a message saying the device is already registered: Devices can only be added to a single account. To view the device on multiple phones or tablets, you just need to install Hik-Connect app, and then log in with the details of the Hik-Connect account the device is registered to.

I don’t have an option for platform access: Please contact your supplier/installer with your device’s serial number and current firmware version as the unit may need a firmware update. This information can be found in the ‘Maintenance’ menu.

May 09

OCULi Wireless PIR Camera

OCULi is a product range of battery powered wireless, PIR motion sensors which have integrated colour/monochrome cameras and infrared illuminators. These products provide rapid video verification of alarm events using the mobile phone 3G network. A dedicated cloud server and web portal provides a full monitoring system as well as an easy way to set up and control the detectors. Alarms and alerts are sent to the OCULi mobile phone app as Push Notification as an alternative means of monitoring.

OCULi System Overview

OCULi uses the mobile phone 3G network and can be sited anywhere there is a network signal available. Simply sign up to SIM usage on a rolling monthly contract and you are ready to go. (SIM price includes the use of the cloud server). Images are streamed over 3G giving exceptional speed and quality of delivery. Connection time to the network using our roaming SIM is fast and non network specific so the strongest signal will always be used. All video & data is stored on the SD card and cloud server until it is deleted by the user.

Superior VGA 640×480 colour video starts filming in just a few milliseconds after detection ensuring that events are not missed. Unrivalled monochrome night-time clarity is achieved using powerful IR LED lighting.

PIR detection range is 15 metres x 90° using a Quad Pyro Sensor and falls well within the camera’s field of view of 135° to ensure detected movements remain in view. Bluetooth® facilitates easy set up using the mobile phone app to determine signal strength, camera view and PIR detection coverage. Sensitivity, pulse counting and AND gating are all configurable using the App or web portal.

Each OCULi detector is programmable to automatically set and un-set up to 3 times per day on a 7 day timer.

On site Arm/Dis-Arm can over-ride the automatic schedule by using the OCULi phone App.

Quad pyro technology minimises false alarms and ensures superior detection performance. OCULi is fully tamper protected with IR anti-masking, 3 axis inertia sensing and enclosure tampers.

TimeLine video® feature ensures that the product is working correctly and provides an extra level of surveillance.

 

PRODUCT IMAGES

 

 

FEATURES AND SPECIFICATIONS

BASIC INFORMATION
Power requirements 2 x Lithium ER34615M cells (not supplied)
External input voltage 12 volts DC
Mobile data 3G network to dedicated cloud server
Local wireless network Long Range Bluetooth®
Battery life (estimated) 1 year + (dependent on usage)
Micro SD card specification 8gb (supplied)
SIM card specification Micro SIM
Weight 850g
Operating temperature range -20°C to +60°C
Mounting height 2.5 – 4 metres
Weather rating IP66
Warranty 2 years
DETECTOR INFORMATION
Motion detector type Passive infrared
Sensor type Quad Pyro
Lens type Fresnal
Detection range 15 metres x 90° (see diagram)
CAMERA INFORMATION
Camera sensitivity 6 volts per lux per second
Camera resolution 640×480 VGA
Colour/Monochrome
Camera lens Wide angle 135°
Video sequence 2 frames per second over 7 seconds (configurable)
LIGHTING INFORMATION
IR LED IR Frequency 850nm
IR Power 1 amp
IR Distance 15 metres
TRANSMITTED EVENT MESSAGES
Alarm output
Shock sensor
Tamper output
Anti-masking output
3 Axis orientation sensor
LOW battery
Signal strength
TimeLine Video®
Heart beat

 

 

 

DETECTION PATTERNS

 

Mar 28

Materials Needed: RG59 Coaxial Cable, BNC Plugs, Coaxial Cable Stripping Tool, BNC Crimp Tool.

 

To make up a BNC cable first, using your cable stripping tool, strip about 20mm of the black outer cover from the cable exposing the copper braid, inner insulation and centre conductor.  Next place the BNC Ferrule onto the cable.  Then fold the copper braid backwards onto the black outer cover to reveal the white insulating material.  About 4mm of the white insulating material should now be removed and the centre pin of the BNC placed onto the centre conductor.  Using your BNC crimping tool, crimp the centre pin onto the centre conductor.  Now the BNC plug can be placed onto the cable, allowing the centre pin to be inserted through the BNC plug.  You should hear a click once the centre pin is inserted properly, be a snug fit and the BNC plug should hold the white insulating material.  You can now fold the copper braid over the BNC, place the ferrule over the copper braid and crimp using your crimp tool.  If any copper braid is still showing, it can be trimmed away with an appropriate tool.

 

The below image will show you how to attach a crimp-on BNC Connector to a RG59 Coaxial Cable.

Feb 14

Power over Ethernet (PoE) is a technology that lets network cables, such as CAT5e or CAT6, carry electrical power.

For example, a security camera would normally require two connections to be made when it is installed:

A network connection, in order to be able to communicate with a DVR and any display equipment.

A power connection, to provide electrical power the camera needs to operate.

However, if the camera is PoE-enabled, only the network connection needs to be made, as it will receive its electrical power from this cable as well.

Power over Ethernet reduces the number of cables required to connect a POE IP camera

Specifying Power over Ethernet brings many advantages to an installation:

Time and cost savings – by reducing the time and expense of having electrical power cabling installed.  Network cables do not require a qualified electrician to fit them, and can be located anywhere.

Flexibility – without being tethered to an electrical outlet, devices such as IP cameras and wireless access points can be located wherever they are needed most, and re-positioned easily if required.

Safety – PoE delivery is intelligent, and designed to protect network equipment from overload, under powering, or incorrect installation.

Reliability – PoE power comes from a central and universally compatible source, rather than a collection of distributed wall adapters.  It can be backed-up by an uninterruptible power supply, or controlled to easily disable or reset devices.

Scalability – having power available on the network means that installation and distribution of network connections is fast, simple and effective.

PoE has many applications such as:

VoIP phones – the original PoE application.  Using PoE means phones have a single connection to a wall socket, and can be remotely powered down, just like with older analogue systems.

IP cameras – PoE is now found throughout networked CCTV surveillance camera systems, where it enables fast deployment and easy re-positioning.

Wireless – Wifi & Bluetooth Access Points and RFID readers are commonly PoE compatible, to allow remote location away from AC outlets, and relocation following site surveys.

How to upgrade to PoE

Adding PoE to your network is straightforward, and there are two routes you can choose:

A PoE switch is a network switch that has Power over Ethernet injection built-in.  Simply connect other network devices to the switch as normal, and the switch will detect whether they are PoE-compatible and enable power automatically.

PoE switches are available to suit all applications, from low-cost unmanaged switches with a few ports, up to complex multi-port rack-mounted units with sophisticated management.

Adding Power over Ethernet using a POE Switch

A midspan (or PoE injector) is used to add PoE capability to regular non-PoE network links.  Midspans can be used to upgrade existing LAN installations to PoE, and provide a versatile solution where fewer PoE ports are required.  Upgrading each network connection to PoE is as simple as patching it through the midspan, and as with PoE switches, power injection is controlled and automatic.  Midspans are available as multi-port rack-mounted units or low-cost single-port PoE injectors.

 

Adding Power over Ethernet using a POE Midspan

 

X