HD CCTV Package 3
S$1,088.00c/w Standard Accessories & Installation
2 MP IR Fixed Network Dome Camera + NVR + 1TB Hard disk c/w standard accessories and installation; 1TB HDD; 1 year on site warranty
HD CCTV Package 2
S$888.00c/w Standard Accessories & Installation
2 MP IR Fixed Network Dome Camera + NVR + 1TB Hard disk c/w standard accessories and installation; 1TB HDD; 1 year on site warranty
HD CCTV Package 1
S$688.00c/w Standard Accessories & Installation
2 MP IR Fixed Network Dome Camera + NVR + 1TB Harddisk c/w standard accessories and installation; 1TB HDD; 1 year on site warranty
Wire-Free Video Doorbell with Chime
S$168.00DB2C is an intercom kit from EZVIZ containing the ring doorbell, armed with a build-in 2MP camera
Resolution of Ultra-HD (1536P)
The DB2C is a smart doorbell kit that contains a wire-free video doorbell and a chime. Since there’s no rewiring necessary, you can see and hear your visitors and answer the door from anywhere. Start a smart, safe, convenient life thanks to its many powerful features.- The DB2C kit contains a 100% wireless smart video doorbell (combined with a 2MP camera of 1536p) and a chime device
- Advanced automatic night vision mode with a PIR-sensor
- 2.4GHz Wi-Fi connection
- Multi-storage options: supports MicroSD card (maximum capacity of 256 GB) and encrypted cloud storage
- Build-in microphone and a loud speaker
EZVIZ 360° View Camera CS-CV248-A3-32WMFR
S$168.00Supports MicroSD Card (Up to 256GB)
True Day/Night, Auto Switch, Infrared Night Vision (Up to 10 meters)
EZVIZ 360° View Camera CS-CV248-A3-32WMFR is a Wi-Fi pan-tilt camera that gives full-room coverage and delivers clear 1080p FHD video in rich colors and sharp details.- 1080p
- Privacy Shutter
- 360° Horizontal FOV
- Two-Way Audio
- Smart Tracking
CS-C6N-B0-1G2WF Smart Wi-Fi Pan & Tilt Camera
S$168.00Smart Wi-Fi Pan & Tilt Camera, Smart Night Vision with Smart IR
Motorized Pan and Tilt 360degree Visual Coverage
The C6N from EZVIZ comes equipped with a Smart IR function, which uses advanced infrared (IR) lighting to capture more details in dim light. With its 360-degree field of view and smart tracking function, you won’t need to worry about missing a thing.
- 1080p
- Smart Night Vision with Smart IR (up to 10m / 33ft.)
- Motorized Pan and Tilt 360° Visual Coverage
- Sleep Mode for Privacy Protection
- Motion Detection
- Smart Tracking
- Two-way Talk
- View from Anywhere
- Wi-Fi 2.4 GHz
- MicroSD Slot (up to 256 GB)
Keypress Management
Key management for efficient control of key handovers
Secure storage and electronic management of keys
Manual key management costs a lot of time and energy. A key is quickly lost, the trouble is enormous, searching for it is time-consuming and often unsuccessful. With more and more mechanical keys in circulation, you can quickly loose track. A manual issue of keys, e.g. for security-relevant buildings, rooms, commercial properties, industrial sites, vehicle parks and fleets, can result in an immense administrative effort, significant security gaps and very high costs.
Would you like to save yourself this hassle and your valuable time by leaving the key chaos behind? Would you like to have a better overview and full control over your numerous keys? Keypress Management provides efficient solutions for key management. With electronic key management, user access to individual keys can be pre-defined and clearly managed via the Commander Connect software.
- 100% maintenance free - thanks to RFID technology the keyTags attached to the keys operate contactless - this means inserting the tags in the slots does not result in any wear and tear.
- Local or global - Our software is web-based so it supports administration across multiple locations. This means you are easily able to centrally monitor systems in different locations.
- Software - A variety of features and modules for diverse applications. All access is automatically documented and the information issued in user definable reports.
- Emergency operation mode - All cabinets remain operational - even in the case of a power or network failure. The data is stored locally and an integrated emergency battery secures continued operation.
- Guaranteed future proof - All installed modules are replaceable and backwards compatible. If the requirements change, the system can move with the times accordingly.
- Made in Germany - Their function and quality are developed, produced and tested to the highest standards.
Guard Tour Management
Security guard and plant protection
Comprehensive recording of mobile and stationary security services
dataLog is the market leading proof-of-visit and patrol verification system, that records the presence and location of security, cleaning and maintenance personnel at given locations and times. dataLog systems allow better use of staff, improves efficiency, and provide accurate and fast audit information on work carried out. Most importantly they highlight any checks that were missed, so that appropriate action can be taken.
The main components to a dataLog proof-of-visit system are a handheld data collector, location checkpoints and management software. Checkpoints are fixed to locations to be visited, and the worker carries a robust handheld data collector which they use to read the checkpoint when it is visited. The checkpoints identification number and time of the visit is recorded by the data collector.
dataLog systems are ideal to determine the location of security guards and other workers where security, safety, servicing or cleaning checks need to be done. deister dataLog systems are used globally for manned guarding operations and many other applications where a mobile worker’s attendance at a given location needs to be verified.
- 100% maintenance free – Checkpoints are maintenance free, they do not contain batteries or hard wiring. The RFID proximity checkpoints are suitable for use internally or externally in all weather conditions.
- Easy to use – Checkpoints are easy to read, simply hold the data collector close to the checkpoint, that’s it. No buttons to press or apps to open.
- Long battery life – Best in class operational time with the guardiX II being able to read up to 500,000 checkpoints from a pair of AA batteries. With no recharging necessary the collector is always ready to use.
- Connected systems – dataLog works with other deister systems to allow events to be combined within common reports across different systems.
- Robust & reliable – The guardiX II is IP67 classified and has no buttons, switches or other external moving parts that could be prone to failure.
- Backwards compatible – guardiX II data collectors are backwards compatible with all deister RFID Checkpoints that have been supplied for many years.
Smart Storage System
Intelligent asset management systems with handling automation
Automatic issue and return of valuables
Are your important assets and resources used efficiently? It‘s often all to easy too lose track of who has what item, when it is last used and especially the condition that it is returned in. proxSafe smart storage systems identify who has your essential assets by controlling who has them with full audit and reporting capabilities. Users are identified by card, pin or biometrics allowing them to only take the items that they are authorised to have, ensuring you have complete accountability of your company’s shared portable equipment. Radios, test equipment, tools, laptops and much more can now be managed automatically so you know that the equipment is ready when you need it.
- Intelligent management - Intelligent resource monitoring controls removal of resources evenly with the same usage. Criteria parameters for the intelligent management of the items can be chosen.
- Local or global - Our software is web-based so it supports administration across multiple locations. This means you are easily able to centrally monitor systems in different locations.
- Software - A variety of features and modules for diverse applications. All access is automatically documented and the information issued in user definable reports.
- Emergency operation mode - All cabinets remain operational - even in the case of a power or network failure. The data is stored locally and an integrated emergency battery secures continued operation.
- Integrated charging - Ensure that the asset is ready for the next shift. Equipment can be charged whilst the item is stored in the cabinet. The state of charge is also displayed.
- Made in Germany - Their function and quality are developed, produced and tested to the highest standards.
Vehicle Identification (AVI)
Identify vehicles reliably
Long-range identification made simple
The fast and reliable long-range identification solution automatically identifies both drivers and vehicles in any weather conditions. Queues in vehicle access and exit areas are a thing of the past. Ideal for car parks, traffic management and free-flowing vehicle access control (AVI). The technology is also suitable for monitoring rail traffic as well as vehicle access barriers in city centres, airports and at toll roads. Thanks to numerous interfaces it is possible to integrate tranSpeed seamlessly into other control systems - but it can also be used as a stand-alone solution. There is a wide range of transponders available; these include robust heavy-duty transponders, self-adhesive stickers for windscreens and ISO cards, which perfectly combine two reader technologies.
- Intuitive Guidance - Large LEDs and unambiguous signal tones give the user distinctive visual and audible feedback.
- Security - A specially developed vignette/sticker function in combination with deister‘s “smart frame” ensures data security as well as protection against manipulation.
- Dual technology - Combine vehicle and person access control systems in a single card. It is possible to integrate both technologies into the same transponder and achieve maximum range.
- Plug & Play - The compact design including integrated antennas means it is possible to connect standard power and data lines to the readers by means of a single connector.
- Test - The POC makes the field strength visible at every position. That makes it child’s play to find the best position for the transponder.
- Made in Germany - Their function and quality are developed, produced and tested to the highest standards.
Biometric Rack Access
Biometric Rack Access allows IT or rack managers to track the audit trails of who accessed or serviced the racks.
Biometric Rack Access is secured using our Fingerprint identification device.
Server Racks have been used to hold important data at data centres and other designated areas but often than not, only the logical access security have been addressed and not the physical security of the racks themselves. To date, there are more and more threats due to data leaks and theft and it is becoming increasingly important to secure server racks with accountability.
We have come up with an ingenious solution to secure server racks that allows IT or rack managers to track the audit trails of who accessed or serviced the racks. The rack managers can also allow for the convenience of opening the racks remotely. Email or SMS messages can be sent to alert IT or rack managers if a rack is compromised such as the rack door not being locked properly or being forced open, or simply left open. The solution also allows real time monitoring of the racks.
For this solution, racks can be biometrically secured using our Fingerprint identification device. If there are issues with the fingerprint, Card access can also be used as an alternative bypass optional feature.
- 100% Secure Access Control for Server Cabinets
- Time-tested Technology in a Reduced Footprint
- Centralized Administration of Up to Thousands of Units
- Able to control front and rear door of rack with fingerprint or card reader
- Various Card Option - 125kHz EM, HID / 13.56MHz Mifare, Felica, iClass, HID, CEPAS (Option)
- Superior Matching Engine - 1st rank in FVC (Fingerprint Verification Competition)
- System Status Check - LED indicator shows status of terminal (Red, Blue, Green)
- RF Card can also be used as an alternative bypass optional feature
- Audit trails of who accessed the racks
- Real time monitoring of the rack status
- Identification method : Fingerprint and RF Card Identification