Monitoring of the security system
Alarm monitoring is an integral part of an effective security system. It is important to take action when an alarm is detected in your facility. [ ... ]
After receiving the alarm, the monitoring station operator will take action. There are various types / methods of monitoring the alarm system, among others: Monitoring of the GSM security system This type of monitoring uses a GSM communicator with two SIM cards to transmit alarm signals over the cellular network. GSM monitoring is quickly becoming the preferred method of monitoring due to the following advantages: There is no need to connect to telephone lines, which eliminates the cost of telephone calls However, to provide an additional alarm transmission path, you can use an analog telephone line by connecting it to the GSM communicator circuit Spare GSM communication track using two SIM cards Fast, encrypted and reliable communication with the monitoring station, including regular retrieval of test information from the alarm system in order to keep it online. The ability to remotely verify the technical condition of the communicator. The ability to control the communicator, and through it the alarm system or home automation. IP monitoring - The security system uses your existing LAN IP network to send signals to the monitoring station. It is regularly checked to ensure that the system is online. IP monitoring can be configured for high-security objects with full redundancy as well as for lower-risk objects. Each system can be adapted to your budget. Alternative communication paths, such as GSM, are available in the event of a network failure. Monitoring over the telephone line This type of monitoring consists in connecting the dialer dialer to the analog telephone line. The alarm system selects the station number of the monitoring station and sends messages in extended communication formats, eg Contact ID or SIA via a standard telephone line. Because such a monitoring system is not connected to ACO in OnLine mode, it is particularly recommended to enable sending regular test connections to check the integrity of the system and the ability to send alarm events.