Pyronix Intruder Detectors & Detection Systems (45)
Perimeter protection is one of the most effective ways to prevent an intruder. A more secure system is one that alerts the user of the presence of an intruder, before they can break into the property. It’s a simple idea, but fitting an external detector comes with challenges. Install the brand-new XDL12TT-AM and provide up to 12m premium and robust pet-friendly external detection. Consisting of two independent Passive Infrared (PIR) sensors and one microwave sensor, the Tri-Technology (TT) of the XDL12TT-AM utilises Tri-Signal Detection Logic to identify the presence of an intruder. This provides reliable and stable external detection as all three sensors must be activated sequentially in quick succession to create an alarm. This enhances the detector’s immunity to environmental disturbances and limits the risk of false alarms. With Dual-Vision Pet Immune Technology, each PIR sensor of the XDL12TT-AM has its own dedicated volumetric field of view. The top PIR detects outwards and up, while the bottom PIR detects outwards and down, without overlapping. This setup, alongside Tri-Signal Detection Logic, delivers highly secure sequential detection and increases its tolerance to pet immunity. So, should any large dogs or cats stray into the coverage plane, it would only be picked up by the bottom PIR and the microwave sensors and therefore an alarm condition would not be activated. However, the lens coverage of the PIRs are angled so that any human will be detected walking through both PIR coverage planes. Therefore, as all three sensors are activated, so would an alarm condition. This increases the detectors stability and limits the risk of false alarms. In terms of changing conditions and swaying vegetation, the XDL12TT-AM features Anti-Sway Analytics. This advanced digital filter distinguishing between the movements of trees and plants from that of an intruder, to maintain optimum performance. The detector also boasts IP55 weatherproof rating, thick polycarbonate plastics and fully sealed optics for optimum external performance. It has even been moulded with a stabilizing material to prevent discoloration over time! The XDL12TT-WE also features Anti-Interference Technology to prevent intruders from bypassing detection. This consists of Anti-Masking, which is a Grade 3 Patented Technology that protects against any attempt to mask any of the three sensors with cardboard, duct tape, sprays, lacquers or aluminium foil. It also consists of Anti-Blocking, which is a Grade 4 Technology that prevents the system from being armed if there is anything blocking the vision of any of the sensors. Therefore, to arm the system, whatever is blocking the detector from detecting needs to be removed first. Providing either volumetric or curtain coverage to suit the area that needs protecting, each lens can also be masked to restrict the coverage area. This is particularly useful in areas where busy roads can cause false alarms. The detector also boasts three different frequency bands to avoid any interference (cross-talk) that can occur when two or more detectors with the same frequency band are installed within close proximity of each other. This also allows multiple to be fitted, including the use of a fixed bracket, which enables two to be fitted back to back, providing 24m range with 180° volumetric coverage. Whatever the requirement, the XDL12TT-AM provides the ideal external security solution.Add to Compare
PIR Detectors, Dual Technology Detectors, Infra Red Beams, 15 m m coverage, 14 degree o detection angle, Microwave, Dual Element Sensor, 15 m, Temperature Compensation, Sealed Optics, Anti-Masking, 1.2 m, Independant Floating Thresholds (IFT), Outdoor, Wall, 9 ~ 16 V DC, 13.8 V DC, 188 x 84 x 77, -30 ~ +70 C (-22 ~ +158 F)Add to Compare
PIR Detectors, Dual Technology Detectors, 10 m coverage, 10 o detection angle, Microwave, Pet Tolerance, Dual Element Sensor, Temperature Compensation, Sealed Optics, Wall, Ceiling, 1.8 ~ 2.4 m, Wall, Ceiling, 117 x 69 x 59, -10 ~ +40 C (14 ~ 104 F)Add to Compare
PIR Detectors, Dual Technology Detectors, Infra Red Beams, 15 m coverage, 85 degrees o detection angle, Dual Element Sensor, Temperature Compensation, Sealed Optics, 1.8 ~ 2.4 m, Yes, White Light Filter, Wall, ceiling, 117 x 69 x 50, -30 ~ +70 C (-22 ~ +158 F)Add to Compare
As the intruder market increasingly converges, with products and solutions entering from various rival markets, the time to integrate and evolve is now. There has been a rapid increase in end-user targeting, with solutions that deliver more than just security, but lifestyle solutions, including remote video monitoring, automation capabilities and more. This added value makes a system a desired enhancement to day-to-day life, rather than simply a grudge purchase to deter or alert of intrusion. It’s time to advance into new market applications and grow your business, by offering it all, with the totally integrated Enforcer V12 and Hik-Connect smart device application. With professional security integrity in mind, Hik-Connect is a user-friendly smart device application that brings together Pyronix multi-award-winning intruder security systems and technologies, with Hikvision’s world-leading video surveillance technologies and innovation. This seamless synergy enables you to deliver fully integrated and secure systems that are easy-to-install, flexible, extensive and meet your end users’ needs and desires. Thanks to seamless Hik-Connect integration, you can offer the ability to arm and disarm, check the status of any detector or sensor on the system and control any automation outputs, as well as access complete video monitoring of the property from anywhere, thanks to compatibility with any Hikvision video device. Available on Android and iOS, your end users can check any events, monitor when their children have arrived home safe from school, see what pets are getting up to, monitor outbuildings or even answer their front door or respond to deliveries with mic-enabled cameras, as well as see all the push notifications they have received - all from the palm of their hand. Should an event occur on the system, they can also simply and easily switch between their control panel and cameras for quick video verification. This simple switching also allows for easy multi-site monitoring, access to camera recordings and previews of live-streams. Deliver a security and video monitoring center in the palm of the end user’s hand for any residential or commercial purpose. Hik-Connect is compatible with app-enabled Pyronix Grade 2 and Grade 3 security systems; offering outstanding usability and flexibility that is simple to install and easy to use. It’s time to advance. It’s time to integrate.Add to Compare
PIR Detectors, Dual Technology Detectors, 10 m coverage, 85 degree o detection angle, Microwave, Pet Tolerance, Dual Element Sensor, 24 mA ~ 30 mA, Temperature Compensation, Sealed Optics, Wall, Ceiling, 2.4 m, White Light Filter, Wall, Ceiling, 9-16 V DC, 13.8 V DC, 117 x 69 x 50, -10 ~ +40 C (14 ~ 104 F)Add to Compare
PIR Detectors, 12 m coverage, Microwave, Dual Element Sensor, Temperature Compensation, Sealed Optics, 1.2 m, White Light Filter, Independant Floating Thresholds (IFT), Outdoor, Wall, Battery - 2x 3V 4700mAh Lithium battery packs (BATT-ES1), 188 x 77 x 84, -30 ~ +70 C (-22 ~ +158 F)Add to Compare
PIR Detectors, Dual Technology Detectors, Glassbreak Detectors, 15 ~ 18 m coverage, 85 o detection angle, Microwave, Dual Element Sensor, 24 ~ 30 mA, Temperature Compensation, Sealed Optics, Anti-Masking, Wall, Ceiling, Yes, White Light Filter, Selectable Pulse Count, Wall, Ceiling, 9 ~ 16 V DC, 117 x 69 x 50, -10 ~ +40 C (14 ~ 104 F)Add to Compare
Dual Technology Detectors, Infra Red Beams, 10 m coverage, 90 o detection angle, Microwave, Dual Element Sensor, 24mA, Temperature Compensation, Sealed Optics, Anti-Masking, Wall, Wall, 9 ~ 16 V DC, 188 x 84 x 77, -30 ~ +70 C (-22 ~ +158 F)Add to Compare
PIR Detectors, Quad Technology Detectors, 12 m coverage, Dual Element Sensor, 50mA, Quad Element Sensor, Temperature Compensation, Sealed Optics, Ceiling, 2.4 ~ 4 m, Independant Floating Thresholds (IFT), Ceiling, 9 ~ 16 V DC, 80 x 80 x 29, -10 ~ +50 C (14 ~ 50 F)Add to Compare
Browse Intruder Detectors & Detection Systems
- PIR Detectors
- Glassbreak Detectors
- Infra Red Beams
- Shock Sensor
- Pet Tolerance
Intruder detector products updated recently
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organized, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognize the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.
For decades, the nature of global safety has been evolving. From physical security threats like large-scale terrorist attacks and lone actor stabbings to chemical threats such as the Salisbury poisonings and even microbiological threats such as COVID-19, new challenges are constantly arising and the threat landscape we operate in today is constantly changing. Compounding the complexity of the security issues is the complexity and nature of attacks. With the economic downturn, there is the traditional rise in theft, violence and other crimes. Compound this with unmanned businesses and work-at-home staff, and there is a perfect storm for a rise in security threats. Artificial intelligence (AI) and specifically the branch of AI known as machine learning (ML), was already causing widespread disruption in many industries, including the security industry. AI has been a driving force to replace labor-based business models with integrated data and actionable intelligence that is context-aware. It has become apparent that AI will play a big part in the ongoing fight against both pandemics such as COVID-19, as well as other threats that we may face in the future. With all of this in mind, 2021 is poised to be a big year for AI growth. While AI is going to continue to impact our lives in dozens of ways, from smart sensors to face mask compliance detection, the following reflects a few top trends and challenges that I have my eye on for 2021 as we close out this year. The rise of smart city investments One such example is the increasing development of smart cities and how AI can be leveraged to build safe communities. To date, we’ve seen an increase in the number of smart city programmes around the globe; cities that are beginning to deploy innovative technologies for the management and ease of life services. Compounding the complexity of the security issues is the complexity and nature of attacks Typical development of a city includes standard infrastructure - roads, schools, power, water, transportation. Now, internet, data and AI capabilities are part of the standard infrastructure requirements for all new developments. AI promises to deliver increased efficiencies with the infrastructure that will accommodate growing populations while reducing our impact on the environment, resources, and communities. Global cities now account for more than half of the world’s population, and the United Nations projects the number to balloon to 68% by mid-century. Owing to both demographic shifts and overall population growth, that means that around 2.5 billion people could be added to urban areas by the middle of the century, predicts the UN Department of Economic and Social Affairs (DESA). With an increase in population has come an increase in global spending on smart city initiatives to drive down the impact of growing urban concentration. Global spending on smart city initiatives is expected to total nearly $124 billion this year, an increase of 18.9% over 2019, according to IDC's Worldwide Semiannual Smart Cities Spending Guide, while Singapore, Tokyo, London and New York as the big spenders - expected to spend more than $1 billion in 2020. Using AI-driven technology to create safer public and private spaces Today, security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments to protect the population in a more efficient, and accurate manner. As we look ahead to the future of public safety, it’s clear that new AI technology can dramatically improve the effectiveness of today’s physical security space. One such deployment is the use of video object recognition/computer vision software that can be integrated into existing video monitoring security (VMS) systems. These enhanced VMS systems can be deployed both inside and outside of buildings to identify risks and flag threats, such weapons, aggressive behaviours, theft, and safety compliance. This helps to minimize the impact of a breach by an early alert to onsite security in real-time to the location and nature of the potential threat, allowing them to intervene before a loss occurs. These same AI-enabled video solutions can similarly be used to provide advanced business operations in retail, logistics, and manufacturing organizations. Multi-sensor security solutions Also, targeted magnetic and radar sensor technologies, concealed in everyday objects like planter boxes or inside walls, can now scan individuals and bags entering a building for concealed threat objects. Using AI/machine learning, these two sensor solutions combined can identify metal content on the body and bag and match the item to a catalog of threat items, such as guns, rifles, knives and bombs. Security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments Without this advanced multi-sensor solution, it becomes nearly impossible to discover a weapon on a person's body before it appears in an assailant’s hands. This multi-sensor solution allows for touchless, unobtrusive access to a building, but allows for immediate notification to onsite security when a concealed threat is detected. The hidden technology thus empowers security staff to intercept threats before they evolve into a wider scale attack, while also maintaining the privacy and civil liberties of the public, unless, of course, they are carrying a concealed weapon or pose a physical threat. With the advent of sophisticated surveillance and technological innovation, a level of caution must be exerted. Despite the ongoing global debate, there remains little regulation about the use of AI technologies in today’s physical security space. One thing is certain; it must be deployed in the right place, at the right time, with the right privacy and civil liberty protection objectives. People don’t want to be protected by omnipresent, obstructive and overbearing security systems that infringe on their privacy and civil liberties. They want a proper balance between security and their current way of life, one that must be fused together. Technology and tracing COVID-19 Machine learning-based technologies are playing a substantial role in the response to the COVID-19 pandemic. Traditionally, the key purpose of surveillance systems has been to detect and deter threats, including the detection of visible and hidden weapons and abnormal behavior. While this, of course, remains a primary focus, today we are seeing how surveillance systems defend against new invisible threats, as well as rapidly automate the process of contact-tracing to capture and contain a virus before it spreads. Again, the ability to track and trace through parsing algorithms that can manage through enormous amounts of data provides a highly scalable and rapid response mechanism to control the spread of threats. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact Although the threat may not be visible, it is just as destructive. By incorporating AI into existing technologies, government, healthcare and security professionals can monitor public spaces and environments through the combined use of digital and thermal video surveillance cameras and video management systems); just one of the solutions being explored. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact. By Using AI-powered video analytic software, businesses can monitor face masks, social distancing and large gathering compliance and also detect elevated body temperature. Critically, technology must be capable of both identifying and tracking the virus but also be unobtrusive. An unobtrusive system that is adaptable enough to be deployed across a range of environments where the public gathers in enclosed spaces is necessary to be effective. Security in 2021 Technology has proven itself to be a valuable ally in times of crisis. For smart cities, the use of innovative AI/machine learning technologies will help optimize security solutions in areas that are brimming with potential. As we look ahead to the future of security in a world that is impacted by such a wide range of threats, from physical to chemical to microbiological, it’s clear that new technologies, specifically AI can dramatically improve the effectiveness of security systems and help us to better defend against a wide spectrum of threats. Technology has a huge role to play in making our communities safe in 2021 and beyond, but for security systems to be effective, they must not be oppressive or obstructive. This will ensure they have the full support of the public - the key to success.
Pyronix has released news of its new logo, as part of an ongoing program of activities, aligning the brand with their long heritage and status as a renowned player in the United Kingdom and Ireland (UK&I) security markets. Pyronix brand refresh Commenting on the brand refresh, Pyronix Marketing Director, Laurence Kenny, said “Our new logo is reflective of our position in the UK&I markets as a technology based, forward-looking, fresh and dynamic organization. We pride ourselves on our customer focus, services and product evolution designed to bring our customers along with us while helping them grow their professional installation businesses.” With 2021 marking the company’s 35th anniversary, the brand refresh isn’t just cosmetic for Pyronix, but represents the evolution of the business and its commitment to delivering innovative product solutions and outstanding customer services. Focus on UK&I security markets Following the acquisition in May 2016, Pyronix continues to operate within the Hikvision group of companies" Pyronix operates out of five sites in the United Kingdom (including three in Rotherham, South Yorkshire) and employs over 230 people in the UK. The manufacturing unit in Rotherham, purpose built in 2015, produces the majority of Pyronix’ products, with a separate distribution center, head office, and two dedicated R&D centers, one in Doncaster and one in Bracknell. “Following the acquisition in May 2016, Pyronix continues to operate within the Hikvision group of companies. Currently, our main focus is the UK&I security markets and we are excited to introduce many new products and solutions in the near future,” said Guy Dodd, Pyronix UK&I Sales Director. Changes across the board Pyronix is rolling out the brand refresh over the coming months, with changes across the board, including packaging and other materials. Laurence Kenny further stated, “With our strong brand in the UK&I, we wanted to send the message of our evolution, not revolution, and feel that this refresh better represents Pyronix to our existing and new customers, reminding everyone of exactly who we are and what we’re about: Customer focused, British design and manufacturing, UK&I focused product development.”
Pyronix launches its latest security peripheral, the MCEXTERNAL-WE outdoor wireless magnetic contact. Perimeter security This tough, tamperproof and weatherproof contact extends perimeter protection applications to secure sheds, garages, gates, and more, with remote voice push notification alerts via the smart device apps, HomeControl2.0 and ProControl+. “We’re very pleased to add this perimeter protection option to the range, as this really extends perimeter protection use case applications of the system as a whole,” Laurence Kenny, Pyronix Marketing Director, said. Easy to fit and voice recognition Featuring an IP66 rating, this highly discreet and versatile Grade 2 device is easy to fit and calibrate while delivering reliable performance with reduced false alarms, even with gaps of up to 70mm between contact and magnet. MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes Connect the MCEXTERNAL-WE to security cameras to provide perimeter protection with voice push notifications and instant video verification of any intrusion via ProControl+. “The MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes, whether securing an outbuilding or a gate,” Laurence said. Voice and video- verification He continued: “We’re delighted to add this outdoor contact to the range, as a system can now offer both volumetric coverages of an area using our outdoor XD detectors, as well as a specific outbuilding and perimeter defense with the MCEXTERNAL-WE.” “By adding this to our app-enabled systems, the user will be notified via a voice push notification to their app whenever the contact is triggered – letting them know of a break-in or to simply tell them that their gate has been opened.” “If the contact has been linked to one of our cameras, say the LightCamera, the user will also receive Full-HD video verification and active defense capabilities via ProControl+; increasing not only the level of interactivity and value our security system provides users, but also upsell opportunities for our installers.” Wireless installation Built from quality plastics for satisfying installation, the MCEXTERNAL-WE also provides a wireless range of 300m in open space and outstanding 2-year battery life. Extend perimeter protection applications with the tough, tamperproof, and weatherproof MCEXTERNAL-WE. Secure from the outside in.
Pyronix is pleased to announce the release of its second-generation CO-WE detector - providing protection against carbon monoxide with newly added features. Carbon monoxide (CO) is a colorless, odorless, tasteless, and highly toxic gas that can be deadly if it accumulates in enclosed spaces. The CO-WE (2nd Generation) is an essential lifesaving device, which protects homes and families against this danger; raising the alarm locally via its 85dB sounder and remotely via connected Pyronix smart device apps, if CO is present. Enhanced features The main detection element features a fixed and non-replaceable L91 lithium battery, continuously detecting within a property and providing peace of mind for 10 years. The radio module which connects to the Enforcer has a replaceable CR123A battery, providing our usual lifespan of up to 2 years. Similarly, to the recently released HEAT-WE, the CO-WE (2nd Generation) now features a test button on the front of the detector. This is also used as the radio learn button, which cuts down installation time and prevents having to open the detector, to learn onto the panel. Laurence Kenny, Marketing Director, said: “We’re delighted to announce the second generation CO-WE to our expanding Life Safety range. It provides great new features such as the easy learn button and a superior 10-year battery life in the detector, providing peace of mind and excellent protection against carbon monoxide.” Additional benefits The CO-WE (2nd Generation) now also features self-diagnostics, meaning if there’s anything wrong in the detector itself, fault messaging within the main element will send the fault over to the panel and flashing LEDs on the detector will denote what the issue is. Radio features such as encrypted two-way wireless technology, Signal Strength Indicators (SSI), and one-push-to-learn are also included on the detector. “This release demonstrates our continuous commitment to advancements within our existing products, while also remaining focused on developing new products to bring to the market,” Laurence said.
Related white papers
Market Report: Cannabis At A Glance
Optimize Your Business with Analytics and AI
Cloud-based Access Control And Occupancy Management To Safeguard WorkplacesDownload
Wireless Access Control eBookDownload
How Security Systems Ensure Healthy Workplaces During COVID and AfterDownload
How Are AI And Analytics Changing Physical Security, And What Should We Expect Next?Download
Digital Barriers’ Real-Time Surveillance And AI-Based Edge Analytics Solutions Help Counter The Rise In Rural Crime In Wales
Aiphone IS Series Video Intercom Installed To Enhance Visitor Management And Communications At The Congregation Beth Jacob
- Digital Barriers’ Real-Time Surveillance And AI-Based Edge Analytics Solutions Help Counter The Rise In Rural Crime In Wales
- Aiphone IS Series Video Intercom Installed To Enhance Visitor Management And Communications At The Congregation Beth Jacob
- ClanTect And ePm Sign Agreement To Offer Next-Gen Systems For The Detection Of Humans In Vehicles In The UAE
- BIRD Aerosystems Secure Contract From Czech Republic Air Force For Delivery Of AMPS-MV Systems With Patented MACS