DualCom GradeShift range incorporates its GradeShift technology that provides installers with a dual path single hardware solution
DualCom's training video provides step-by-step guide on installation of Dual GradeShift range

We are pleased to announce the arrival of the DualCom Installation Training Video. We have put together 12 individual sections that have been tailored to provide Installers with a step-by-step guide on how to install The UK’s favorite dual signaling, the DualCom GradeShift range.

For ease of reference you can conveniently view the section of interest and have the answer in minutes. These are all available to download from our website and we even have versions for your mobile phone so you can view them whilst on site!

 The DualCom GradeShift range incorporates DualCom’s unique GradeShift technology providing installers with a dual path single hardware solution for every grade of risk, G2, G3, G4 or Fire. It is priced according to the grade of system required by the installer so that they only pay for the grade they need. The grading of the DualCom can be increased or decreased remotely at any time with a simple call from Installer to ARC; there is no need to change the hardware.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...