Altronix Power supplies & batteries (147)
As more video surveillance and security systems continue to migrate to IP networked platforms, the benefits of Power over Ethernet (PoE) continue to gain traction and grow in demand. NetWayM Managed PoE Midspans are IEEE 802.3af and IEEE 802.3at (PoE Plus) compliant to support both PoE cameras and edge devices, as well as non-PoE compliant IP 12 V DC cameras. "NetWayM Managed PoE Midspans provide a practical solution for networked video and security systems that support both PoE and non-PoE compliant devices," said Alan Forman, President, Altronix. "NetWayM further extends the different variety of edge devices system designers can specify for system upgrades and new system builds that take advantage of PoE." The NetWay8M features eight ports with a total output of 150W, and the NetWay16M features sixteen ports with a maximum output of 300W. Each port has a maximum output of 30W and will automatically adjust power to the PoE device connected. Power allocation for each port is designated in prioritised order which can be programmed through an Ethernet port that also facilitates status monitoring via a PC. Unused ports can be disabled to prevent unauthorized network connections, and each port can be individually shut down for service/maintenance. Additionally, a trigger input disables power to specified ports on-demand. Cameras / edge devices may be located up to 100m (328 feet) from the NetWayM Managed PoE Midspans, and this distance can be extended in 100m (328 feet) increments using NetWayXT repeater modules. Both models are designed in 1U 19-inch EIA racks, UL/CUL Listed for Information Technology Equipment (UL 60950-1), and backed by a lifetime warranty.Add to Compare
Browse Power supplies & batteries
Power supply & battery products updated recently
In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.
The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labor costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organizations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practise, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.
In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive Approach To Risk Mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 And Beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond. Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating Security Integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.
Altronix, the provider of power and data transmission products for professional security applications, continues to expand the company’s popular line of Trove™ Access and Power Integration Solutions. Altronix Trove™ now seamlessly integrates with Swiftlane DCU 5 Door Controllers, simplifying board layout and wire management. Systems integrators can now easily configure and deploy Swiftlane access control for up to 12 door systems. Companies are rapidly moving to cloud-based access control solutions in the remote first post COVID world. The Swiftlane and Altronix partnership now enables rapid deployment of contactless entry to offices through face recognition and mobile credentials. Remote access grants By using a combination of remote access grants for face recognition, mobile and PINs, and a cloud-based access control and wireless video intercom solution, companies can now manage primary and satellite offices remotely. Regarding multifamily buildings, package theft has become a major problem. Food deliveries are at an all-time high, increasing burden for property access. Food deliveries are at an all-time high, increasing burden for property access Technology like video-based wireless intercoms and remote unlock can now be deployed seamlessly using the Altronix-Swiftlane solution, creating user experiences that residents desire. “Our collaboration with Swiftlane streamlines the design and installation process, saving time and labor which ultimately makes projects more profitable,” said Alan Forman, President, Altronix Corporation. “In addition to the convenience and cost-efficiency these preconfigured Trove kits deliver, they can be further customized with a number of options including advanced network communications.” Access control solutions Altronix and Swiftlane pre-configured Trove kits support four and twelve door systems. Trove1 and Trove2 solutions provide scalable flexibility for custom applications, where specific power requirements are needed. “Our partnership with Altronix provides high degrees of efficiency and convenience to systems integrators and end users by expediting system deployment with assuring quality and performance.” “Altronix has a long history of delivering reliable, efficient and versatile power solutions. By combining Swiftlane's face recognition and mobile access control solutions with Altronix’s Trove solutions, we are able to deliver rapid deployment of touchless access control technology,” said Saurabh Bajaj, CEO and Founder, Swiftlane. “We look forward to further enhancing this combined offering as new products and solutions become available from our respective companies.” Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.
Altronix, the provider of power and data transmission products for the professional security industry, announces that their recently introduced NetWay4BT and NetWay8BT 802.3bt 4PPoE managed midspans are UL294 listed for access control systems. The UL294 listing reaffirms the high quality and performance of these solutions that end-users, architects, and security consultants demand mission-critical access control applications. Data transmission solutions “Our new NetWay midspans provide the precise power for the latest 802.3bt compliant IP devices,” said Ronnie Pennington, Director of Sales for the Americas at Altronix. “Now UL294 listed, these versatile power and data transmission solutions provide the added assurance for optimum performance and reliability for access control applications. In addition, these units support high-powered surveillance devices such as IP cameras and illuminators.” Altronix NetWay8BT 8-port 802.3bt compliant managed midspan provides up to 90W per port (480W max). NetWay4BT is a 4-port version that also provides up to 90W per port (360W max). These new UL294 listed midspans pass data at 10/100/1000 Mbps, include a built-in battery charger, and embedded LINQ™ Technology to monitor, control, and report power and diagnostics from anywhere over the network. Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.
Altronix, the globally recognized company in power and data transmission solutions for the professional security industry, has announced that its award-winning Tango PoE Driven Power Supply/Chargers are now UL 294 listed for access control applications. This reaffirms the high quality and performance of Tango solutions that end-users, architects, and security consultants demand for mission critical access control applications. Tango PoE Driven Power Supply/Chargers Tango leverages low-voltage installation methods, eliminating the need for an electrician and dedicated conduit and wire runs. This unique solution delivers 12VDC and 24VDC simultaneously from any 802.3bt PoE source up to 90W such as Altronix NetWay injectors. When combined with Altronix stackable sub-assemblies, Tango can support up to 8 locking devices with power for controllers and ancillary devices. A single Lithium Iron Phosphate battery (LiFePO4) provides backup for 12VDC and/or 24VDC systems, adding to the systems ROI. Plug-and-play option to deploy access control UL 294 listed for access control, Tango is documented to operate with the highest levels of reliability and safety" “Tango provides system designers and installers with a cost-effective and efficient means to power access control and security devices by employing the latest PoE technology,” said Ronnie Pennington, National Sales Engineer, Altronix Corporation. Ronnie adds, “Now UL 294 listed for access control, Tango is documented to operate with the highest levels of reliability and safety, providing a plug-and-play option for deploying access control systems.” Flexible to accommodate Altronix sub-assemblies The Tango Series is available in myriad configurations to meet a wide variety of system applications. All models are equipped with LiFePO4 (Lithium Iron Phosphate) battery backup. Tango solutions are flexible to accommodate Altronix sub-assemblies, including the Altronix PDS8 Dual Input Power Distribution Modules that distribute 12VDC and/or 24VDC over a total of eight (8) fuse or PTC protected selectable outputs and Altronix ACMS8 Dual Input Access Power Controllers that distribute power over a total of eight (8) fuse or PTC protected Fail-Safe, and/or Fail-Secured relayed outputs. Additionally, network versions of these boards with embedded remote power management. Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.
Smart And Reliable Rail And Metro OperationsDownload
5 Ways RFID Readers Can Secure Your WorkplaceDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload
- Identiv Shares Details On Why Bahnhof Data Centre Is One Of The World’s Most Secure Buildings
- ASSA ABLOY Secures Thiepval Museums In Northern France With Their eCLIQ Electronic Locking System
- Leonardo Receives Contract For Two More COSMO-SKyMed Second Generation (CSG) Satellites From The Italian Space Agency
- Leonardo Photovoltaic Panels For JUICE Mission Of The Cosmic Vision Interplanetary Space Program Ready For Deployment