Ask The Expert

This month's expert explains the evolution behind an ever-important product: the alarm panel

BURGLAR -- or intrusion -- alarms have been around for many years, and they are often overlooked, as excitement focuses on Internet protocol cameras, biometrics, video analytics and other technological marvels becoming part of the security industry.

But technology has not forgotten the alarm panel, which still serves as the basic building block for many security systems, ranging from a small apartment to a huge retail store.

In recent years, networking and the wireless boom that has driven growth in telephones and computers have lead to some of the biggest advances in alarm panel technology. For the first time, we are seeing the true integration of panels into access control and video surveillance systems.

ISSUE: How are alarm panels being integrated into other security systems?

SOLUTION: Alarm panels can now be plugged into a network port, and with appropriate software, be able to immediately communicate with other system components. With stronger wireless signals (and through the use of repeaters), panels can now operate in remote areas that only a few years ago would have been impossible.

The networking of alarm panels also is leading to the integration of fire and life safety and HVAC systems.

Today's panels also can communicate in a variety of ways to make them more efficient and easier to operate. For example, advanced panels go well beyond notifying the central station that an alarm system has been armed, disarmed or breached. Panels now use e-mail or cellular phone text messages to send that same information to a homeowner, store manager or security guard. Redundancy decreases the likelihood of a system being left unarmed or a missed alarm.

The cellular network also serves as a backup way for an alarm panel to communicate with the central monitoring station if the phone lines are cut.

One Internet-based application service provider now allows alarm users to access a Web site to turn a system on or off, switch on lights or review the system's history. This gives users the ability to remotely control their systems from virtually anywhere in the world.

Another recent innovation involving the Internet, VoIP uses the Internet to transmit voice communications. When used as the connection between an alarm panel and the monitoring station, there are some potential problems. Internet service providers often schedule network maintenance, during which time alarm signals cannot be sent. Also, many alarm panels now in use do not recognize the Internet signal as a telephone-line equivalent.

ISPs, monitoring station operators and equipment manufacturers are all working to allay these concerns. Solutions may include using cellular phone backup for network downtime. And manufacturers are beginning to introduce panels that can work reliably with VoIP. Once these and other related problems have been solved, VoIP should provide a fast and efficient way to communicate between alarms panels and central stations.

ISSUE: How are panels now using two-way communication?

SOLUTION: Many panels are now capable of providing two-way voice communication between a home or business and the central station. Hands-free communication with customers can greatly help to reduce false alarms that result from user error. This capability also can allow monitoring station operators to offer other services such as checking in on older or disabled customers.

Some newer panels also have the ability to communicate with users in their native language using a natural-sounding voice. This can be a major asset in helping people -- homeowners or employees at a business -- to learn the proper operation of the alarm panel.

Advanced stability and the lower cost of panel sensors have helped to reduce the number of false alarms while adding some exciting new and innovative capabilities to panel technology. For example, sensors can warn if the air conditioning fails or if the temperature in a computer room begins to rise to dangerous levels. Another sensor can monitor the pressure of fire extinguishers and also warn if the extinguishers are missing.

New technology will continue to drive higher performance levels and offer capabilities previously found only in science fiction novels. Today's alarm panels are much more than your father's old burglar alarm system.

This month's question from a reader asks:

ISSUE: I've got a question that I will be very surprised if you have a good answer for. The Alzheimer's Store sells products for people with the disease and those caring for them. For some time now, we have offered an alarm-enabled chain lock for doors. So people who might decide to leave home during the night would trigger the alarm opening the door. The company has recently discontinued the item, and for the life of me, I cannot find it offered by any other company. Would you know of a company that sells door chain locks with alarms? Or can you suggest another way to make sure to help keep these patients safe? (No keys -- people with dementia lose them or they just disappear.)

SOLUTION: Having a way to be notified if an patient wanders is an important requirement. Although the Alzheimer's Store does not sell the chain lock with alarm, there are other ways to detect if a door is opened.

There are many standalone door alarms. These are battery-operated devices and, if a door is armed and opened, a local sounder will be activated. Additionally, some units are able to have an exit button to allow you an exit time to leave a room,

Without endorsing any particular manufacturer, you can find such products at http://www.sti-usa.com or http://www.dimango.com. However, I would suggest you contact your local security alarm dealer for the best solution.

This article originally appeared in the October 2006 issue of Security Products, pg. 14.

This article originally appeared in the issue of .

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3