Did you know that proper placement of your intrusion detectors has an important impact on performance? In this video you will learn some key “do’s and don’ts” when installing Bosch intrusion detectors. Watch here >>
Read moreDid you know that proper placement of your intrusion detectors has an important impact on performance? In this video you will learn some key “do’s and don’ts” when installing Bosch intrusion detectors. Watch here >>
Read moreFor years, we’ve been telling security professionals to migrate away from monitoring their alarm panels through telephone (POTS) lines and to start using more reliable means of communication, like cellular or IP. But one thing we haven’t discussed...
Read moreAT&T has announced that they will sunset their 3G network in the US on February 22, 2022. If you have Bosch B443 cellular modules that are using the AT&T network, you will need to replace these modules before this deadline because they will stop...
Read moreIn the past, intrusion detection alarm panels were programmed by entering hexadecimal codes into keypads. This was practical because the alarm panel was limited to a small number of features and you could only choose from a small number of responses.
Read moreNot too long ago, a burglar alarm had one job - to let somebody know when an unauthorized person entered a structure. When the panel detected that the protected area had been violated, it had two decisions to make - whether to activate notification...
Read moreWhen designing an intrusion detection system, you want to cover all points of potential penetration. By that, we mean you want to identify every opening in the structure and give the alarm panel some way of determining when a person has used that...
Read moreWe know we can get a bit technical...maybe a little more than a bit technical from time to time. So, here's a short and sweet post that is useful for specifiers and installers of Bosch B9512G and B8512G intrusion alarm control panels. We've created...
Read moreWhile there is much attention dedicated to securing the IT network perimeter, of equal importance is a focus on fortification of the physical perimeter of a facility, given that this is the first line of defense against unauthorized site access. A...
Read moreVideo management systems (VMS) are becoming more intelligent. The ability of a VMS to receive and react to alarms is improving and becoming more complex, fueled in part by widespread adoption and deployment of high-reliability video analytics and...
Read moreEnter Keyword Below
117 Commons Ct, Chadds Ford, PA 19317
610-361-0500
1401 Abingdon Rd, Abingdon, MD 21009
410-612-9640
© Copyright 2024 Chesapeake Marketing & Midlantic Marketing (MidChes) - All Rights Reserved.