FAQs

Title Image

Video Surveillance (5)

VGA resolution is .3MP or 640 pixels horizontally x 480 pixels vertically per video frame.

Category: Video Surveillance
Tag: vga

720p resolution is 1 megapixel or 1280 pixels horizontally x 720 pixels horizontally per frame of video.

Looking for a 720 IP camera or something with a higher resolution? Visit our Network Cameras section.

Category: Video Surveillance
Tag: 720p

4K resolution is 8 megapixels or 3840 pixels horizontally x 2160 pixels vertically per video frame.

Category: Video Surveillance
Tag: 4k

1080p resolution is 2 megapixels or 1920 pixels horizontally x 1080 pixels vertically per video frame.

Category: Video Surveillance
Tag: 1080p

Codec is an amalgam of the words compression & decompression. Compression is the process of reducing bandwidth and storage consumption.

Because each frame of recorded video contains many of the pixels in the previous frame, codecs compress video by only recording the pixels that changed between frames, thereby reducing bandwidth consumption and processing power.

Category: Video Surveillance
Tag: codecs

Video Monitoring (9)

Our IMMIX ISO certified video monitoring platform can monitor an extensive range of cameras, DVRs, NVRs and VMSs including:

Category: Video Monitoring

A High Level Integration (HLI) is a system to system integration (i.e. in this instance much of the functionality of your Genetec Security Center, Avigilon Control Center™, Milestone XProtect® or Geutebruck G-Core VMS is connected by an API to our Video Monitoring Platform) rather than just a simple device integration (i.e. such as connecting to an NVR, via an IP address and receiving video streams from cameras).

HLIs require time and iteration to set-up due to the large number of custom settings that can affect the operation and performance of the integration.

Common HLI functionality includes:

  • GetConfig – automatically enrolls cameras, relays, alarms and audio devices on set-up into Immix, with no manual data entry required
  • Live Video – the ability to view live video from the VMSs cameras
  • Pre Alarm – Immix presents 10 seconds of video immediately prior to an alarm
  • Post Alarm – Immix records video after an alarm is received
  • Quality – the ability to change the image quality (i.e. resolution) of a selected camera
  • PTZ Controls – the ability to control pan, tilt and zoom functionality
  • Presets – the ability to select predetermined PTZ positions
  • Multiview – the ability to view multiple cameras at one time from the VMS
  • Relays – the ability to control relays within the VMS such as opening doors and gates
  • Attached Footage – integrations with support for attached footage receive still images or video footage at the point the alarm is triggered.
    This provides an instant point of reference for the alarm as the footage was created at the exact point the alarm was triggered.
  • Ecare – the ability to generate notifications if communication to an end device is lost. Connection is made by using the IP address and Port listed in the site setup and ensures that the port is listening.
  • Playback – the ability to choose a time in the past to view footage from. Integrations with Playback support can choose a time in the past to view video from, providing the footage has been stored. This service is an add-on
    and quoted on request only.

Not all HLIs have the same functionality. Check the page of the VMS you use for more detail.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

The Milestone XProtect integration is an advanced system-to-system integration and is a VMS platform that allows a user to view live camera along with recorded camera footage, perform remote tasks such as relay activation/deactivation, perform audio communication and supports multiple alarm types. A variety of this functionality can be used via the Immix platform.

Features include:

  • GetConfig – GetConfig support allows the user to automatically obtain device details without having to input them manually. Input the IP, port, user and password as you usually would, and hit GetConfig and Immix will automatically grab the cameras, relays, alarms and audio devices (where applicable) without the need to input each of these one by one. This process only occurs at site setup. Further changes to the end device will not be kept up to date on Immix.
  • Live Video – This feature allows a live video to be loaded seamlessly within the interface with no need for extra configuration (apart from as listed on the dedicated support page).
  • Quality – Image resolution can be amended in the Immix interface, either during live view, or by setting a level during setup. In Live, select the Quality drop-down menu and choose the quality you require. The image will immediately switch to your selection.
  • PTZ Control – PTZ support allows the operator to maneuver the camera position, if the camera has this ability. By clicking and holding in the position of the live image where you wish to move the camera will perform this task. You can also use the zoom in and zoom out buttons below the live image.
  • Presets – If an integration supports PTZ then the device may also be able to predetermine preset positions for the camera including zoom.
  • Multiview – Multiview opens a separate browser window to display multiple cameras at once, each within a session of its own. Without configuration Multiview will load the first 6 cameras in a listed site. Configuration of Multiview can be acheived in the Site Setup to determine the cameras that you first want the operator to see.
  • Relays – Integrations with Relay support are able to select output commands from the Immix interface. These commands can include door and gate opening. A pulsed relay can be initiated, with the target returning to its original state afterwards, or a pair of buttons can be used to manually operate both an ‘On’ and ‘Off’ state.
  • Pre Alarm Recording – This feature obtains 10 seconds of footage immediately prior to the alarm occurring.
  • Post Alarm Recording – The ability to record footage immediately further to an alarm being received in Immix. Integrations with Post Alarm Recording support will be able to record camera footage upon receipt of an alarm into Immix. Configure an Alarm Action to record a camera for the duration you require. This feature does not require support for alarms. This is purely a recording action assigned to any alarm (even from a different device).
  • Ecare -The ability to have Immix generate notifications if communication to the end device is lost. Support for Ecare means that Immix has the ability to connect to the device listed on the site in order to check whether it is alive. Connection is made by using the IP address and Port listed in the Immix site setup and ensures that the port is listening. Connection attempts are made based on the ‘Ecare checking interval’ set. ‘Ecare fail threshold’ will determine how many connection failures are made before an alarm is provided to the operator.
  • Playback – The ability to choose a time in the past to view footage from. Integrations with Playback support can choose a time in the past to view video from, providing the footage has been stored on the end device. By selecting the calendar icon in the site the operator is asked to choose a time and date to start streaming from. This feature is not included in standard VM pricing.

Please contact us on 1300 556 334 for advanced technical documentation or to speak with a technical representative.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

The Geutebruck G-Core integration is an advanced system-to-system integration. Devices are added and configured on the GCore server, Immix is then configured to connect to the GCore server as opposed to connecting devices directly to Immix. This integration includes an alarm receiver service to handle all the alarm requests going into Immix.

Features include:

  • GetConfig – GetConfig support allows the user to automatically obtain device details without having to input them manually. Input the IP, port, user and password as you usually would, and hit GetConfig and Immix will automatically grab the cameras, relays, alarms and audio devices (where applicable) without the need to input each of these one by one. This process only occurs at site setup. Further changes to the end device will not be kept up to date on Immix.
  • Live Video – This feature allows a live video to be loaded seamlessly within the interface with no need for extra configuration (apart from as listed on the dedicated support page).
  • PTZ Control – PTZ support allows the operator to maneuver the camera position, if the camera has this ability. By clicking and holding in the position of the live image where you wish to move the camera will perform this task. You can also use the zoom in and zoom out buttons below the live image. The Camera’s “Media Channel ID” and “Global Number” must be set to the same value. This feature is not included in standard VM pricing.
  • Presets – If an integration supports PTZ then the device may also be able to predetermine preset positions for the camera including zoom.
  • Multiview – Multiview opens a separate browser window to display multiple cameras at once, each within a session of its own. Without configuration Multiview will load the first 6 cameras in a listed site. Configuration of Multiview can be acheived in the Site Setup to determine the cameras that you first want the operator to see.
  • Relays – Integrations with Relay support are able to select output commands from the Immix interface. These commands can include door and gate opening. A pulsed relay can be initiated, with the target returning to its original state afterwards, or a pair of buttons can be used to manually operate both an ‘On’ and ‘Off’ state.
  • Pre Alarm Recording – This feature obtains 10 seconds of footage immediately prior to the alarm occurring.
  • Post Alarm Recording – The ability to record footage immediately further to an alarm being received in Immix. Integrations with Post Alarm Recording support will be able to record camera footage upon receipt of an alarm into Immix. Configure an Alarm Action to record a camera for the duration you require. This feature does not require support for alarms. This is purely a recording action assigned to any alarm (even from a different device).
  • Ecare -The ability to have Immix generate notifications if communication to the end device is lost. Support for Ecare means that Immix has the ability to connect to the device listed on the site in order to check whether it is alive. Connection is made by using the IP address and Port listed in the Immix site setup and ensures that the port is listening. Connection attempts are made based on the ‘Ecare checking interval’ set. ‘Ecare fail threshold’ will determine how many connection failures are made before an alarm is provided to the operator.
  • Camera Playback – The ability to choose a time in the past to view footage from. Integrations with Playback support can choose a time in the past to view video from, providing the footage has been stored on the end device. By selecting the calendar icon in the site the operator is asked to choose a time and date to start streaming from. This feature is not included in standard VM pricing.

Please contact us on 1300 556 334 for advanced technical documentation or to speak with a technical representative.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

Genetec is a system-to-system integration rather than a simple device integration and as such, requires more time and skill to set up. Genetec has a wide variety of custom settings that can affect the performance of this integration. Set up may also require the authority and access to modify the currently configured settings within the Genetec system. Changes will have to be made to some system settings to enable your Genetec Security Center application to connect to our Video Monitoring platform.

Genetec requires a licence to enable the Video Monitoring functionality.

Features include:

  • GetConfig – GetConfig support allows the user to automatically obtain device details without having to input them manually. Input the IP, port, user and password as you usually would, and hit GetConfig and Immix will automatically grab the cameras, relays, alarms and audio devices (where applicable) without the need to input each of these one by one. This process only occurs at site setup. Further changes to the end device will not be kept up to date on Immix. Immix will find alarms associated with Doors, Elevators and Cameras. Immix will NOT find alarms attached to Areas and Tile plugins. Presets not supported via GetConfig.
  • Live Video (PassThrough) – The ability for live video to pass-through the server without any processing. This feature allows the server to pass H.264 encoded live video from the device through to the client without any processing on the server. Genetec Live Video connects through RTSP streaming only.
  • Quality – Image resolution can be amended in the Immix interface, either during live view, or by setting a level during setup. In Live, select the Quality drop-down menu and choose the quality you require. The image will immediately switch to your selection.
  • PTZ Control – PTZ support allows the operator to maneuver the camera position, if the camera has this ability. By clicking and holding in the position of the live image where you wish to move the camera will perform this task. You can also use the zoom in and zoom out buttons below the live image.
  • Presets – If an integration supports PTZ then the device may also be able to predetermine preset positions for the camera including zoom.
  • Multiview – Multiview opens a separate browser window to display multiple cameras at once, each within a session of its own. Without configuration Multiview will load the first 6 cameras in a listed site. Configuration of Multiview can be acheived in the Site Setup to determine the cameras that you first want the operator to see.
  • Relays – Integrations with Relay support are able to select output commands from the Immix interface. These commands can include door and gate opening. A pulsed relay can be initiated, with the target returning to its original state afterwards, or a pair of buttons can be used to manually operate both an ‘On’ and ‘Off’ state.
  • Pre Alarm Recording – This feature obtains 10 seconds of footage immediately prior to the alarm occurring.
  • Post Alarm Recording – The ability to record footage immediately further to an alarm being received in Immix. Integrations with Post Alarm Recording support will be able to record camera footage upon receipt of an alarm into Immix. Configure an Alarm Action to record a camera for the duration you require. This feature does not require support for alarms. This is purely a recording action assigned to any alarm (even from a different device).
  • Ecare -The ability to have Immix generate notifications if communication to the end device is lost. Support for Ecare means that Immix has the ability to connect to the device listed on the site in order to check whether it is alive. Connection is made by using the IP address and Port listed in the Immix site setup and ensures that the port is listening. Connection attempts are made based on the ‘Ecare checking interval’ set. ‘Ecare fail threshold’ will determine how many connection failures are made before an alarm is provided to the operator.
  • Playback – The ability to choose a time in the past to view footage from. Integrations with Playback support can choose a time in the past to view video from, providing the footage has been stored on the end device. By selecting the calendar icon in the site the operator is asked to choose a time and date to start streaming from. This feature is not included in standard VM pricing.

Please contact us on 1300 556 334 for advanced technical documentation or to speak with a technical representative.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

The Dahua Video Monitoring integration includes the following features.

Features include:

  • GetConfig – GetConfig support allows the user to automatically obtain device details without having to input them manually. Input the IP, port, user and password as you usually would, and hit GetConfig and Immix will automatically grab the cameras, relays, alarms and audio devices (where applicable) without the need to input each of these one by one. This process only occurs at site setup. Further changes to the end device will not be kept up to date on Immix.
  • Live Video – This feature allows a live video to be loaded seamlessly within the interface with no need for extra configuration (apart from as listed on the dedicated support page).
  • Live Video (PassThrough) – The ability for live video to pass-through the server without any processing. This feature allows the server to pass H.264 encoded live video from the device through to the client without any processing on the server, resulting in much lower resource use on the Immix server.
  • Quality – Image resolution can be amended in the Immix interface, either during live view, or by setting a level during setup. In Live, select the Quality drop-down menu and choose the quality you require. The image will immediately switch to your selection.
  • PTZ Control – PTZ support allows the operator to maneuver the camera position, if the camera has this ability. By clicking and holding in the position of the live image where you wish to move the camera will perform this task. You can also use the zoom in and zoom out buttons below the live image. This feature is not included in standard VM pricing.
  • Presets – If an integration supports PTZ then the device may also be able to predetermine preset positions for the camera including zoom.
  • Multiview – Multiview opens a separate browser window to display multiple cameras at once, each within a session of its own. Without configuration Multiview will load the first 6 cameras in a listed site. Configuration of Multiview can be acheived in the Site Setup to determine the cameras that you first want the operator to see.
  • Relays – Integrations with Relay support are able to select output commands from the Immix interface. These commands can include door and gate opening. A pulsed relay can be initiated, with the target returning to its original state afterwards, or a pair of buttons can be used to manually operate both an ‘On’ and ‘Off’ state.
  • Pre Alarm Recording – This feature obtains 10 seconds of footage immediately prior to the alarm occurring.
  • Post Alarm Recording – The ability to record footage immediately further to an alarm being received in Immix. Integrations with Post Alarm Recording support will be able to record camera footage upon receipt of an alarm into Immix. Configure an Alarm Action to record a camera for the duration you require. This feature does not require support for alarms. This is purely a recording action assigned to any alarm (even from a different device).
  • Ecare -The ability to have Immix generate notifications if communication to the end device is lost. Support for Ecare means that Immix has the ability to connect to the device listed on the site in order to check whether it is alive. Connection is made by using the IP address and Port listed in the Immix site setup and ensures that the port is listening. Connection attempts are made based on the ‘Ecare checking interval’ set. ‘Ecare fail threshold’ will determine how many connection failures are made before an alarm is provided to the operator.
  • Camera Playback – The ability to choose a time in the past to view footage from. Integrations with camera Playback support can choose a time in the past to view video from, providing the footage has been stored on the end device. By selecting the calendar icon in the site the operator is asked to choose a time and date to start streaming from. This feature is not included in standard VM pricing.
  • Alarms (SMTP) – Integrations which have Alarm support are able to provide accurate input numbers and allow Immix to perform actions based on decoding input numbers. This includes initiating Scripts and assigning Priority.
  • Attached Image – The ability for the device to send alarm footage in a compatible form to be displayed in the Immix interface. Integrations with support for attached footage receive still images or video footage at the point the alarm is sent. This provides an instant point of reference for the alarm as the footage was created at the exact point the alarm was triggered. Immix is able to present this footage regardless of specific Alarm support being available. Formats Immix can display in include JPG, MJPG, MP4. Other formats, whilst still useable, may require a separate piece of viewing software.

Please contact us on 1300 556 334 for advanced technical documentation or to speak with a technical representative.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

The Avigilon Control Center (ACC) integration is an advanced system-to-system integration that includes all the major features of a VMS integration. It supports getconfig, making onboarding a new system simple and easy. It also supports advanced Avigilon ACC analytics through Avigilon cameras and Rialtos decoders (formerly VideoIQ). Avigilon requires a licence to enable the Video Monitoring functionality.

Avigilon requires a licence to enable the Video Monitoring functionality.

Features include:

  • GetConfig – GetConfig support allows the user to automatically obtain device details without having to input them manually. Input the IP, port, user and password as you usually would, and hit GetConfig and Immix will automatically grab the cameras, relays, alarms and audio devices (where applicable) without the need to input each of these one by one. This process only occurs at site setup. Further changes to the end device will not be kept up to date on Immix.
  • Live Video – This feature allows a live video to be loaded seamlessly within the interface with no need for extra configuration (apart from as listed on the dedicated support page).
  • Quality – Image resolution can be amended in the Immix interface, either during live view, or by setting a level during setup. In Live, select the Quality drop-down menu and choose the quality you require. The image will immediately switch to your selection.
  • PTZ Control – PTZ support allows the operator to maneuver the camera position, if the camera has this ability. By clicking and holding in the position of the live image where you wish to move the camera will perform this task. You can also use the zoom in and zoom out buttons below the live image.
  • Presets – If an integration supports PTZ then the device may also be able to predetermine preset positions for the camera including zoom.
  • Multiview – Multiview opens a separate browser window to display multiple cameras at once, each within a session of its own. Without configuration Multiview will load the first 6 cameras in a listed site. Configuration of Multiview can be acheived in the Site Setup to determine the cameras that you first want the operator to see.
  • Relays – Integrations with Relay support are able to select output commands from the Immix interface. These commands can include door and gate opening. A pulsed relay can be initiated, with the target returning to its original state afterwards, or a pair of buttons can be used to manually operate both an ‘On’ and ‘Off’ state.
  • Pre Alarm Recording – This feature obtains 10 seconds of footage immediately prior to the alarm occurring.
  • Post Alarm Recording – The ability to record footage immediately further to an alarm being received in Immix. Integrations with Post Alarm Recording support will be able to record camera footage upon receipt of an alarm into Immix. Configure an Alarm Action to record a camera for the duration you require. This feature does not require support for alarms. This is purely a recording action assigned to any alarm (even from a different device).
  • Ecare -The ability to have Immix generate notifications if communication to the end device is lost. Support for Ecare means that Immix has the ability to connect to the device listed on the site in order to check whether it is alive. Connection is made by using the IP address and Port listed in the Immix site setup and ensures that the port is listening. Connection attempts are made based on the ‘Ecare checking interval’ set. ‘Ecare fail threshold’ will determine how many connection failures are made before an alarm is provided to the operator.
  • Playback – The ability to choose a time in the past to view footage from. Integrations with Playback support can choose a time in the past to view video from, providing the footage has been stored on the end device. By selecting the calendar icon in the site the operator is asked to choose a time and date to start streaming from. This feature is not included in standard VM pricing.

Please contact us on 1300 556 334 for advanced technical documentation or to speak with a technical representative.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

Our interactive video monitoring platform, Immix from Sureview Systems, is an open & scalable system that offers integrations with over 170 manufacturers and supports thousands of manufacturer VMSs, NVRs, DVRs, Encoders & Cameras.

When we integrate connect your video surveillance system with our Video Monitoring platform we can provide:

  • Live, Pre & Post Alarm imaging for Video Verification
  • Ad-hoc & Scheduled Video Patrols
  • Device Uptime – anytime a device loses connectivity we’ll receive an alarm
  • Camera Health – camera failure, hard disk failure, video loss & more are handled & escalated as alarm signals
  • Remote Access – providing remote access for employees & authorised personnel to customer facilities
  • Door Station Answering
  • Triggering of Relays & Presets
Category: Video Monitoring

Once we receive an alarm from your security system, the camera that’s mapped (that corresponds) to the detection device that activated presents live and recorded video for us to review. By analysing the video/We can then:

  • Quickly verify if an alarm is false or real
  • Reduce false alarms caused by faulty detectors, animals & insects, wind and rain
  • Reduce costs by stopping security staff from responding to false alarms
  • Improve OH&S compliance – by stopping staff being woken by calls about false alarms

Please contact us on 1300 556 334 for advanced technical documentation or to speak with a technical representative.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Video Monitoring

Vape Detectors (2)

HALO Vape Detectors are compatible with several Video Management Systems (VMS) through direct integrations and partnerships. The compatible VMS platforms include:

  • Genetec Security Center
  • AXIS Camera Station
  • Avigilon Control Center (ACC)
  • Nx Witness
  • Milestone XProtect

These integrations facilitate a seamless connection between HALO Vape Detectors and the respective VMS platforms, enabling users to monitor and manage vape detection alerts alongside video surveillance feeds.

Category: Vape Detectors

HALO Vape Detectors can be integrated with a Video Management System (VMS) using several methods. Linking sensor alerts to video footage for immediate action and investigation enhances security and monitoring capabilities.

Integration with Specific VMS Platforms:

  • HALO Vape Detectors can be integrated with Avigilon Control Centre VMS, Milestone XProtect VMS, and other third-party systems. This integration allows all sensor data to be displayed in the VMS software alongside nearby camera images, which is particularly useful when linking alarm events to video footage.
  • The integration with Avigilon Unity Video or Alta Aware enables the system to pull a live video feed from a nearby camera whenever the HALO sensor triggers an alert. This allows for immediate investigation and identification of individuals involved in the detected events.

Configuration and Settings:

  • To integrate HALO with a VMS, you typically need to log into the HALO SMART SENSOR web interface, navigate to the Notifications or Integrations tab, and configure the VMS settings. This involves entering specific settings such as the IP address of the VMS server, a custom port number, and event identifiers associated with specific VMS sensors.

Event Management and Alerts:

  • The HALO Smart Sensor can alert security personnel when sensor values exceed normal levels. These alerts can be configured to trigger specific actions within the VMS, such as recording or sending notifications.
  • Integration guides and support are available to assist with the setup process, ensuring that the HALO events are correctly linked to the corresponding actions in the VMS.

Use of API and Server Integration:

  • Some integrations may involve using the server API to ensure that the HALO Smart Sensor is natively supported by the VMS, allowing for seamless communication between the sensor and the video management software.

Practical Applications:

  • This integration is beneficial in environments where cameras cannot be placed, such as private areas or specific indoor locations. It allows monitoring of vaping, smoke, THC, and other abnormalities by linking sensor detections with visual verification through connected video systems.

By integrating HALO vape detectors with a VMS, facilities can enhance their security and monitoring capabilities, ensuring that they can respond promptly to incidents detected by the sensors while maintaining a comprehensive surveillance record.

Category: Vape Detectors

Service (13)

We provide installation & configuration for:

Category: Service

If you are unable to provide the installer code, it’s crucial to understand that we will have to default the panel, which means erasing its system settings. This action will result in the removal of the previous functionality. The programming will be erased and the system will be reprogrammed from scratch. We offer 1 hour of FREE time to complete this task. If it takes longer than 1 hour, charges will apply.

Category: Service

We can compile one for you using our best efforts. This means we’ll determine what detection devices are attached to the security system and their location.

The time taken to do this is included in any free connection’s 1 hour of free time. We’ll advise if it takes longer than 1 hour, and charges will apply.

Category: Service

We guarantee that if any of the tasks included in the FREE connection aren’t performed correctly, i.e., programming communication tasks, testing alarm communications to the monitoring centre, programming 5 user codes, and entry and exit delay, we’ll return to the site and rectify the fault free of charge.

Category: Service

Free connection is limited to the programming of the existing security system to the monitoring centre and includes:

  1. Programming of communication tasks so that the security system communicates to the Monitoring Centre.
  2. Testing of alarm communications to the Monitoring Centre.
  3. Programming of up to 5 user codes.
  4. Programming of entry & exit delay.

We estimate that this work will take no longer than 1 hour. The FREE connection does not include the installation or configuration of any app/s.

We recommend that you provide unobstructed access to the security system and any detection devices on the day of connection. For example, remove anything obstructing access to doors and roller shutters and pallets on racking that may be masking detectors.

Category: Service

The security systems installer code and the zone list.

What’s a zone list? The zone list is the location and type of detection devices connected to the system.

Please call the Service Team on 1300 JD TECH (53 8324) if you need assistance.

Category: Service

Do you know what kind of access card you need?

You’re probably running one of two types of card: HID Proximity or HID iCLASS. Not sure? That’s OK, if you’ve ordered cards through us before we should have your details on file. You can call Service on 1300 538 324 or email us at [email protected]

Categories: Access Control, Service

Call 1300 538 324 Monday to Friday between 07:00am to 05:00pm AEST. You can also leave a message requesting a call back.

You can email the service department at [email protected]

Categories: Alarm Monitoring, Service

No. If you’ve just moved in to a property that has an existing security system, we recommend that you replace the battery at the time of connection. Please note that if your security system loses power (in a blackout for example) & the battery is flat, your system won’t work.

If you’d like to replace the battery in your security system contact service on 1300 538 324 Monday to Friday between 07:00am to 05:00pm AEST. You can also leave a message.

You can order a battery replacement online here.

Category: Service

No. If you’re connecting an existing security system and it needs replacement parts the parts are chargeable.

Category: Service

No. Cleaning of the equipment, i.e. removal of spider webs over detectors etc, is not included. Repairs or replacement of existing non-functional or impaired equipment is not included.

Category: Service

For enquiries regarding security system apps please contact Service on 1300 538 324 Monday to Friday between 07:00am to 05:00pm AEST. You can also leave a message requesting a call back.

You can email the service department at [email protected]

If you’ve purchased a security system from us and it has a compatible app the installation & configuration on up 5 mobile devices is included.

If you’re switching your monitoring service to us and you’re using an app to control your security system, the installation and configuration of the app isn’t included. Please see the FAQ What Security System Apps do you support?

The Monitoring Centre doesn’t provide support for apps.

 

Category: Service
Tag: app

No.

Category: Service

Security Systems (3)

Tecom Titan is application software for programming and controlling Challenger security systems. It can be used on-site and remotely via an IP connection, primarily by installers with a laptop PC to program Challenger systems. Titan offers a user-friendly interface for programming the Challenger system and allows technicians to import and export system configurations for off-site programming or system backups. It supports Challenger V8 and Challenger10 control panels and provides flexible connectivity options, including USB, IP, or serial connections. Additionally, Titan includes:

  • A fully integrated remote firmware flash utility for Challenger10 panels.
  • Enabling a complete upload and download of panel configuration.
  • Backup and archiving facilities for both database and history information.
  • A Challenger V8 to Challenger10 migration tool.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Security Systems

Tecom Forcefield Enterprise VM is an enterprise licence for Forcefield that allows for networking up to 128 Challenger panels. Forcefield Enterprise is installed straight on server hardware using VMware ESXi and simplifies disaster recovery configurations for large IT and security organisations using multiple Challenger systems.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Security Systems

Have valuable Concept 4000 assets that are no longer supported?

You have heard of Inner Range’s Concept 4000 end-of-life announcement, which was made in November 2018. In it, they stated that:

  • The system architecture was over two decades old.
  • That it would be available until 2 April 2019.
  • That Concept controller, other Concept hardware modules & Insight software would all be the end of life on 2 April 2019 – but they would have technical support for 5 years (including repairs).

How can we help migrate your Concept 4000 to the Integriti platform?

JD Security manages some of the largest Integriti deployments across Australia and New Zealand. Our expertise, combined with Inner Range’s in-house Integriti migration service, is for customers with valuable Concept assets who want to migrate their Concept controller database to an Integriti controller database.

What gets migrated?

Everything that is programmed in the Concept Controller including:

  • Modules
  • Inputs
  • Auxiliary’s
  • Areas
  • Doors
  • Readers including Intelligent Readers
  • Lifts
  • Process Groups
  • Menu Groups
  • Access Groups
  • Area Lists
  • Door Lists
  • Lift Car Lists
  • Floor Lists
  • Time Zones including Time zone functions
  • Local or Virtual Users & Cards including Extra Area & Extra Door
  • User Types or Virtual User Types
  • Calculated Aux’s
  • Function Zones
  • Home Aux’s

What doesn’t get migrated?

Anything that isn’t programmed in the Concept Controller for example:

  • CCTV Camera integration
  • Advanced Reports
  • Schematic Maps
  • Operators & Operator Types
  • Tag board
  • Alarm Handler
  • Historic Review Events

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Security Systems

Permaconn (2)

The Permaconn Alarm Monitoring Network communicates within ‘Virtual Private Networks’ (VPNs), provided by Optus and Telstra. The VPNs are dedicated for Permaconn alarm data only, and ensure all data transmitted & received is secure. All messages are encrypted ‘end to end’, using Advanced Encryption Standard (AES128). Dual SIM Permaconn devices communicate & switch seamlessly between both Telco networks, guaranteeing network availability of 99.9%.

Learn more about our Permaconn Plans

See pricing for all Permaconn Plans here

Patrol Services (1)

Customers with existing monitored locations can organise a temporary Patrol Service by calling the Monitoring Centre on 1300 884 543 or emailing us at: [email protected] from your business email address.

A temporary Patrol Service includes up to 3 random visits within a 12 hour period, daytime from 6am & 6pm and nightime from 6pm to 6am. Daytime means weekends and public holidays between 6am to 6pm.

Temporary Patrol Service is limited to checking the premises externally from publicly accessible areas.

If you’d like to arrange a permanent service please contact us on 1300 556 334 or email us at: [email protected]

Nx Witness (3)

In Nx Witness, users can create custom events and actions to tailor the system to their needs. Key types of custom events and actions that can be created include:

Custom Events

  1. User-Defined Events: These are custom events programmed by the user. They can include:
    1. Analytics Events: Events triggered by in-camera analytics such as people counting or object detection.
    2. HTTP Generic Events: Events triggered by HTTP requests from third-party systems.

  2. Motion Detection: Events triggered by motion detected on a camera. Users can define specific areas within the camera’s view to monitor for motion.
  3. Input Signals: Events triggered by input signals from connected devices.

Custom Actions

  1. Send Email: An action to send an email notification when a specific event occurs.
  2. Create Bookmark: An action to create a bookmark in the video archive for easy retrieval and review of specific events.
  3. Trigger HTTP Request: An action to send an HTTP request to a third-party system, enabling integration with other software or devices.
  4. Show Notification: An action to display a notification to users when an event occurs.
  5. Live Video Text Overlay: An action to create custom text overlays on live video feeds to alert operators to critical events.
  6. Soft Triggers: Actions that allow users to create button overlays on video feeds, which can be manually triggered to perform specific actions, such as activating an alarm or opening a door.

Event Rules Engine

The Event Rules Engine in Nx Witness allows users to configure these custom events and actions. Each event-action pair is defined as a rule, and users can create multiple rules to handle different scenarios. The rules can be configured to:

  • Aggregate actions for a group of events (e.g., notifying about multiple camera disconnections in a single alert).
  • Schedule events to be active only during specific times or days.
  • Enable or disable notifications for specific events.

By leveraging these custom events and actions, users can create a highly customized and responsive video management system tailored to their specific operational requirements.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Nx Witness
Tag: nx witness

The Server Hive Architecture in Nx Witness offers several significant benefits that enhance the video management system (VMS) ‘s overall performance, reliability, and scalability.

Key Benefits include:

High Redundancy

  • No Single Point of Failure: Each server in the Nx Witness system synchronises user and configuration data in real-time, ensuring that there is no single point of failure. If one server fails, another can take over its duties without disrupting the system.
  • Automatic Camera Failover: The architecture supports automatic camera failover, which ensures that camera feeds are redirected to another server in case of a server failure, maintaining continuous surveillance.

Scalability

  • Almost Unlimited Scalability: The Server Hive Architecture allows the system to scale almost indefinitely by adding more servers. This makes it suitable for both small installations and large, complex systems.
  • Flexible Deployment: Servers can be located in different networks, behind NAT, or even in various geographical locations, and they will still function as a single cluster. This flexibility allows for easy expansion and management of the system.

Performance

  • Load Distribution: By distributing the load across multiple servers, the system can handle many video streams and user requests efficiently. This ensures high performance and prevents any single server from becoming a bottleneck.
  • Adaptive Scaling: The architecture supports adaptive scaling, optimising network and CPU usage to prevent dropped frames during viewing and ensure smooth and reliable video playback.

Simplified Management

  • Unified Management Interface: Administrators can connect to any available server, locally or remotely, to view and manage the entire system. This simplifies system management and reduces the need for interacting with each server individually.
  • Centralised Health Monitoring: Built-in health monitoring allows administrators to view the health of all systems connected to the Nx Witness Cloud service, providing a centralised way to monitor and manage system performance.

Secure and Efficient Communication

  • Real-Time Synchronisation: Servers constantly synchronise all data between each other, ensuring that data is always available where and when it is needed. This real-time synchronisation enhances both security and efficiency.
  • Secure Connections: The architecture supports secure, encrypted communications using technologies like OPEN SSL and TLS/SSL, ensuring that data is protected during transmission.

Cost-Effectiveness

  • No Special Hardware Required: The failover and redundancy features do not require special hardware or software, making it a cost-effective solution for ensuring system reliability.

Developer-Friendly

  • Integration Capabilities: The architecture supports integration with third-party devices and systems using built-in APIs and SDKs, allowing for extensive customisation and expansion of system capabilities.

In summary, the Server Hive Architecture in Nx Witness provides a robust, scalable, and efficient foundation for managing video surveillance systems, ensuring high availability, performance, and ease of management.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Nx Witness
Tag: nx witness

Smart Motion technology in Nx Witness significantly enhances the efficiency of video search by intelligently analyzing and categorizing motion events. Traditional video searches may require users to sift through hours of footage manually, but Smart Motion allows for quick and precise retrieval of relevant video clips. By focusing only on frames where motion occurs, the technology reduces the volume of data to be reviewed. This is particularly useful in scenarios where you’re looking for specific motion-based events, like someone entering a restricted area or a vehicle pulling into a parking lot.

Moreover, some implementations of Smart Motion technology offer the ability to fine-tune search parameters. This could include specifying the type of motion (e.g., human, vehicle), the area within the frame where motion occurred, and the time period for the search. These features make it possible to find the exact footage needed for incident verification or investigation in just a matter of seconds, thereby saving time and effort for security professionals.

Smart Motion technology not only enhances operational efficiency but also improves the speed and accuracy of security responses. By quickly isolating relevant events, security personnel can make more informed decisions in real-time scenarios.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Nx Witness
Tag: nx witness

Inner Range Multipath (2)

Multipath-IP is a state of the art multiple path IP alarm transmission system designed for low cost alarm monitoring through to high security applications. Multipath-IP is a suite of products ranging from a variety of field hardware devices installed on the customers premises to dedicated hardware systems installed within a monitoring centre.

Learn more about our Inner Range Multipath Plans

See pricing for all Inner Range Multipath Plans here

Inner Range (1)

The Integriti Security System from Inner Range ensures cyber security through a comprehensive and multi-faceted approach. This approach includes:

Independent Security Assessments

  • Penetration Testing: Integriti undergoes regular independent penetration testing by accredited laboratories to identify and address vulnerabilities.
  • Cyber Threat Assessment: Cyber threat assessments are conducted at each stage of the product development process to ensure that potential threats are identified and mitigated early.

Encryption and Secure Communication

  • AES Encryption: Integriti employs AES encryption, certified by NIST through their Cryptographic Algorithm Verification Program to the FIPS 140-2 standard, for secure data transmission and storage.
  • HTTPS/TLS: The system’s cloud services, servers, web clients, and mobile apps are secured with HTTPS/TLS, ensuring encrypted communication channels.

Secure Development Practices

  • ISO 9001 Certification: Inner Range has been ISO 9001 certified for over 15 years, ensuring that all processes, including R&D, are conducted in a controlled and secure manner.
  • Access Control Permissions: Strict access control permissions are allocated to source code, ensuring only relevant staff can access code repositories.

Network Security

  • Installation Hardening Guides: Inner Range provides installation hardening guides that offer recommendations on security mechanisms, network access control, firewalls, identity management, and vulnerability management.
  • Dedicated Local LAN Networks: Integriti’s architecture includes dedicated local LAN networks that are resilient against known cyber attacks and utilise lightweight real-time operating systems to reduce exposure to vulnerabilities.

Continuous Improvement and Governance

  • Cybersecurity Governance Committee: A cross-functional cybersecurity governance committee, including senior management from R&D, Production, Technical Support, and IT, oversees the policies and procedures related to cybersecurity, ensuring they are up-to-date and effectively implemented.
  • Continuous Evolution: Inner Range continuously evolves its cybersecurity efforts to keep pace with the rapidly changing threat landscape.

Cloud Security

  • Industry-Leading Cloud Hosting: Integriti’s cloud services, such as Multipath and SkyCommand, are hosted in industry-leading cloud environments that offer redundancy and load balancing across multiple locations, ensuring high availability and security.

User and Data Management

  • Two-Factor Authentication: Integriti supports two-factor authentication for operators, adding an extra layer of security for system access.
  • Database Security: The MS SQL database used by Integriti supports TLS and TDE, which uses AES 256-bit encryption to secure data at rest.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Inner Range

Guard Services (1)

Customers with existing monitored locations can organise an emergency or temporary Guard Service by emailing us at [email protected] from your business email address.

There is a minimum 4-hour charge. If you provide more than 4-hours’ notice, non-emergency rates will apply. However, emergency rates will apply if you give less than 4 hours notice.

You’ll also need to provide access to toilet & kitchen facilities at the location.

Genetec (4)

Genetec Synergis distinguishes itself from other access control systems through several key features and integration within the Genetec Security Center platform. Here are some differences:

  • Integration with Security Center: Synergis is part of the Genetec Security Center, which integrates access control with video surveillance and other security applications. This is different from systems that require separate platforms or video and access control integrations.
  • IP-Based System: Synergis is an IP-based system that allows real-time and event-driven video monitoring. This is different from systems that may not be as focused on IP integration or may use different protocols for integration.
  • Cloud-Readiness: Synergis is cloud-ready, which means it can be managed from anywhere and is scalable to business needs. Some other systems may not offer cloud-based solutions or be as flexible regarding remote management and scalability.
  • Hardware Agnosticism: Synergis works with industry-leading access control and monitoring hardware controllers, electronic locks, and IP cameras. This is different from some systems that may be proprietary or limited to specific hardware.
  • Global Cardholder Management: Synergis offers global cardholder management, which allows for centralised management of credentials and access rights across multiple locations. This feature may not be as developed or available in other systems.
  • Real-Time Monitoring and Reporting: The system provides real-time event monitoring and the ability to generate custom reports. Other systems may offer less robust reporting features or handle event monitoring differently.
  • Advanced Security Features: Synergis integrates intrusion monitoring alongside access control and video surveillance through Synergis IX. This level of integration may not be present in other systems that treat intrusion detection as a separate component.
  • Scalability and Management: Synergis is designed to scale quickly, allowing new users and locations to be added with a few clicks on the dashboard. Other systems may have more complex scalability options or be less user-friendly to expand.

Visit the Genetec Security Center product page

Contact Us

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Genetec

Genetec Advantage is a premium maintenance and support program offered by Genetec. This subscription-based service provides users with expert guidance, support tools, and the latest product enhancements to ensure their security systems are up-to-date and functioning optimally.

The program includes advanced troubleshooting and proactive system management, which is part of the specialised support to enhance the user experience and system reliability. Additionally, Genetec Advantage customers benefit from free technical consulting hours, which can be utilised even remotely, offering further value by allowing direct access to professional services and support. Recently, Genetec has enhanced this service by adding privacy and performance monitoring features, underscoring its commitment to continuous improvement and customer satisfaction.

Visit the Genetec Security Center product page

Contact Us

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Genetec

Genetec Security Center employs several mechanisms to handle data redundancy and failover, ensuring high availability and reliability of the system. Here are the key components and strategies:

  1. Redundant Archiving
    Genetec Security Center 5.12 allows for redundant archiving at multiple levels:

    – Archiver Role: The Archiver role can enable redundant archiving for all cameras, ensuring that video data is duplicated and stored in multiple locations.

    – Failover Server: A failover server can be configured to take over the archiving tasks if the primary server fails.

    – Individual Cameras: Redundancy can also be configured for specific important cameras, providing flexibility in protecting critical data.

  2. Archiver Failover
    The system supports archiver failover, which ensures that a secondary server can take over the archiving tasks if the primary Archiver server fails. This setup helps maintain continuous recording and data integrity.
  3. Directory Database Failover
    For the Directory database, failover mechanisms connect to a backup database during a failover event. This backup database contains data from the last restore operation, ensuring minimal data loss. Two schedules can be defined for this purpose: one for full backups and another for incremental backups.
  4. Directory Failover & Load Balancing
    To protect the Directory service, which is crucial for the overall operation of the Security Center, failover and load balancing can be set up by assigning expansion servers. This ensures that the load is distributed among the expansion servers if the primary server fails, maintaining system performance and availability.
  5. Role Failover
    Failover can also be configured for various system roles. Secondary servers can be designated on standby and ready to take over if the primary server hosting those roles becomes unavailable. This ensures that critical functions continue to operate without interruption.
  6. Power Efficiency and Enhanced Reliability
    The system’s configuration offers flexible options for failover scenarios, enhancing the archiving process’s reliability and resilience. This includes power efficiency improvements that contribute to the system’s overall robustness.

Visit the Genetec Security Center product page

Contact Us

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Genetec
Tag: genetec

Download the Genetec Video Player here.

The Genetec Video Player offers a range of features designed to facilitate the viewing and managing of Genetec video files:

  • Playback Compatibility: It supports the playback of G64 and G64x video files, proprietary formats used by Genetec’s Security Center.
  • Platform Support: The player is compatible with Windows operating systems, including Windows 7, 8, and 10, ensuring broad accessibility for users across different versions of Windows.
  • Ease of Use: The player is designed for ease of use, allowing users to view their video files without needing the complete Security Center installation. This makes it a convenient option for users who need to view video files on machines that do not have the full security suite installed.
  • Video Management Commands: It includes basic video playback commands such as pause and play, enabling users to control the playback of their video recordings easily. These commands facilitate the review and analysis of video footage by allowing users to navigate the video at their own pace.
  • Properties and Statistics: The player provides detailed information about the video file being viewed, including properties and statistics of the playback. This feature can be handy for users who need to analyse video footage in detail, as it provides insights into the technical aspects of the video.
  • Integration with Genetec Clearance: The player is part of the broader Genetec ecosystem, which includes Genetec Clearance. This integration allows for the easy sharing of video recordings and collaboration with local authorities, enhancing the video player’s utility in contexts where video footage needs to be shared for investigative purposes.

Visit the Genetec Security Center product page

Contact Us

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Genetec

DirectWireless (2)

Direct Wireless is a 4G Alarm Monitoring Network dedicated to the transmission of alarm signals and is available as a Single SIM or Dual SIM (to protect against network outages) service. Direct Wireless supervises the connection between the security system and the Monitoring Centre in either 12 hour, 1 hour or 120 second intervals (the choice is up to you). Should the supervisory signal (an automatic check known as a poll) not receive a response, we’ll escalate the event in accordance with your response plan. For insurance purposes this service is classified as a Class 2 (C2) service.

Learn more about our Direct Wireless Plans

See pricing for all Direct Wireless Plans here

AXIS Cameras (8)

The AXIS Digital Corridor Format is a specialised video orientation mode designed by AXIS Communications to optimise surveillance in narrow, vertical spaces such as hallways, staircases, aisles, and tunnels. This format addresses the inefficiencies of traditional landscape video formats in such settings, where much of the video frame would typically be wasted on non-essential areas, thus not maximising the camera’s resolution and field of view.

The Corridor Format changes the video stream from a horizontal (landscape) 16:9 aspect ratio to a vertical (portrait) 9:16 aspect ratio. This adjustment better suits the vertical nature of the monitored areas, ensuring that the camera’s field of view is used more effectively, enhancing image quality, and reducing bandwidth and storage waste.

To achieve this format, the AXIS camera can be physically installed sideways, or if it’s an AXIS fixed dome camera, the 3-axis lens can be rotated 90 degrees during mounting. After the physical adjustment, the video image is digitally rotated back 90 degrees through the camera’s configuration interface. This feature requires significant processing power, supported by AXIS’ advanced network cameras.

Overall, the Corridor Format is a practical solution for improving surveillance efficiency in vertically oriented spaces, ensuring better image quality and optimised storage and bandwidth use.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: AXIS Cameras
Tag: axis

AXIS Lightfinder technology is a system-on-chip technology developed by AXIS that enables network cameras to capture high-quality colour video even in low-light conditions. It is designed for day-and-night cameras and is particularly effective when the light is dim or quickly lowered. The technology combines a susceptible CMOS sensor with optimized image processing algorithms on a state-of-the-art chip to produce crisp images in lowly lit lighting conditions. This technology is an version of the low lux technology found in most cameras, with lux being a measure of illumination. The sensor has light sensitivity beyond ordinary sensors, and the software developers at AXIS have maximized performance to squeeze out the best possible image quality. AXIS Lightfinder technology is beneficial for forensic purposes, as it captures full-colour images in extremely low light, even better than the human eye, which is essential for identifying subjects.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: AXIS Cameras

AXIS Autotracking is a suite of applications developed by AXIS Communications that enable automatic detection, tracking, and management of moving objects using Axis network cameras. These applications enhance surveillance capabilities by automatically zooming in on and following moving objects, facilitating more effective monitoring and incident management. Different versions and types of auto-tracking applications are tailored to specific needs and camera types, including fixed cameras and PTZ (Pan-Tilt-Zoom) cameras.

AXIS Digital Autotracking 2

AXIS Digital Autotracking 2 is specifically designed for fixed-megapixel cameras. This application detects, zooms in on, and follows moving objects like people and vehicles. It is beneficial in low-traffic areas like parking lots and perimeters and during non-working hours in various facilities. The application operates efficiently under different lighting conditions and can be configured to ignore disturbances such as swaying trees or small animals, thus reducing false alarms.

Key features of AXIS Digital Autotracking 2 include:

  • Automatic object detection and tracking.
  • Reduction in bandwidth and storage needs by focusing only on areas with motion.
  • Compatibility with all AXIS P and Q line megapixel fixed cameras that support the AXIS Camera Application Platform.
  • Integration with the camera’s internal event management system for various notifications and actions.

AXIS Radar Autotracking for PTZ

AXIS Radar Autotracking for PTZ is designed to automatically control the direction and zoom level of PTZ cameras. This application uses motion data from AXIS security radars to detect and track objects, optimizing camera views for better surveillance coverage. It is compatible with various Axis PTZ cameras and can be integrated into a video management system for enhanced functionality.

AXIS Perimeter Defender PTZ Autotracking

This application syncs a PTZ camera with a fixed camera running AXIS Perimeter Defender analytics. It enables the PTZ camera to automatically zoom in and track alarm objects detected by the fixed camera. This setup allows for detailed close-up views without compromising the overall surveillance coverage. The application is ideal for high-security perimeter protection and can be used in various settings, such as construction sites and parking lots.

Each version of AXIS Autotracking is tailored to specific types of cameras and surveillance needs, offering flexible and powerful tools for modern security systems. These applications help reduce the manual effort required to monitor large areas and enhance the surveillance system’s effectiveness by focusing on relevant incidents as they occur.

Category: AXIS Cameras
Tag: axis

The Axis Camera Application Platform (ACAP) allows developers to create and run applications directly on Axis network cameras. This platform enables the integration of customised applications and offers access to a wide range of video analytics. ACAP is designed to be future-proof, continuously developed to align with modern development tools and infrastructure, and supports the development of more powerful Axis hardware.

Key Features and Capabilities

  • Edge-based Computing: ACAP allows applications to run entirely or partially on the edge, improving system efficiency and reducing storage, bandwidth, and hardware needs.
  • Computer Vision: The ACAP Computer Vision SDK targets video analytics application developers. It offers familiar tools and APIs for developing edge-based computer vision applications.

  • Native SDK: The ACAP Native SDK builds low-level ACAP applications in C or C++. It targets users who want to develop plug-in-style, event-generating applications that fit nicely into a VMS-centric system.
  • Integration: ACAP supports integration with backend servers or cloud services, making designing applications that combine edge-based computing with server/cloud capabilities easy.
  • Flexibility: The platform is adaptable for various industries and use cases, making it ideal for hybrid solutions that combine edge and cloud-based processing.
  • Open Source: ACAP is an open application development platform that facilitates the integration of compatible third-party solutions, resulting in a growing variety of applications.
  • Example Code: The ACAP GitHub repository provides example code for APIs and features, including object detection, QR decoding, and image capture, using popular open-source ML libraries such as OpenCV.

How ACAP Works with Axis Cameras

ACAP works with Axis cameras by providing a platform for developers to create and run applications directly on the cameras. This is made possible by the advanced processing power of Axis cameras, such as those equipped with the ARTPEC-8 SoC, which can run real-time object detection and classification on anything that enters its field of vision. The platform combines advanced edge analytics and server-based technologies, allowing applications to run entirely or partially on the edge, improving system efficiency and reducing storage, bandwidth, and hardware needs.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: AXIS Cameras
Tag: axis

AXIS Zipstream technology preserves all the important forensic detail you need while lowering bandwidth and storage requirements by an average of 50% or more.

Unlike most compression technology, Zipstream doesn’t just limit bitrate. Instead, three kinds of intelligent algorithms ensure that relevant forensic information is identified, recorded and sent in full resolution and at full frame rate.

AXIS’ proprietary Dynamic ROI, Dynamic GOP, and Dynamic FPS work together in real-time to preserve faces, tattoos, license plate numbers, and more.

The result? With Zipstream, you keep the resolution and frame rate and still store a whole lot less. So you save space – and money – without sacrificing valuable information.

Category: AXIS Cameras

AXIS Q86 thermal cameras are particularly suited for perimeter protection due to several key features:

  1. Thermal Imaging Capabilities: These cameras capture images based on the heat radiating from objects, which allows them to operate effectively in complete darkness, challenging light conditions, light fog, and smoke. This capability is crucial for perimeter protection, ensuring continuous surveillance regardless of environmental conditions.
  2. Built-in Cybersecurity Features: The AXIS Q86 series includes robust cybersecurity measures such as signed firmware and secure boot. These features help prevent unauthorized access and ensure that the camera system is free of malware, which is vital for maintaining the integrity of security systems.
  3. High Durability and Resistance: With IP66, NEMA 4X, and IK10 ratings, these cameras are highly resistant to rust, corrosion, and impact. This makes them ideal for installation in harsh environments, often in perimeter security scenarios.
  4. Advanced Analytics Capabilities: AXIS Q86 cameras support the integration of tailor-made third-party analytics and audio analytics. This can enhance detection capabilities, reduce false alarms, and trigger events such as detecting aggressive behaviour or gunshots. This integration capability allows for a highly effective perimeter security system to detect and respond to potential intrusions automatically.
  5. Temperature Monitoring: Some models in the AXIS Q86 series can remotely monitor temperatures and send notifications if they pass a set threshold or fluctuate too rapidly. This feature is beneficial for early fire detection and can prevent damage to equipment, adding a layer of security to the perimeter protection.

These features collectively make the AXIS Q86 thermal cameras highly effective for perimeter protection, providing reliable surveillance and enhanced security measures across various environmental conditions and potential security threats.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: AXIS Cameras
Tag: axis

The AXIS Q86 series helps prevent unauthorised access primarily through its advanced intelligent analytics capabilities. These capabilities include:

  1. AXIS Object Analytics: This feature allows for the detection and classification of people and vehicles, which can be tailored to specific needs. This helps identify unauthorised access by distinguishing between known and unknown entities.
  2. AXIS Perimeter Defender: This application provides robust perimeter protection by detecting intrusions in real-time. It is specifically designed to handle complex scenarios where high detection accuracy is crucial, effectively preventing unauthorised access.
  3. AXIS Video Motion Detection: This feature supports the automatic detection of movement in predefined areas of interest, enabling the system to alert security personnel about potential unauthorised access.
  4. AXIS Fence Guard, AXIS Loitering Guard, and AXIS Motion Guard: These analytics are part of the AXIS Guard Suite, which helps detect and alert unauthorised presence in restricted areas.
  5. AXIS Tailgating Detector: This application detects if more than one person enters a controlled area within a set time interval, which is crucial for areas where access control systems are used to prevent unauthorised access.

These intelligent analytics are integrated into the AXIS Q86 cameras, providing a comprehensive solution that enhances security by detecting potential unauthorised access and enabling proactive management of security incidents.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: AXIS Cameras
Tag: axis

Yes, AXIS Cameras are ONVIF compliant. AXIS Communications was one of the founding members of ONVIF (Open Network Video Interface Forum) in 2008, alongside Bosch Security Systems and Sony Corporation. ONVIF is an organisation that aims to standardise communication between IP-based physical security products to ensure interoperability regardless of the brand.

As a founding member, AXIS Communications actively participates in developing and promoting ONVIF camera standards, which aim to ensure interoperability among network video products and other IP-based security devices.

Category: AXIS Cameras
Tag: axis

Avigilon (5)

Avigilon’s AI-powered video analytics feature two distinct technologies: Unusual Motion Detection (UMD) and Unusual Activity Detection (UAD). Both technologies are designed to enhance security by identifying and flagging atypical events, but they operate based on different principles and are suited for different purposes.

Unusual Motion Detection (UMD)

UMD is focused on detecting anomalies in motion within a scene. This technology does not require any predefined rules or setup. Instead, it continuously learns what typical activity in a scene looks like over time. Once it has established what is considered normal for that specific scene, it can detect and flag motions deviating from this norm. UMD is particularly useful for identifying unexpected movements in areas where motion patterns are generally consistent and predictable. It is embedded in various Avigilon camera lines such as the H4A, H4 Mini Dome, and H4SL, making it accessible on budget-friendly, entry-level cameras.

Unusual Activity Detection (UAD)

In contrast, UAD is an object-aware technology that detects atypical behaviours of specific classified objects such as people and vehicles. This means UAD can identify unusual activities based on the type of object and its expected behaviour patterns. For example, it can highlight incidents where a vehicle travels at an unusually high speed or when someone is in an unexpected location. UAD is embedded in the Avigilon H5A camera line, offering high-powered AI capabilities on Avigilon’s flagship cameras. This makes UAD suitable for environments where the behaviour of distinct objects needs to be closely monitored.

In summary, while UMD focuses on general motion anomalies within a scene, UAD provides a more targeted approach by recognising unusual behaviours of specific objects, making each technology valuable for different security needs and scenarios.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Avigilon
Tag: avigilon

Avigilon Unusual Motion Detection (UMD) is an advanced AI technology designed to enhance security by identifying and flagging atypical motion events within a camera’s field of view. Unlike traditional motion detection systems, UMD does not require predefined rules or setup. Instead, it continuously learns what typical activity looks like in a scene and then detects and flags motions that deviate from this norm.

Key Features of Avigilon Unusual Motion Detection

Continuous Learning:
UMD continuously analyzes motion-based activity to establish a model of typical behavior in a scene. Over time, it learns what constitutes normal motion and can then identify and flag unusual movements that deviate from this learned model.

Automation and Efficiency:
By automating the detection of unusual motion, UMD helps security operators filter through large amounts of recorded video more efficiently. This reduces the time required to review footage, allowing operators to focus on events that may need further investigation.

Focus of Attention Interface:
UMD leverages the Focus of Attention (FOA) interface in the Avigilon Control Center (ACC) software. This interface visually highlights atypical events, ensuring that critical incidents do not go unnoticed.

Embedded on H5 Platform Cameras:
UMD technology is embedded in Avigilon’s H5A and H5SL camera lines, making it accessible on both high-end and entry-level cameras. This integration provides powerful AI capabilities across a range of camera models.

Faster Search Capabilities:
The technology enables faster search through recorded video by flagging unusual events, which helps reduce hours of work to minutes. This feature is particularly useful for quickly identifying and responding to potential security threats.

Comparison with Unusual Activity Detection (UAD):
While UMD focuses on detecting anomalies in general motion within a scene, Unusual Activity Detection (UAD) is object-aware and detects atypical behaviors of specific classified objects, such as people and vehicles. UMD is suitable for environments where motion patterns are generally consistent and predictable, whereas UAD is more targeted towards monitoring the behavior of distinct objects.

Category: Avigilon

Avigilon Unusual Activity Detection (UAD) is an advanced AI technology designed to enhance security by identifying and flagging atypical behaviors of specific classified objects, such as people and vehicles. This technology is embedded in Avigilon’s H5A camera line and leverages edge-based intelligence to detect unusual activities based on the type of object and its expected behavior patterns.

Key Features of Avigilon Unusual Activity Detection

Object-Aware Detection:
UAD is capable of recognizing unusual activities by analyzing the behavior of specific objects like people and vehicles. For instance, it can detect if a vehicle is traveling at an unusually high speed or if a person is in an unexpected location.

Advanced AI Technology:
The system uses advanced AI to continuously learn and adapt to the camera’s field of view, ensuring that it can identify and flag unusual behaviors effectively. This learning process allows the system to improve its accuracy over time.

Focus of Attention Interface:
UAD utilizes the Focus of Attention (FOA) interface, which visually highlights unanticipated activities, providing operators with an overview of anomalous events. This helps in quickly verifying and determining the appropriate response to flagged events.

Filtered Recorded Timeline Search:
The technology enables operators to quickly review large amounts of video by filtering the timeline to highlight periods where UAD events have occurred. This significantly reduces the time required to sift through recorded footage.

Integration with Avigilon Control Center (ACC):
UAD is integrated with the Avigilon Control Center (ACC) software, which supports features like timeline search, event search, and rule triggers. This integration enhances the overall effectiveness of the security system.

Comparison with Unusual Motion Detection (UMD):
While UAD focuses on the behavior of specific objects, Unusual Motion Detection (UMD) is designed to detect anomalies in motion within a scene without predefined rules. UMD continuously learns what typical activity looks like and flags deviations from this norm. Both technologies serve different purposes and are suited for different security needs.

Category: Avigilon

The Avigilon Control Center (ACC) is a sophisticated video management system (VMS) designed to optimise how security professionals manage and interact with high-definition video. It is part of Avigilon’s comprehensive security suite, which includes end-to-end video surveillance and access control solutions.

Key Features

  • Avigilon Appearance Search Technology: This AI-powered search engine lets investigators quickly locate a person or vehicle of interest by sorting through hours of recorded video using physical descriptions, photos, or examples from recorded footage.
  • Self-Learning Video Analytics: ACC software includes advanced video analytics that detects and notifies operators of real-time scene changes and rule violations.
  • Facial Recognition: The software includes AI-powered facial recognition technology to detect people of interest based on secure watch lists managed by authorised users. This feature accelerates response times by identifying individuals from uploaded images or recorded videos.
  • High Definition Stream Management (HDSM): ACC uses patented HDSM technology to efficiently capture and store high-definition video while intelligently managing bandwidth and storage.
  • Editions and Scalability: ACC is available in three editions: Core, Standard, and Enterprise. Each edition is tailored to different scales of operations, from small implementations to large-scale video security needs. The Enterprise edition includes all features of the Core and Standard editions, plus additional advanced features for large-scale deployments.
  • Device and Integration Support: The software supports a wide range of Avigilon cameras and third-party IP cameras and encoders. It is ONVIF compliant and integrates with various sensors and devices to enhance the capabilities of physical security investments.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Avigilon
Tag: avigilon

Avigilon Appearance Search is an advanced video analytics technology designed to enhance situational awareness and streamline the process of locating persons or vehicles of interest within video footage. This technology leverages deep learning and artificial intelligence to provide efficient and accurate search capabilities, significantly reducing the time required to review video footage.

Key Features and Capabilities


Search Methods:


By Description: Users can input physical descriptions of persons or vehicles, such as gender, clothing color, and vehicle type, to initiate a search. The system ranks results that match all descriptions higher, but it is advised to avoid using color as a criterion for night scenes due to potential inaccuracies.

By Uploaded Photo: Users can upload a photo of a person or vehicle to search for instances in the video footage. The system supports various image formats and automatically crops the photo for the search.

From Recorded Video: Users can start a search based on an instance in recorded video by selecting a bounding box around the person or vehicle of interest. This can be used to find appearances before or after a specific event.

From Face Watch List Profile: Searches can be initiated from a Face Watch List profile, allowing operators to search for individuals registered in the system.

Search Results:

The results are displayed with the person or vehicle of interest highlighted by a white bounding box. Users can refine the results by adjusting the date range, changing cameras, or updating search criteria. Only the first 15 minutes of search results are displayed initially, but users can navigate through the Search Results Graph window to view more results.

Refinement and Export:


Users can refine search results by starring relevant images, which improves the system’s accuracy. Results can be bookmarked or exported for further use. Export options include native video formats with password protection and identity data, or AVI formats with background blurring to obscure everything except the detected person or vehicle.

Integration and Performance:


The technology is integrated into the Avigilon Control Center (ACC) software and requires compatible hardware such as network video recorders (NVRs) with graphics processing units or AI appliances. Optimal performance is achieved when cameras capture full-body and face images with specific pixel densities.

Applications:


Avigilon Appearance Search is used to improve incident response times and enhance forensic investigations by quickly locating specific individuals or vehicles, compiling robust video evidence, and creating a narrative of events.

Category: Avigilon

Alarm Responses (9)

In most cases we respond to an alarm in accordance with Australian Standard AS 4421-1996 Guards & Patrols which is 35 minutes.

Category: Alarm Responses

We always assume that every alarm from your security system could be a potential security breach. We don’t treat any alarm as a false alarm. Thieves may trigger repeated alarms from the same area in your premises, hoping they will eventually be ignored. We will only disregard an alarm signal from your premises when you explicitly instruct us to do so (verbal for temporary override/written for ongoing circumstances). Consider using our Video Monitoring Service, which allows our operators to remotely view your site when an alarm is triggered. This service can assist them in verifying alarm triggers and reduce responses to what turn out to be false alarms.

The standard response charge includes the patrol officers attendance and the first 10 minutes spent on site. An additional charge per minute applies if the patrol officer is required to wait for longer. Our maximum waiting time is 30 minutes after which the patrol officer can be replaced by a guard upon request. We may agree to extend this in exceptional circumstances. Public Holiday surcharge also applicable.

Category: Alarm Responses

The Monitoring Team will call your nominated contacts once the break-in has been confirmed. Once we’ve contacted you, we can contact the police if you want them to attend. Most Australian police services require the business owner or a representative of the business to personally make this request and expect you to be present when they attend. We’re unable to make that request for you directly.

We can assist if you want to make temporary arrangements to safeguard the property.

It’s crucial to note that we cannot take further action if we cannot contact you and you haven’t authorised us to place a guard on-site. Your authorisation is crucial to our procedures, ensuring all actions align with your preferences and requirements.

You can contact the Monitoring Centre on +61 1300 884 543 and +64 9 887 0362.

Our electronic Alarm Response Docket lists nine event types that may result in a response. You will receive a docket with one of these events selected. In addition to intruder, fire or industrial alarms, the following are the most common events which may also indicate a breach of the security of your premises:

  • Late to Close – Your alarm is still unarmed after your closing schedule, and your response plan requires us to attend. Your response plan is only actioned if we have not been able to contact your team or anyone on-site.
  • Out-of-Hours Entry – Your alarm system is disarmed outside your scheduled hours. A response is only despatched if we haven’t received a call from a contact or have been unable to contact anyone on site, and your response plan authorises it.
  • Isolation – When your security system was armed, one or more detection devices didn’t activate. Common causes include doors or roller shutters that may be open or not correctly secured, broken detectors or damaged cabling.
  • Let In/Out, Patrol Report and Random Patrol Request event types are services provided at your request. Please get in touch with us for more information.

We will email the alarm response docket to an address of your choice.

We treat all “late to close” (meaning your security system hasn’t been armed within your schedule) and “out-of-hours-entries” (meaning the system has been disarmed outside your schedule) as exceptions. This is because a lot of theft is internal. When we receive one of these events, we’ll attempt to contact the premises in accordance with your response plan using the site numbers you’ve provided.

Sometimes we can’t contact your site due to problems such as night switches, voice mail, incorrect in-dials, cancelled phone lines or mobile numbers. If we can’t make contact with anyone on-site, your nominated Alarm Response Plan (see below) then comes into effect.

If you want to operate a schedule it’s important that you get your staff to notify us when exceptions occur by calling the Monitoring Centre on 1300 884 543 or 02 9725 1566. New Zealand customers can contact us on 09 887 0362.

Category: Alarm Responses

Firstly, check your phone to see if you’ve missed any calls or voice mails from us. You can also speak with our Monitoring Centre on 1300 884 543 to see if there were any failed attempts to contact you, as every call, attempted call and voice mail is recorded and logged. Please note that the Monitoring Centre cannot agree to or issue credits.

If you don’t think we contacted you get in touch with our Accounts department on 02 8787 7562 or [email protected] and they’ll email you a ‘Request for Credit’ form. Once you’ve completed and returned the form we’ll investigate your enquiry. If we haven’t contacted you as agreed in your response plan we’ll issue a credit. If you’d like to amend your response plan at this time we can organise that as well.

Please note that some inquiries take longer to investigate than others including queries relating to multiple responses or involving special detection devices such as refrigeration, smoke and heat detectors.

Category: Alarm Responses

If you’re on-site and anticipate working past your closing time, please ring 1300 884 543 with your password and be ready to advise your estimated departure time. We’ll update your arming schedule so our system makes sure that you arm by that time.

If you go to your premises and disarm outside your scheduled arming & disarming times please ring 1300 884 543 with your password ready immediately after you’ve disarmed so that we can update your schedule and authorise the entry.

Please note that you may incur response charges if you have arming & disarming schedules in place and don’t contact or advise us of schedule changes. If we attempt to contact you and those calls go unanswered and you’ve authorised us to respond to all events we’ll send a response vehicle.

You can make changes to your arming & disarming schedule by calling 1300 884 543 or emailing the Monitoring Centre at [email protected]

Please note that arming & disarming schedules aren’t mandatory and you can remove them from your service plan if you wish to do so.

You can choose one of the following standard alarm response plans:

  • Plan 1 – you authorise us to respond to all events without calling your nominated contacts. Alarm Response charges may apply.
  • Plan 2 – we’ll contact your contacts to attend, but you authorise us to respond to all events if none of your contacts are contactable.
  • Plan 3 – we’ll contact your contacts to attend your premises, but if none of your contacts is contactable we will NOT respond because we don’t have your authorisation to do so. By selecting this plan you acknowledge that such action may be contrary to your insurers requirements.

If our standard response plans don’t meet your needs please contact us to discuss a feature request. Feature requests are customised action plans built for specific scenarios including refrigeration, medical, smoke, heat and duress alarms that require special handling. Charges apply for custom programming and testing. Additional monitoring charges may also apply.

Category: Alarm Responses

Alarm Monitoring (53)

A small additional charge applies per separately monitored ‘additional area’ (see the What is an area? FAQ). Each ‘additional area’ requires the same amount of work as a separately monitored system.

Category: Alarm Monitoring

We always assume that every alarm from your security system could be a potential security breach. We don’t treat any alarm as a false alarm. Thieves may trigger repeated alarms from the same area in your premises, hoping they will eventually be ignored. We will only disregard an alarm signal from your premises when you explicitly instruct us to do so (verbal for temporary override/written for ongoing circumstances). Consider using our Video Monitoring Service, which allows our operators to remotely view your site when an alarm is triggered. This service can assist them in verifying alarm triggers and reduce responses to what turn out to be false alarms.

Without these times, we cannot check if your system has been armed or if a staff member has entered your premises outside your schedule. We recommend that you nominate the earliest time you expect to disarm your security system each day and the latest time you expect to arm it each day.

If you decide a schedule is unnecessary, you can refrain from providing specific times. If you ever wish to remove or modify your existing schedule, you can do so by emailing the Monitoring Centre at [email protected]

Category: Alarm Monitoring

It’s important that we’re able to identify & verify those members of your organisation who are authorised to issue instructions or make temporary changes to your procedures or schedule. Therefore we require all authorised users to know your company’s “blanket” or their individual password. Your password should not be the same as your alarm code.

Category: Alarm Monitoring

Contacts are the people who you’ve nominated as your company’s authorised after hours decision makers.

While we’re responsible for monitoring your alarm and advising your contacts of any exceptions, your contacts are responsible for making decisions about your security based on the information we provide. Once personal contact has been made with a contact, we consider that they’ve been duly advised and it’s now their responsibility to make a decision.

If they don’t want to make a decision or issue instructions it then becomes their responsibility to contact another contact who is able to make a decision.

Category: Alarm Monitoring

A “blanket password” is a password that everyone who’s authorised to use your security system and contact the monitoring centre knows.

Your “blanket password” cannot be changed verbally.

Your “blanket password” can be changed by one of your authorised contacts emailing the Monitoring Centre

Category: Alarm Monitoring

If you’re not arming your security system by the scheduled closing time contact the Monitoring Centre and be ready to provide the following information:

  • Your first and last name
  • Company name and location
  • Your individual or blanket password
  • Estimated time of departure
Category: Alarm Monitoring

If you’re entering outside your schedule, contact the Monitoring Centre immediately after you’ve disarmed the security system and be ready to provide the following information:

  • Your first and last name
  • Company name and location
  • Your individual or blanket password
  • Estimated time of departure

The purpose of out-of-hours verification is to check who’s coming and going from the premises during those times when the alarm system is meant to be armed. Therefore we ask that you don’t call 2-3 days before to “book in” as we need to verify you or your staff at the time of disarming.

Category: Alarm Monitoring

Additional services not covered by monitoring fees include but are not limited to:

  • Alarm Responses
  • Activity Reports (monthly, weekly, daily & ad-hoc)
  • Security system installation
  • Service calls
  • Programmed Maintenance
  • Remote reprogramming (i.e. remote changes to user codes, remote arming)
  • Non-standard monitoring services, for example – requests for multiple keyholders being notified of a schedule violation; keyholder call-backs where contacts have already been notified to attend or authorise a response; notification of keyholders overseas and other special feature requests.
Category: Alarm Monitoring

The Monitoring Team will call your nominated contacts once the break-in has been confirmed. Once we’ve contacted you, we can contact the police if you want them to attend. Most Australian police services require the business owner or a representative of the business to personally make this request and expect you to be present when they attend. We’re unable to make that request for you directly.

We can assist if you want to make temporary arrangements to safeguard the property.

It’s crucial to note that we cannot take further action if we cannot contact you and you haven’t authorised us to place a guard on-site. Your authorisation is crucial to our procedures, ensuring all actions align with your preferences and requirements.

You can contact the Monitoring Centre on +61 1300 884 543 and +64 9 887 0362.

As soon as they disarm the security system they should call the Monitoring Centre on 1300 884 543.

Category: Alarm Monitoring

Our electronic Alarm Response Docket lists nine event types that may result in a response. You will receive a docket with one of these events selected. In addition to intruder, fire or industrial alarms, the following are the most common events which may also indicate a breach of the security of your premises:

  • Late to Close – Your alarm is still unarmed after your closing schedule, and your response plan requires us to attend. Your response plan is only actioned if we have not been able to contact your team or anyone on-site.
  • Out-of-Hours Entry – Your alarm system is disarmed outside your scheduled hours. A response is only despatched if we haven’t received a call from a contact or have been unable to contact anyone on site, and your response plan authorises it.
  • Isolation – When your security system was armed, one or more detection devices didn’t activate. Common causes include doors or roller shutters that may be open or not correctly secured, broken detectors or damaged cabling.
  • Let In/Out, Patrol Report and Random Patrol Request event types are services provided at your request. Please get in touch with us for more information.

We will email the alarm response docket to an address of your choice.

If you’re moving, please notify us in writing as soon as possible so we can arrange to transfer the monitoring service to your new location*. You may transfer your contract. However, you’ll need to contact us so that we can arrange the new connection and get your new site up and running as soon as possible.

If you decide to cancel the service, it’s essential that one of your authorised contacts formally requests the termination in writing. If your contract is still active at the time of cancellation, you’ll be required to settle the remaining balance of the service charges for the remaining months. Additionally, any ad-hoc charges incurred during this period will also be payable.

Once we receive your written notification, please allow us up to 14 days to process the changes against your account. It’s important to note that notices such as ‘We are moving’ are not considered official notifications of a move or cancellation. We assume you’re still using the security system until an authorised contact provides us with a written notification stating otherwise. Customers may need security at their old and new sites, so we require written notification to authenticate the request.

* A quote may be required to install or relocate your equipment.

Category: Alarm Monitoring

The Permaconn Alarm Monitoring Network communicates within ‘Virtual Private Networks’ (VPNs), provided by Optus and Telstra. The VPNs are dedicated for Permaconn alarm data only, and ensure all data transmitted & received is secure. All messages are encrypted ‘end to end’, using Advanced Encryption Standard (AES128). Dual SIM Permaconn devices communicate & switch seamlessly between both Telco networks, guaranteeing network availability of 99.9%.

Learn more about our Permaconn Plans

See pricing for all Permaconn Plans here

Multipath-IP is a state of the art multiple path IP alarm transmission system designed for low cost alarm monitoring through to high security applications. Multipath-IP is a suite of products ranging from a variety of field hardware devices installed on the customers premises to dedicated hardware systems installed within a monitoring centre.

Learn more about our Inner Range Multipath Plans

See pricing for all Inner Range Multipath Plans here

Dual SIM 4G Security Monitoring uses two SIM cards to provide redundancy and failover in case of a network outage. This type of monitoring is used in applications where downtime isn’t acceptable.

Dual SIM 4G Security Monitoring typically uses two mobile networks, Telstra and Optus, to ensure that there’s always a connection to the monitoring centre. If one network goes down, the system automatically switches to another. This failover capability helps to ensure that security alarms and other critical data are continuously transmitted to the monitoring centre.

In addition to failover, Dual SIM 4G Security Monitoring systems also provide load balancing. This means that they can distribute traffic between two mobile networks, which can help to improve performance & reduce latency.

Category: Alarm Monitoring

Direct Wireless is a 4G Alarm Monitoring Network dedicated to the transmission of alarm signals and is available as a Single SIM or Dual SIM (to protect against network outages) service. Direct Wireless supervises the connection between the security system and the Monitoring Centre in either 12 hour, 1 hour or 120 second intervals (the choice is up to you). Should the supervisory signal (an automatic check known as a poll) not receive a response, we’ll escalate the event in accordance with your response plan. For insurance purposes this service is classified as a Class 2 (C2) service.

Learn more about our Direct Wireless Plans

See pricing for all Direct Wireless Plans here

Most security systems give you the ability to have specific areas – or partitions – of your business monitored whilst other areas remain disarmed. For instance you may be able to divide your building into three separate areas including the office, warehouse and showroom. Each ‘additional area’ may be monitored as if it were an independent entity with its own codes and schedules allowing you to choose the level of authorisation that each user has. You can assign rights to each user for either full or restricted access.

Category: Alarm Monitoring

Most alarm systems have the capability to send a test signal within a pre-defined period of time (e.g. once every 7 days, every 24 hours) to allow us to verify that your alarm system is still connected and reporting.

Category: Alarm Monitoring

When you set-up your service you’re asked to complete a Commissioning Form, a formal document that provides key information about your location, contacts and the times you expect to disarm and arm your security system (Section 4 is known as the Open/Close Schedule).

Whilst it’s not essential for you to provide times if you don’t want this feature, it is essential if you to make sure that your system has been armed by a certain time and likewise if you want to us to make sure that nobody disarms your system without authorisation.

Therefore a schedule violation occurs when someone disarms your system when it’s meant to be armed or doesn’t arm your system by the time you want it to be armed.

You should instruct staff to call the Monitoring Centre on 1300 884 543 when they’re working late, and haven’t armed the security system, or are disarming the system after hours when it’s meant to be armed.

If you’d like to update your schedule click here to download a: Commissioning Form

You can also email the Monitoring Centre with changes to your schedule at [email protected]. Please make sure that the email is sent by an authorised member of staff.

Category: Alarm Monitoring

If you’re using PSTN/Digital Dialler or fixed-line IP Monitoring via fibre as your communication option, there may be the risk that the line could be intentionally cut or dropped due to network failure. If this happens, your security system won’t communicate with the Monitoring Centre. If you or your insurer are concerned about your level of risk, you should consider switching to a 4G plan.

Learn more about our 4G plans here.

Category: Alarm Monitoring

Offline – on receipt of a signal we’ll follow your Alarm Response Plan. Because this type of signal indicates that your system is no longer communicating with the Monitoring Centre, if we send a response vehicle to the site and a fault cannot be identified, we’ll still notify a contact to advise them.

Category: Alarm Monitoring

We’ll attempt to contact you using the numbers provided. If we can’t make contact we’ll advise your contacts.

Depending on you nominated Alarm Response Plan, a response vehicle may be sent to your premises to investigate.

Category: Alarm Monitoring

Power Failure – on receipt of a power failure signal the event will be automatically placed on hold for a period of time. If power isn’t restored we’ll follow your nominated Alarm Response Plan.

Category: Alarm Monitoring

Low Battery – on receipt of a low battery signal we’ll follow your nominated Alarm Response Plan. Please note that if your security system loses power (in a blackout for example) & the battery is flat, your system won’t work.

If you’d like to replace the battery in your security system contact service on 1300 538 324 Monday to Friday between 07:00am to 05:00pm AEST. You can also leave a message.

You can order a battery replacement online here.

Category: Alarm Monitoring

Thanks to advances in technology, our alarm monitoring systems won’t fail if there’s a power cut. Unlike phone lines, 4G wireless monitoring systems continue to transmit when there’s a power outage. In the past, opportunistic thieves would use power cuts as an opportunity to gain unlawful access to a building. The use of 4G overcomes this, so you know your system is secure even when there’s no power. This also means your business is less likely to face a break-in when there’s an adverse weather event.

Category: Alarm Monitoring

Any request for a designated hold up alarm service must comply with the National Police Alarm Activation Response Guidelines.

Section 5, Alarm Categories & Responses, defines a Hold Up Alarm received from a business as a Category A alarm if it meets the following guidelines.

To qualify as a Hold Up Alarm the hold up button device attached to your security system must be:

  • a for purpose and manufactured dual button press device
  • permanently fixed to a solid surface and installed in accordance with Australian Standard 2201.2
  • operated by a person who is, or is about to be confronted by a weapon or threat of violence for the purpose of robbery
  • programmed to a seperate, individual zone on the security system
  • maintained in accordance with Australian Standard 2201.1:2007
  • accompanied by the owners written instructions for the activation and reset of the device
  • have any tools or keys that are required for its reset in a designated location on the premises
  • operated as an add-on to a business monitoring service that sends open and close events to the Monitoring Centre when the security system is armed and disarmed

Please note that portable wireless devices, including pendants cannot be classified as a Hold Up Alarm. For information regarding these devices and their treatment as a Duress Alarm please see the FAQ What if I trigger a duress alarm?

In all instances operators will notify Police to attend. Once Police notification has taken place it is irrevocable.

Please note that the National Police Alarm Activation Response Guidelines are a product of the National Emergency Communications Working Group – Australia and New Zealand (NECWG-A/NZ) and are available on the necwg-anz.org website. JD Security cannot guarantee that the police force in your jurisdiction will handle operational matters as described in this document or make changes without notice.

Category: Alarm Monitoring

A duress alarm isn’t a Hold Up Alarm and isn’t reported to police on activation. If you require a Hold Up Alarm please read the FAQ What Happens if we trigger our hold up alarm?

Category: Alarm Monitoring

Once we’ve called and left messages for all of your contacts we’ll wait to receive further instructions. If your Alarm Response Plan includes sending a response vehicle without a contacts authorisation this will be done.

Category: Alarm Monitoring

Alarm activation – on receipt of an alarm the operator will follow your nominated Alarm Response Plan.

Category: Alarm Monitoring

Smoke Alarms – notification of fire/smoke alarms is account specific and will take place immediately if you’ve requested it. If notification of the Fire Brigade is not specified in the account comments, contacts will be notified. If we’re unable to contact any contacts we’ll notify the Fire Brigade to attend. If the system is disarmed an operator will contact the premises directly and report the activation.

Category: Alarm Monitoring

Line fault trouble – on receipt of a signal we’ll follow your Alarm Response Plan. Because this type of signal indicates that your system is no longer communicating with the Monitoring Centre, if we send a response vehicle to the site and a fault cannot be identified, we’ll still notify a contact to advise them.

Category: Alarm Monitoring

Test failure / Should have reported – if a test signal isn’t received as scheduled, we’ll contact you during business hours and get you to test your security system.

Category: Alarm Monitoring

Fire Alarms – notification of fire alarms is account specific and will take place immediately if you’ve requested it. If notification of the Fire Brigade is not specified in the account comments, contacts will be notified. If we’re unable to contact any contacts we’ll notify the Fire Brigade to attend. If the system is disarmed an operator will contact the premises directly and report the activation.

Category: Alarm Monitoring

If you have a medical device or pendant, you can request ambulance service notification for medical alarms. This will ensure that the ambulance service is notified immediately in case of any emergency. However, if you haven’t specified ambulance authority notification, your designated contacts will be notified instead. In case we are unable to reach any of your contacts, we will automatically notify the ambulance service in your state, territory or region to attend.

Category: Alarm Monitoring

A Grade A1 Monitoring Centre is the highest classification for a Monitoring Centre according to the Australian/New Zealand Standard.

The standard sets out the requirements for grading the construction of monitoring centres and the equipment and staff used to monitor security systems. The grading is determined based on two separate parameters: building services and construction, which are graded on a scale from A to C, with A being the most resistant to attack, and operation, equipment, and staff, which are graded on a scale from 1 to 3, with 1 having the highest performance.

Category: Alarm Monitoring

Bypass / Trouble (Isolation) – one or more of the detection devices isn’t functioning on arming. Common causes include doors and or roller shutters that may not have been closed.

Category: Alarm Monitoring

Please make sure that all of your contacts know that they’re on the Contacts list you’ve given us, and that we may attempt to contact them. It’s also important that they understand your company’s security policies and their obligations should we contact them.

Category: Alarm Monitoring

JD Security provides many different alarm communication options for you to choose from including DirectWireless, Inner Range Multipath & Permaconn Wireless 4G, & fixed-line IP Monitoring.

Category: Alarm Monitoring

If you’re on-site and anticipate working past your closing time, please ring 1300 884 543 with your password and be ready to advise your estimated departure time. We’ll update your arming schedule so our system makes sure that you arm by that time.

If you go to your premises and disarm outside your scheduled arming & disarming times please ring 1300 884 543 with your password ready immediately after you’ve disarmed so that we can update your schedule and authorise the entry.

Please note that you may incur response charges if you have arming & disarming schedules in place and don’t contact or advise us of schedule changes. If we attempt to contact you and those calls go unanswered and you’ve authorised us to respond to all events we’ll send a response vehicle.

You can make changes to your arming & disarming schedule by calling 1300 884 543 or emailing the Monitoring Centre at [email protected]

Please note that arming & disarming schedules aren’t mandatory and you can remove them from your service plan if you wish to do so.

  • Alarm activation – on receipt of an alarm the operator will follow your nominated Alarm Response Plan.
  • Bypass / Trouble (Isolation) – one or more of the detection devices hasn’t switched on when the system was armed. Common causes include doors and or roller shutters that may not have been closed.
  • Fire or Smoke Alarms – notification of fire/smoke alarms is account specific and will take place immediately if you’ve requested it. If notification of Fire & Rescue NSW is not specified in the account comments, contacts will be notified. If we’re unable to contact any contacts we’ll notify Fire & Rescue NSW to attend. If the system is disarmed an operator will contact the premises directly and report the activation.
  • Medical Alarms – NSW Ambulance Service notification of medical alarms is account specific and will take place immediately if you’ve requested it. If NSW Ambulance Service notification is not specified in the account comments contacts will be notified. If we’re unable to contact any contacts we’ll then automatically notify NSW Ambulance Service to attend.
  • Power Failure – on receipt of a power failure signal the event will be automatically placed on hold for a period of time. If power isn’t restored we’ll follow your nominated Alarm Response Plan.
  • Low Battery – on receipt of a low battery signal we’ll follow your nominated Alarm Response Plan.
  • Test failure / Should have reported – if a test signal isn’t received as scheduled, we’ll contact you during business hours and get you to test your security system.
  • Line fault trouble / offline – on receipt of a signal we’ll follow your Alarm Response Plan. Because this type of signal indicates that your system is no longer communicating with the Monitoring Centre, if we send a response vehicle to the site and a fault cannot be identified, we’ll still notify a contact to advise them.
Category: Alarm Monitoring

We offer a range of security monitoring plans and secure 4G signalling networks to choose from including Direct Wireless, Permaconn & Inner Range Multipath.

Our plans benefit from competitive pricing, and could save your company hundreds of dollars by avoiding a major security event.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Alarm Monitoring

The cost of your monitored alarm system will depend on the package you choose. For example, as of 2022, some of our package price ranges are:

  • DirectWireless: $40 per month to $90 per month with varying connection fees.
  • Multipath IP: $50 per month to $95 per month with varying connection fees.
  • Permaconn: $40 per month to $115 per month with varying connection fees.

We have a selection of locked in and flexible contracts available, so you can choose a plan that meets your requirements.

Category: Alarm Monitoring

Customers with existing monitored locations can organise an emergency or temporary Guard Service by emailing us at [email protected] from your business email address.

There is a minimum 4-hour charge. If you provide more than 4-hours’ notice, non-emergency rates will apply. However, emergency rates will apply if you give less than 4 hours notice.

You’ll also need to provide access to toilet & kitchen facilities at the location.

Send an email to [email protected] with following information: start date, finish date etc.

Requests for history more than 3 months may take 24-48 hours to produce. Charges may also apply.

Category: Alarm Monitoring

Customers with existing monitored locations can organise a temporary Patrol Service by calling the Monitoring Centre on 1300 884 543 or emailing us at: [email protected] from your business email address.

A temporary Patrol Service includes up to 3 random visits within a 12 hour period, daytime from 6am & 6pm and nightime from 6pm to 6am. Daytime means weekends and public holidays between 6am to 6pm.

Temporary Patrol Service is limited to checking the premises externally from publicly accessible areas.

If you’d like to arrange a permanent service please contact us on 1300 556 334 or email us at: [email protected]

Call 1300 538 324 Monday to Friday between 07:00am to 05:00pm AEST. You can also leave a message requesting a call back.

You can email the service department at [email protected]

Categories: Alarm Monitoring, Service

Medical alarm monitoring is an add-on service that requires the installation of a specific device to the security system.

Once the device has been installed you’ll need to provide the Monitoring Centre with specific information regarding the patient and its use. Please call Sales on 1300 556 334 or email [email protected] to make an enquiry.

Category: Alarm Monitoring

It’s important that you regularly review your Contact list and scheduled arming & disarming times so that we have your most current information.

You can update your contacts online here – make sure that the form is completed by an authorised staff member.

You can also email the Monitoring Centre with changes to your Contacts and Schedules at [email protected]. Ensure that the email is sent by an authorised member of staff.

Please note that we can’t accept changes to contacts and schedules verbally.

Category: Alarm Monitoring

Grade A1 National Monitoring Centre

Accounts & Administration

Sales

Service

Grade A1 National Monitoring Centre

Accounts & Administration

Sales

Service

Tag: contact

Before we can remote arm your security system it will need to be set-up to be remotely accessible. To arrange for your security system to be set-up please call Service on 1300 538 324 or email us at [email protected]

Once your security system has been set up for Remote Arming, if you forget to arm it contact the Monitoring Centre on 1300 884 543 and have your password ready to talk to an Operator.

Charges apply for us attempting to provide this service. In some situations we may be unable to remote arm your security system. This is usually because of a zone being open/activated which may indicate a door is open or a detector has moving objects in front of it, e.g. a sign hanging from the ceiling blown around by an air conditioner.

Category: Alarm Monitoring

AI Video Monitoring (1)

Evolon AI Video Monitoring offers significant benefits for businesses seeking to improve security operations and reduce false alarms. Key advantages include:. The key advantages include:

Enhanced Threat Detection and Response

Evolon’s AI-powered platform continuously analyses video streams, providing real-time, AI-verified alerts for active threats. This allows for rapid response to potential security incidents, significantly reducing the likelihood of missed threats and false alarms.

Cost-Effective Solution

The platform integrates with existing security cameras and systems, eliminating the need for additional hardware. This reduces the overall cost of upgrading security infrastructure to leverage AI.

Scalability & Flexibility

Evolon’s cloud-native platform allows businesses to scale their security operations across multiple sites without additional hardware. The system supports remote management and monitoring, making it suitable for companies of all sizes.

Improved Operational Efficiency

AI-powered forensic search and data analytics enable quick identification of objects and behaviours of interest, reducing the time required for forensic analysis. The system also provides dynamic dashboards and real-time data visualization, helping security teams make informed decisions and optimize resource allocation.

Reduced False Alarms

Evolon’s AI technology significantly reduces the number of false alarms by verifying alerts before they’re sent to the Monitoring Centre. This improves the efficiency of security operations and reduces the burden on security personnel.

Proactive Crime Prevention

By leveraging AI to detect and respond to threats in real-time, Evolon helps prevent crimes before they occur. This proactive approach enhances a business’s overall security posture.

Data-Driven Insights

Evolon’s AI capabilities allow for extracting valuable insights from surveillance footage, helping businesses identify trends, anomalies, and areas that require additional focus. This data-driven approach supports better decision-making and strategic planning.

Integration with Existing Systems

Evolon’s open-architecture approach ensures compatibility with a wide range of security devices and systems, making it easy to enhance existing security infrastructure with advanced AI capabilities.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Aervision (2)

AerVision Technologies’ object detection capabilities are part of their AI-based video analytics solution, AerWatch. This technology combines sensing and computer vision to automatically identify and classify objects and human activities in real-time.

Human and Object Detection with Activity Classification:
AerWatch can detect and classify various objects and human activities, such as walking, riding a bicycle, or carrying items like bags or suitcases.

Single and Multi-Camera Target Tracking:
The system can track targets across multiple cameras, ensuring continuous monitoring and tracking of objects and people as they move through different areas.

Recognition Using Biometric Information or Appearance:
AerWatch uses biometric data and appearance-based recognition to identify individuals accurately. This includes facial recognition, which provides real-time face identification and augments a “virtual lanyard” on faces in the video feed.

Monitoring Crowd Behavior:
The system can monitor and analyze crowd behavior, providing insights into how people interact within a space. This includes tracking and behavior analysis, average travel time between points, dwell and queue times, and accurate counts of people entering and exiting specific waypoints.

Object Classification:
AerWatch can classify objects into categories such as adult, child, pram, trolley, and more. It can also distinguish and track various types of vehicles, animals, and even detect human poses and skeleton formations.

Real-Time Dashboards and Alerts:
The system provides real-time dashboards that display the current situation along with historical statistics. It also has a customizable alert system that can notify operators of predefined events or anomalies, reducing false alarms and improving response times.

Integration with Existing Systems:
AerWatch is designed to integrate seamlessly with existing CCTV, building, and security management systems, allowing businesses to enhance their security infrastructure without the need for additional hardware.

Category: Aervision

AerVision Technologies’ object detection capabilities are primarily implemented through their AI-based video analytics solution, AerWatch. This system leverages advanced artificial intelligence (AI) and machine learning (ML) to provide comprehensive and accurate object detection and monitoring.

Deep Learning and Machine Learning:
AerWatch employs deep learning and machine learning algorithms to automatically learn and improve from the data it processes. This includes the use of convolutional neural networks (CNNs) for feature extraction and object recognition.

Continuous Learning and Adaptation:
The system continuously learns from past observations and user feedback, adapting to the environment to reduce false alarms and improve detection accuracy over time.

Real-Time Processing:
AerWatch operates in real-time, providing immediate detection and alerts for any suspicious or predefined events. This real-time capability is crucial for applications in high-traffic areas like airports, train stations, and shopping malls.

Category: Aervision

Accounts & Billing (3)

We don’t store credit card information. We don’t view your credit card information because the transaction takes place between you and our financial institution.

Category: Accounts & Billing

Grade A1 National Monitoring Centre

Accounts & Administration

Sales

Service

Grade A1 National Monitoring Centre

Accounts & Administration

Sales

Service

Tag: contact

Access Control (1)

Do you know what kind of access card you need?

You’re probably running one of two types of card: HID Proximity or HID iCLASS. Not sure? That’s OK, if you’ve ordered cards through us before we should have your details on file. You can call Service on 1300 538 324 or email us at [email protected]

Categories: Access Control, Service
Return to Top ▲Return to Top ▲