Different Surveillance

SERVICES
CCTV Surveillance

CCTV Surveillance

DIFFERENT offers a comprehensive range of CCTV technologies from the latest HD (High Definition) systems to the latest megapixel and artificial intelligent technology available today.

 

Our Surveillance Systems are professional grade, and state-of-the-art while remaining easy to use and affordable. Our years of experience allow us to confidently implement complete systems for even the most complex installations. We can also upgrade your out-of-date security camera system to a more effective security system.

 

We will provide you with friendly, in-house technical support and easy-to-use, FREE remote viewing apps so you can see your house or business from anywhere on your mobile devices. Whether you are a small business, large warehouse, government organization, or homeowner.

 

Surveillance Systems:
  • HD (High Definition) digital video recorders (DVR)
  • HD (High Definition) Analogue CCTV Cameras
  • (IP) Network video recorders (NVR)
  • IP megapixel cameras
  • Number plate recognition cameras (APNR)
  • Thermal Cameras
  • Artificial intelligent self-learning video analytics
  • Video analytics software
Off-Site Monitoring

Off-Site Monitoring (OSM) Solutions

Off-site monitoring is the latest and most efficient electronic security solution of its kind that proactively prevents breach, loss, or damage to your property before it occurs. This solution acts as a total electronic security solution with instant live video footage and communication sent to our off-site control room when any alarm event occurs.

 

Off-site monitoring allows your site to be monitored at our high-security alarm and video-receiving centre for the fraction of the cost of mobile patrols or a manned guard on-site. Inside the monitoring centre, there is a team of fully qualified monitoring staff who are all monitoring CCTV cameras and are trained to deal with any incidents that may occur on your site. They receive the alarm, monitor the threat, track intruders, issue audio warnings and follow an agreed action plan. For example: notifying the armed response or emergency services.

 

The Sequence of Events In A Typical Incident Takes Place As Follows:

  1. Intruder attempts to enter your property.
  2. Our virtual guarding detection technology and video analytics are activated as soon as an intruder enters an unauthorized zone.
  3. An alarm and real-time video footage captured by the security camera are immediately sent to our 24-hour monitoring center.
  4. The control room operator in our control room opens an alarm event and reviews live footage of your property.
  5. If a threat is detected, an immediate live audio warning is issued to the intruder – this in most cases will result in the intruder leaving your property.
  6. If the intruder does not leave your property control room operator will contact the armed response company and tracks the intruder as the response company inspects your property.
  7. A site activity feedback report on each incident will be emailed to you daily.

 

Advantages:

  • Our control room operators will instantly challenge and deter intruders remotely via the two-way speaker system without the need to physically confront them.
  • The live audio solution can also be very useful in assisting armed response officers, Police, or any other authorities on the exact location or last seen position of the criminals.
  • We watch the watchers: We monitor the performance of your response or guarding company and will provide full detailed reports on reaction times and actions taken.
  • Our state-of-the-art software and detection technology can cover greater distances and we can cover as far as 300 meters with one single device.
  • Our systems can see in total darkness and there is no need for additional lighting.
  • Guards or response officers have a limited view of the entire premises at any given time, whilst our system can not only see but detect any movement everywhere at any time.
  • Cost effective and considerably reduces security-related costs.
  • Off-site monitoring can immediately replace human guards and is far superior and reliable when compared.
Access Control

Access Control

DIFFERENT offers sophisticated access control solutions ranging from single door stand-alone systems to multi-door access systems to fully-featured integrated solutions for controlling access to multiple facilities with complex requirements. All of this is managed through an easy-to-use software platform.

It is extremely important for you to have the right access control system for your building or secure enclosure. Our system will match your requirements, and be completely reliable, cost-effective, and more importantly user-friendly for those who use and administer it.

 

Our Services Include:

  • Biometric solutions
  • Visitor management systems with one-time pin and SMS notification.
  • Short and long-range RFID card reader systems
  • No touch solutions
  • Licence card and disc scanners
  • Steel / Glass Turnstile barriers
  • Boomgate barriers and road spikes
  • Gate / Door Automation
  • Intercommunication systems
  • Integrated software solutions combining existing technology with your access system
  • Maintenance Plans

 

Our access control systems empower you to control how people get around your property, ensuring they are always in the designated place and as safe and secure as possible.

 

Benefits Of Our Access Control Systems

  • Keep unauthorized people out of your property
  • Integration with your other security systems to maximise protection
  • Reduced administration time through visitor management software
  • Full control over when and where your staff, visitors, and vehicles are permitted
  • Enables all your security to be controlled centrally

 

Whether you are a small organisation, an educational establishment, or a large commercial business we can design implement and maintain the perfect, tailored made access control solution for you.

Perimeter Protection

Perimeter Protection

DIFFERENT has gained more than 22 years of field experience in the perimeter security market. Handling some of the most sophisticated projects up to date. DIFFERENT’s skilled personnel and wide range of advanced perimeter security systems have provided our customers with impenetrable perimeters, preventing many events from happening.

We use cutting-edge technology, and products and have continuously been extending our product line as technology evolves. Our long-term investment in new technologies has enabled us to offer our customers the very best perimeter security solutions.

 

Whenever required, DIFFERENT’s advanced perimeter intrusion detection systems (PIDS) integrate with any installed passive security fence. This integration provides a high, reliable level of security with a lower rate of false alarms and maximum intrusion detection capabilities.

 

DIFFERENT offers turn-key projects which include consulting, implementing, and maintaining the various perimeter systems.

 

Perimeter Technologies:

  • Infrared detection systems
  • Thermal perimeter detection systems with tracking analytics
  • Automated CCTV tracking
  • AI (Artificial Self Learning Video Analytics) Perimeter detection systems
  • Short and long-range radar detection systems
  • Comprehensive range of electric fence options / Custom built electric fences, C.O.C’s (Certificate of compliance)
  • Multi-zone electric fences
  • Software integration for zoned electric fences
  • Maintenance Plans
Alarm Monitoring

Alarm Monitoring Networks

Alarm Monitoring Networks is a private VHF radio monitoring network implemented within a security estate or road closure to monitor electronic security and panic systems.

 

Our (different) VHF Radio Alarm Monitoring is the most secure method of monitoring alarm systems and critical emergency systems such as 24-hour panic buttons.

 

It is a more secure technology than Wi-Fi, Landline, or Cellular communications. It operates independently of all other forms of communication ensuring no single point of failure and is ideal for use in high-security situations. As well as being more secure than data signals, radio signals travel more quickly from the point of activation to the monitoring centre enabling a speedier response.

 

Long-range wireless radio monitoring provides a highly secure, highly reliable connection to the guard house or control room centre and eliminates the ‘weak link’ in conventional alarm systems. Radios can be positioned in a secure location making access difficult. The intruder is less likely to compromise the physical radio and it is more difficult to block radio signals than Wi-Fi, Landline, or Cellular.

 

When an alarm activates a signal is generated via the radio advising the guard house or control room centre of the nature of the alert. As well as being more secure than other forms of transmission, radio signals are harder to compromise and travel more quickly from the point of activation to the monitoring centre.

 

Using radio in conjunction with the more traditional forms of alarm monitoring provides customers with a second line of defence and true resilience.

 

Benefits of Radio Alarm Monitoring:

  • Truly resilient
  • More reliable and secure
  • Protects people, property, and business assets
  • Regular polling to ensure the system is live
  • Signals travel quicker enabling quicker response times
  • Nationwide coverage
  • A long-term investment as the network remains within the estate and never has to change regardless of the security company appointed to operate the system
  • Various electronic systems can be monitored
  • Maintenance Plans
Intruder Detection

Intruder Detection

Intruder detection systems, most referred to as ‘burglar alarms’, are used in homes and businesses to deter and detect intruders. DIFFERENT designs, installs, and maintains a range of intelligent systems for all sizes and types of properties. We are also able to take over existing systems to upgrade them to current specifications or maintain them as is.

 

Through years of experience, we have mastered the art of designing systems that detect with precision and cause minimal false alarms, ensuring our clients’ peace of mind. Our systems comprise the latest detection and alarm technology.

 

We offer indoor/outdoor, wired, and wireless solutions, and below is a range of detection devices we use…

 

INDOOR OUTDOOR PASSIVE INFRARED MOTION DETECTORS

Also known as PIR sensors, these are the most common type of sensors used because they are practical and affordable. The term passive means that these detectors operate without any need to radiate and generate their own energy. PIR sensors can efficiently detect changes in the ambient temperature as well as body heat. If these sensors detect a temperature spike due to the presence of an intruder or foreign object, the alarm is set off. A thing to note is that infrared energy cannot pass through glass, so the alarm won’t trigger due to the presence of people or animals outside.

 

ULTRASONIC DETECTORS

Ultrasonic detectors use high-frequency sound waves to detect any kind of movement within a limited space. They transmit frequencies between 25 kHz and 75 kHz, which are inaudible to human ears. These frequencies are bounced off the walls, ceiling, as well as furniture in a protected room. And when there is any sudden change in the stabilized frequency, the alarm is triggered. Any moving object can change the frequency of the surrounding sound waves in the protected space, so these sensors will not discriminate between intruders and passersby.

 

MAGNETIC SWITCHES

Magnetic switches are typically used for protecting doors and windows. Their ease of use, durability, and affordability makes them a popular choice. They consist of two separate parts i.e. the switch and the magnet. The switch creates an electrical circuit with the magnet when closed because it contains a spring. If a window or door is opened the circuit breaks and the alarm is triggered.

 

PHOTOELECTRIC “LAZER” BEAMS

Photoelectric beams utilize infrared light beams in order to detect the presence of an intruder. These infrared light beams are usually stacked in rows of two or more. The alarm system goes off if anyone obstructs a beam.

 

MICROWAVE DETECTORS

A microwave motion detector uses microwave technology to analyse its environment. This is achieved by sending out microwave signals, and the length of time it takes for the signal to return to the motion detector is measured. This is known as ‘echo time’. Echo time is the calculation of distances from any stationary object within the detection zone and establishes a baseline for the motion detector to work from. A motion detector will use a baseline room analysis to detect its current distance from stationary objects within its detection range, after which it will return to a ‘normal’ state. When a person enters the detection zone, this will interrupt the microwave signal and therefore will alter the echo time received by the motion detector. This will be perceived by the motion detector as a change in distance from a stationary object and will therefore cause the motion detector to trigger the alarm.

 

GLASS BREAK DETECTORS

When a glass breaks, different bands of frequencies are generated including ultrasonic waves that are audible to humans as well as infrasonic that humans cannot hear. These sensors are installed next to glass panes, and the alarm sets off instantly when the glass breaks.

 

 

REGRET IT ALWAYS COMES TOO LATE AND COSTS A LOT MORE THAN PREVENTION

 

Intruder Detection Systems

  • Wired 1 – 120 zone wired alarm systems
  • Wireless 1 – 120 zone wired alarm systems
  • Outdoor passive infrared detectors
  • Indoor passive infrared detectors
  • Door sensors
  • Photo electric active infrared beams
  • Smoke detectors
  • Two-way remote transmitters
  • Audible warning devices
  • Strobe lights
Fiber Optics

Fiber Optics

DIFFERENT can design, implement, and maintain a Fiber data network to connect multiple security devices such as CCTV cameras, Energizers, and Access Control Systems to one centralised point. Fiber optic transmission is often a far better option for several reasons.

 

Longer distances are probably the most prominent reason for choosing Fiber. Fiber optic transmission can be extended to distances of 60km or more, making this the choice for sites where distant devices or cameras are required. A major benefit when streaming high-resolution cameras is the significantly improved bandwidth available with Fiber optic cables, and the ability to connect more cameras into the feed is a major benefit. On systems where just one or two cameras are currently used using Fiber optic, it means the user can upgrade the system later to support additional cameras without the hassle and expense of upgrading the infrastructure.

 

With higher quality pictures, higher bandwidth, and a faster data transfer speed, pictures can achieve a significantly higher resolution than that which is possible using coaxial or copper cabling. Added to this, Fiber optic is non-conductive and completely immune to radio frequency and electromagnetic interference. Therefore, the picture can be relied upon to maintain its integrity no matter what is occurring in the neighbouring environment.

Backup Power

Backup Power & Solar Solutions

A backup power system is the only solution that can provide an uninterrupted power supply in case of power outages. For security purposes, it is imperative that all electronic equipment have adequate backup power installed.

 

DIFFERENT provides expert advice and services with the design; implementation and maintenance of backup systems and can provide full turnkey solutions for all your power backup needs.

 

When choosing the correct backup system required there are many important factors that one should take into account.

 

To Name A Few

  • What is the daily power consumption of all the devices connected (kWh)?
  • How long should the batteries last in case of a power failure?
  • How big should my battery bank be (Ah)?

 

DIFFERENT provides expert advice and services with the design; implementation and maintenance of backup systems and can provide full turnkey solutions for all your power backup needs.

 

Our Backup Power Services Include

  • Power consumption calculations
  • Daily Power consumption testing
  • UPS systems
  • Battery backup solutions (Gel, Lithium-ion)
  • Solar Panel installations
  • A comprehensive range of Grid-tied / off-grid inverters
Maintenance Plans

Maintenance Plans

DIFFERENT can assure that your security systems are operating at their peak with our comprehensive preventative maintenance program. By inspecting your systems on a scheduled basis, you avoid system downtime in the event a component fails.

 

DIFFERENT’s Preventative Maintenance plans cover all types of protection systems including perimeter detection, CCTV, Access control, Alarm radio networks, intruder detection, Fiber networks, power backup systems, and integrated solutions, which are all customised to your needs. Adding the DIFFERENT Service Plan will ensure all required repairs are covered.

 

Our service desk recognises the need for prompt and effective attendance with over 95% of system failures repaired on the first visit by our service engineering teams.

 

We provide some of the best response times in the industry and offer service and maintenance solutions for any market.

 

Typical Plans Include

  • Visual inspection of entire systems
  • Alarm verification audits
  • Walk-test of system components
  • Cleaning of devices as needed
  • Verification of communication links
  • System training
  • Programming backup and software patch updates for PC-based systems
  • Monthly, quarterly, semi-annual, and annual inspection options available
  • Access to technical support through our 24-hour Technical line
Consulting Services

Consulting Services

DIFFERENT provides design and consulting services for the latest integrated electronic security systems available on the market. With our extensive knowledge in this field, we can offer you the resources and most reliable technology to maximize the effectiveness of any electronic security system.

 

It is critically important that security risks are properly evaluated, with corrective action taken as soon as possible to protect life and property. The ability to integrate multiple security technologies and monitoring systems will greatly accelerate this process, leading to a strengthened deterrent and instant response to any possible security breach.

 

We Can

  • Identify security system objectives
  • Provide security system planning, engineering, and initial design
  • Recommend the most advanced security products available
  • Compare product features against price to reduce costs
  • Provide final system design and drawings, product selection, and procurement
  • Provide technical assistance for integrating selected products into a “seamless” operational system
  • Assist in the development of accepted standards for system performance
  • Review plans for operator training and long-term hardware and software support
Systems Finance

Systems Finance

DIFFERENT offers you the option of “rent to own” your security solution. This is a perfect option for businesses, residential estates, or even for private homeowners who require expensive technology, but falls short in the capital.

Rental agreements provide clients with uninterrupted use of the equipment, rather than ownership of the equipment.

Features

  • Repayment periods range from 12 to 60 months for Tax-Based customers and companies
  • Interest rates are either linked to Prime or fixed for a period
  • VAT is NOT capitalised and does not form part of the original debt. VAT is paid on the value of each month’s rental payment
  • All equipment rented must be comprehensively insured during the term of the agreement

Benefits

  • Falls inside OPEX budgets of companies and not CAPEX budgets
  • Clients can enjoy the usage of expensive equipment
  • Ownership of the equipment does pass to the Client at the end of the rental term.
  • The repayment period can be structured to suit the needs of the Client
  • Monthly payments are TAX deductible

Best Suited For

  • Businesses using equipment who don’t want a depreciating asset on their books
  • Businesses using equipment who don’t want a depreciating asset on their books
  • Tax-Based clients
  • Companies & Corporate organizations
  • Private property owners