Control Electronic Security Globe


Control Electronic Security - local and international - license #EFB-831

español · home · contact · about us ·

Phone: (786) 367 6090


CCTV: Closed Circuit Television / Video Surveillance Cameras / Security Cameras / Digital Cameras, Spy Cameras / Hidden Video Cameras / Covert Cameras/ Cameras for Home Security/ Wireless Cameras, DVR:Digital Video Recorder / Buy Cameras
/ Internet Panasonic Cameras
/ Watec Cameras
» Metal Detectors: Walk-thru Metal Detectors / Walk-through Metal Detectors / Metal detectors for Schools and Hand Held Metal Detectors -Metal Detectors for Treasure Hunters / Security Portals / Security Doors
» EAS - Electronic Article Surveillance: Antennas, Tags & Labels, Antishoplifting,  Electronic Anti-theft Devices, Merchandise Protection,  Library Protection System
» Traffic Control: Tiger Teeth - Saber Tiger Tooth,  Tiger Tooth / Sabre Teeth,  Tire Shredders, Parking Booth, Kiosks

» Bollards/Bollard System/Rising Barricades/Crash Beam Barriers/Hydraulic Beam Barriers/Barricade/Safety Barricade/Road Barricade/Barricade Pop Up/Barricade Security
» Parking Booths/Security Parking Booths/Guard Booths/Guard Shacks/Kiosks

» Guard Tour, Guard Tour System, Guard Tour Verification, Guard Patrol System
» Gates: Slide Gates and Swing Gates / Ticket Spitters / Traffic Controls / Barrier Gate
» X Ray Machines,  X Ray Scanners, Airport X Ray Machines, Portable X Ray Machines,   Security X Ray Machines
» Counterfeit Detection and Bill Counters

» Perimeter Protection, invisible wall
» Asset Management / Personnel & Vehicle Access Control / Personnel Monitoring / Production and Process Control / Inventory Tracking Access Control Readers and Finger-Print Readers / Palm Readers
» Intercoms: Video, Audio
»Burglar Alarms / Wireless Burglar Alarms / Fire Alarms
» Digital Audio Recorders / Phone Recorders / Phone Digital Recorders / Room Recorders, Digital Recorders with USB Port
» Vehicle Undercarriage Search / Inspection Mirror / Vehicle Inspection Mirror / Mirror Search / Car Mirror / Security Mirror
» Explosive Transport
» Fire Alarms
» Bullet Proof Vest, bulletproof vest
»Real estate agents in Florida

8209 N Pine Island Rd.
Suite 196 Fort Lauderdale,
Florida 33321



En Español:


Contáctenos en Español:

Disclaimer: All sales are final. Prices are not negotiable.

We accept






Our Automatic Identification products offer tools designed to identify locate and track your people and assets right from the desktop. From protecting office computers to monitoring personnel and inventory movements, these products now bring total visibility to your operations.

Based on its patented RFID (Radio Frequency Identification) line, the product provides a single-system approach to a variety of automatic monitoring and tracking applications, including:

  • Asset Management
  • Personnel & Vehicle Access Control
  • Personnel Monitoring
  • Production and Process Control
  • Inventory Tracking

Unique Features

Network Architecture - leverage existing corporate LAN /WAN/VPN for efficient data collection and control across the entire enterprise

Flexible Configuration - detect and identify tagged assets, people and vehicles at specific control points or monitor within broad coverage zones

Automatic Operation - hands free, long range identification supports both static and dynamic tracking, as well as covert monitoring applications

Easy to Integrate - interfaces with existing systems via industry standard interfaces, including Wiegand output for access control and alarm panel contact points

Single System Solution - multiple tag types and activation options support a variety of applications for enterprise-wide visibility and enhanced business operations

How the System Works

The System uses small, battery powered tags that, when automatically activated at control points throughout a facility, broadcast to receivers networked on the existing corporate LAN /WAN, VPN or Internet. Unlike other wireless identification and location systems, this unique dual-frequency operation and advanced capabilities allow tags to be activated and tracked in a variety of useful ways to support multiple controls.

Tags awakened by low cost activators transmit not only their unique identification code, but location and status information as well. Tag signals are picked up by network receivers up to 100 feet away, thus allowing a single receiver to collect tag data from a number of activation points. This flexible control point architecture allows users to automatically activate tags at specific locations within the facility to support applications, such as access control and perimeter control. These read points can also be grouped into control zones to locate an asset or person within a specific zone, as well as monitor movement between zones.

The receiver network also collects information from tags activated by other means, such as removal of an asset tag with tamper detection or a personnel tag with a built in distress call or panic button. These tags intermittently transmit alarm signals on a continuous basis, allowing security personnel to locate and monitor the incident as the tag moves through the coverage area. Omni-directional network transceivers, capable of two-way tag communication, support wide area polling and tag activation, enabling both static and dynamic tracking of tagged asset and inventory, as well as employee notification and location determination.

Tag identification and location information is instantly forwarded over the network to a host computer running the software to provide real-time management solutions via powerful reporting, display, and decision and control functions. Alert signals can also be tied into existing alarm, access control and surveillance systems.

The system, combined with the software, leverages the corporate LAN to provide today's e-managers with valuable tools for improving productivity, physical security, life safety and inventory visibility. Linked assets and people can be tracked and located within close proximity, thus providing an automatic, non-invasive asset protection solution while enabling freedom of movement.

home · cameras/closed circuit tv · metal detectors · electronic article surveillance · tiger teeth · guard tour · gates · x-ray scanners · counterfeit detection · perimeter protection · access control · intercoms · burglar alarms · vehicle search · explosive transport · fire alarms · personal protection · contact

Using technology to protect lives, facilities, and assets

©2001-2012 Control Electronic Security and its licensors. All rights reserved.