Control Electronic Security Globe

 

Control Electronic Security - local and international - license #EFB-831

español · home · contact · about us ·

Phone: 305.499.9396

786. 367.6090

En Espanol: 305.815.9141

e-mail: 8730ces@gmail.com

 security@mgscontrol.com

sales@mgscontrol.com

» HOME
»
CCTV: Closed Circuit Television / Video Surveillance Cameras / Security Cameras / Digital Cameras, Spy Cameras / Hidden Video Cameras / Covert Cameras/ Cameras for Home Security/ Wireless Cameras, DVR:Digital Video Recorder / Buy Cameras
/ Internet Panasonic Cameras
/ Watec Cameras
» Metal Detectors: Walk-thru Metal Detectors / Walk-through Metal Detectors / Metal detectors for Schools and Hand Held Metal Detectors -Metal Detectors for Treasure Hunters / Security Portals / Security Doors
» EAS - Electronic Article Surveillance: Antennas, Tags & Labels, Antishoplifting,  Electronic Anti-theft Devices, Merchandise Protection,  Library Protection System
» Traffic Control: Tiger Teeth - Saber Tiger Tooth,  Tiger Tooth / Sabre Teeth,  Tire Shredders, Parking Booth, Kiosks

» Bollards/Bollard System/Rising Barricades/Crash Beam Barriers/Hydraulic Beam Barriers/Barricade/Safety Barricade/Road Barricade/Barricade Pop Up/Barricade Security
» Parking Booths/Security Parking Booths/Guard Booths/Guard Shacks/Kiosks

» Guard Tour, Guard Tour System, Guard Tour Verification, Guard Patrol System
» Gates: Slide Gates and Swing Gates / Ticket Spitters / Traffic Controls / Barrier Gate
» X Ray Machines,  X Ray Scanners, Airport X Ray Machines, Portable X Ray Machines,   Security X Ray Machines
» Counterfeit Detection and Bill Counters

» Perimeter Protection, invisible wall
» Asset Management / Personnel & Vehicle Access Control / Personnel Monitoring / Production and Process Control / Inventory Tracking Access Control Readers and Finger-Print Readers / Palm Readers
» Intercoms: Video, Audio
»Burglar Alarms / Wireless Burglar Alarms / Fire Alarms
» Digital Audio Recorders / Phone Recorders / Phone Digital Recorders / Room Recorders, Digital Recorders with USB Port
» Vehicle Undercarriage Search / Inspection Mirror / Vehicle Inspection Mirror / Mirror Search / Car Mirror / Security Mirror
» Explosive Transport
» Fire Alarms
» Bullet Proof Vest, bulletproof vest
»Real estate agents in Florida
» CONTACT US
» ABOUT US

8730 Azalea Ct
Suite 202
Fort Lauderdale, Fl 33321

Phone:  

786.367.6090

En Español:

305.815.9141

8730ces@gmail.com security@mgscontrol.com sales@mgscontrol.com Contáctenos en Español: seguridad@controlelectronic.com ventas@mgscontrol.com

Disclaimer: All sales are final. Prices are not negotiable.

 
We accept

 
 
Assets and personnel control  

SA-100 - Stand Alone Access Control 

This card access unit utilizes state-of-the-art electronics in providing a unit that is both inexpensive and fully programmable. It is protected from weather and vandalism. Place the card on the stainless steel touch plate and the card is read instantly and accurately. The complete unit easily surface mounts to almost any surface.

Stand Alone Access Control
click for larger view

AC-100 - Access Control

Proximity or swipe reader.

No dedicated PC needed.

PC is only required during a system upload, download or when in monitor mode. Proximity readers have no key buttons to be vandalized, no card slots to get dirty or jammed. With billions of possible codes, is virtually impossible to duplicate.

Card Swipe Access Control Reader
click for larger view

 

OA100- Fingerprint Time and Attendance system

  • Office Desktop fixed system, easy installation and simple operation system.
  • The smallest stand-alone system with full funcion
  • Up to date, exquisite design, blue LCD
  • Phillips industrial chip, reliable pereformance
  • Special design with particular security, resist to violence
  • Stand-alone, excellent identification
  • Support our latest version of software, meet with the most condition of time attendance report and analysis
  • Communication: RS232
  • Several modification modes: ID + Password, ID + Fingerprint, fingerprint only
  • Template storage capability: 1,760 fingerprints
  • Fast Image scan time/verification speed within 1 sec
  • Good Transaction record storage capacity: 30,000
  • FAR<0.00001%, FRR < 0.001%
  • Color can be customized

Fingerprint Reader
click for larger view

Interface:

bio-office

click for larger view

ASSETS AND PERSONNEL CONTROL

Click the following links to see details
System Overview
Aplications
Parts of the system

Our Automatic Identification products offer tools designed to identify locate and track your people and assets right from the desktop. From protecting office computers to monitoring personnel and inventory movements, these products now bring total visibility to your operations.

Based on its patented RFID (Radio Frequency Identification) line, the product provides a single-system approach to a variety of automatic monitoring and tracking applications, including:

  • Asset Management
  • Personnel & Vehicle Access Control
  • Personnel Monitoring
  • Production and Process Control
  • Inventory Tracking

Unique Features

Network Architecture - leverage existing corporate LAN /WAN/VPN for efficient data collection and control across the entire enterprise

Flexible Configuration - detect and identify tagged assets, people and vehicles at specific control points or monitor within broad coverage zones

Automatic Operation - hands free, long range identification supports both static and dynamic tracking, as well as covert monitoring applications

Easy to Integrate - interfaces with existing systems via industry standard interfaces, including Wiegand output for access control and alarm panel contact points

Single System Solution - multiple tag types and activation options support a variety of applications for enterprise-wide visibility and enhanced business operations

How the System Works

The System uses small, battery powered tags that, when automatically activated at control points throughout a facility, broadcast to receivers networked on the existing corporate LAN /WAN, VPN or Internet. Unlike other wireless identification and location systems, this unique dual-frequency operation and advanced capabilities allow tags to be activated and tracked in a variety of useful ways to support multiple controls.

Tags awakened by low cost activators transmit not only their unique identification code, but location and status information as well. Tag signals are picked up by network receivers up to 100 feet away, thus allowing a single receiver to collect tag data from a number of activation points. This flexible control point architecture allows users to automatically activate tags at specific locations within the facility to support applications, such as access control and perimeter control. These read points can also be grouped into control zones to locate an asset or person within a specific zone, as well as monitor movement between zones.

The receiver network also collects information from tags activated by other means, such as removal of an asset tag with tamper detection or a personnel tag with a built in distress call or panic button. These tags intermittently transmit alarm signals on a continuous basis, allowing security personnel to locate and monitor the incident as the tag moves through the coverage area. Omni-directional network transceivers, capable of two-way tag communication, support wide area polling and tag activation, enabling both static and dynamic tracking of tagged asset and inventory, as well as employee notification and location determination.

Tag identification and location information is instantly forwarded over the network to a host computer running the software to provide real-time management solutions via powerful reporting, display, and decision and control functions. Alert signals can also be tied into existing alarm, access control and surveillance systems.

The system, combined with the software, leverages the corporate LAN to provide today's e-managers with valuable tools for improving productivity, physical security, life safety and inventory visibility. Linked assets and people can be tracked and located within close proximity, thus providing an automatic, non-invasive asset protection solution while enabling freedom of movement.

Click the following links to see details
System Overview
Aplications
Parts of the system

 

home · cameras/closed circuit tv · metal detectors · electronic article surveillance · tiger teeth · guard tour · gates · x-ray scanners · counterfeit detection · perimeter protection · access control · intercoms · burglar alarms · vehicle search · explosive transport · fire alarms · personal protection · contact

Using technology to protect lives, facilities, and assets

©2001-2012 Control Electronic Security and its licensors. All rights reserved.