Security Systems 

Technostream experience in security systems goes way back to the time EPS division was established within the JUMA Al Majid Group in 1977. Since then Technostream has seen the evolvement of security systems till this day. The security team has a wide experience in all systems being traditional or advanced. The security team is always trained and updated with the latest local and international codes and standards.   

Security requirements differ from one venue to another. When we design a security system we comply with the local authority regulations and with the international standards and codes.  Keeping in mind the operational requirements of the venue, the system is customized to fit its purpose.

Nowadays most of the security systems are integrated and controlled through a single Physical Security Integration Manager (PSIM). Technostream has the technical integration team to build custom interfaces that will make it possible for multi security systems to act as one.   

The Physical Security Integration Manager (PSIM) may also allow integration with the safety systems and any ELV control system that may require monitoring and controlling.

Video Surveillance Systems (IP/Analog)

Video Surveillance Systems is the use of video cameras to transmit video on a private network for the purpose of monitoring and security. It may employ point to point (P2P), point to multipoint, or mesh links. The term is most often applied to systems used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores.

Almost all advanced forms of Video Surveillance record the camera footage for a period of time that could go up to six months or more.  Video Surveillance systems now have extra features (such as motion-detection and email alerts). More recently, decentralized IP-based cameras are being widely used. Latest cameras can support intelligent analytics and recording directly to network-attached storage devices, or internal flash for completely stand-alone operation. Surveillance of the public using CCTV is particularly common in many areas around the world.

In the UAE there is strict regulations towards CCTV monitoring in public and security sensitive areas. All below business activities should apply the security regulation of their competent department. 

  1. Hotels and short-stay residences;
  2. Financial and monetary institutions;
  3. Manufacture and sale of precious metals and stones;
  4. Shooting ranges, military and hunting equipment stores;
  5. Shopping and leisure centers;
  6. Precious materials storage facilities;
  7. Hazardous materials storage facilities;
  8. Precious commodities stores/outlets;
  9. Large department stores;
  10. Petrol stations;
  11. Internet services;
  12. Storage services;
  13. Aircraft and balloon clubs. 

Access Control System (ACS)

Access Control System refers to the control over who can reach and use a resource, location, or facility. This involves an authority that controls the level of permission and gives access for authorized personnel or group of people based on their role. 

The system can control pedestrian and vehicle access and can be integrated with different identification technologies before granting access.  

The access control system plays a vital role when important, confidential and sensitive information and property need to be protected.

Intrusion Alarm System

The Intrusion Alarm System is designed to detect intrusion or unauthorized entry into a building or area. It triggers an alarm when an unauthorized access is detected. It could be triggered by motion sensors in restricted areas, door opining without permission, a glass braking, or any similar scenario. The Intrusion alarm system is usually integrated and controlled through the Access control system. Intrusion alarm systems are also called security alarm systems, Burglar Alarm systems, perimeter detection systems.  

Intercom System

The Intercom System provides internal voice or video communication within a facility. In most cases it connects the resident unit with the building or area entry point. It can be integrated with the access control system to grant access permission with a push button.

Asset or Personal Tracking System

Asset or Personal Tracking Systems mostly use RFID or WiFi technology to track a small tag that is attached to the item or person being tracked. Using this system the operator can locate the item or person at any time. This System is widely used in hospitals for assets and staff tracking. Security officers with in a building or community are easily located with the help of this system. For companies in the transportation field the system can offer them real time fleet management and monitoring.  

X-ray Screening and Metal Detectors

X-ray Screening and Metal Detectors may be used at the entrance of hotels, and institutes for increased security. 


2014 © Copyright Technostream. All Rights Reserved