Intrusion Detection Systems

Intrusion alarm systems are used for asset protection, deterrence and to protect human life. They can also be used to monitor other harmful conditions, such as fire or CO. Some of the ways intrusion detection systems can be of benefit include:

  • Central station monitoring 24/7/365 for real-time human coverage.
  • Log and audit your business opening and closing times to ensure employees are abiding by company policies.
  • Maintaining compliance requirements to lower insurance costs and prevent human errors.
  • Manage who has physical access to your premises. 
  • Provide quick access to emergency services, including fire, medical and law enforcement.

Central Station Monitoring

Your IDS (intrusion detection system) monitors signals in real-time and responds based on the programming logic assigned. In most cases, the IDS communicates directly with a UL listed central monitoring station 24/7/365, to ensure that such signals are immediately addressed. 

Infrastructure

Wired vs Wireless

Wireless technology has come a long way and now offers end-to-end encryption with sensor battery life that may extend 5-7 years. Wireless systems can offer amazing value, however under certain conditions it may not be the right fit.

Communication Path

The FCC has sunset copper telco lines, which are becoming increasingly scarce and expensive.  Telco’s replacement, VoIP, is unreliable and not officially supported by most hardware. The remaining options include IP and cellular. We strongly recommend going with a dual-path communicator, with IP as the primary path and cellular as the backup.

Management Interface

Managing an IDS system includes monitoring sensor state and maintaining alarm codes for each alarm user. Legacy systems are limited to a basic alphanumeric keypad with complicated processes. Zimy Electronics favors using such tools as Alarm.com to provide users with an intuitive smartphone app interface.