Integrated Building Management System (IBMS)
Integrate Building Management System (IBMS), also called Building Automation System (BAS), is a computerized platform that integrates disparate mechanical and electrical systems of a building(s), such as HVAC, lighting, power, fire protection, security, etc., for centralized, real-time control and management. Its overarching goal is to help building managers attain efficiency in energy consumption and operational performance and hence reduction in costs.
IBMS comprise several components such as software, displays, servers, controllers, and a network of smart sensors installed in various building systems that link to a central database. Sensors gather and send data to the IBMS which monitors it and triggers appropriate responses when a problem is detected. IBMS achieve this integration using either proprietary Internet protocols or open standards.
GE-Ctrls has partnered with reputed international vendors such as Pelco (a subsidiary of Schneider Electric), Bosch, Sony, Honeywell and others to variety of IBMS solutions.
Ideal for use in large projects with extensive mechanical and electrical systems such as:
- Airports, seaports, train stations
- Office and residential complexes
- Government and defense complexes
- Shopping malls
Features and Benefits:
- Centralized data consolidation improves real-time reporting and decision-making
- Data-driven insights help in the effective monitoring and optimization of energy consumption thereby preventing energy wastage and minimizing operational costs
- Improved reliability and life of building equipment and systems saves time and money during maintenance
- Remote monitoring, early detection of problems, automated maintenance scheduling due to computerized processes
Possibility of localized control
- Dashboards and applications for energy management, scheduling, trending, logging, reporting, etc. with user friendly Graphical User Interface (GUI) for ease of navigation and customization
- Customized alarms and alerts
- Open standards protocols for interoperability
- Efficient and scalable architecture
- Flexibility to grow– Open standards protocols and a scalable infrastructure ensures that your IBMS can accommodate any future expansion in your systems
Access control is a security methodology aimed at regulating physical or logical access to geographical, material and informational assets. ACS typically control such access by taking a user-provided credential as input, verifying it against a database (called an access control list) and granting/denying access based on its authentication.
GE-Ctrls has partnered with reputed international manufacturers such as Pelco (a subsidiary of Schneider Electric), Bosch, Sony, and Honeywell and others to provide a wide range of both Physical and Logical ACS solutions
Physical ACS involves the use of physical barriers to prevent unauthorized access by people or vehicles to secured buildings/facilities. Based on the specific security needs of the situation, several types of physical ACS are available such as:
ACS can even be integrated with other systems such as CCTV, gate automation, etc. for a more comprehensive security solution.
Logical ACS are designed to perform identification, authentication, authorization via login credentials such as biometric scans, electronic keys, passwords, personal identification numbers (PINs), etc.
Boom barriers are an ideal choice for areas requiring high-speed, frequent access control such as in parking garages and toll booths. These systems consist of a breakaway gate arm, motor assembly and housing.
Ideal for use in:
- Toll gates
- Parking facilities
- Industrial areas
- Office and government buildings
- Residential areas
- Shopping malls
- Airports, train stations, seaports, bus stations
Features and Benefits:
Inbuilt optical beam sensors as a safety measure to detect the presence of obstructions(e.g., a person or a stopped vehicle) and revere the boom’s downward movement
Different lengths of boom arms allows customizability
Reflective strips on the boom bar for better visibility
Durable and high torque motor to ensure heavy-duty operations
Hydraulic or electromechanical operating technology as per your preferences
Dual speed ensures quick opening/closing and soft landing of the barrier
Can be operated manually (in case of power failure) or remotely via an ACS
Adjustable grill below the boom prevents unauthorized movement after lowering
Dust and water resistant control units
Find out if a Barrier Arm Gate Operator system is the best solution for your security needs by contacting us today. Our team will work closely with you to analyze your needs and develop a customized stand-alone or integrated solution.
Turnstiles allow only one person at a time to pass through the gate and are therefore ideal for controlling entry access by employees/visitors to your facilities or to enforce one-way pedestrian traffic. They are thus suitable in a variety of settings such as in building lobbies, factories, mass transit stations, stadia, amusement parks, museums, etc.
All our turnstiles are made from corrosion resistant metal and come in two basic forms: Tripod turnstiles and full-height turnstiles. They can be integrated with a card reader system or other methods such as inserting a token or ticket, etc. to actuate the gate. They can be mechanically or electrically operated and can be configured for one- or two-way movement.
While their benefit from a security standpoint may be obvious, turnstiles also offer useful data from a business perspective as they provide an accurate count of attendance.
Find out if a Turnstile Access Control Gate is the best solution for your security needs by contacting us today. Our team will work closely with you to analyze your needs and develop a customized stand-alone or integrated solution.
Bollards are sturdy, short, vertical posts that are designed to guide traffic and protect against vehicle intrusions. Not only do they create high visibility barriers preventing vehicular (but not pedestrian) access to restricted areas but can also be specifically designed to withstand high-impact vehicle collisions. In the latter security application bollards are made from structural grade steel and are ideal for locations where safety and security are especially important.
Bollards can be installed in two basic forms depending on the specific needs of the client:
Retractable, collapsible or removable bollards
The former are installed with versatile mounting systems and are ideal for locations with changing access needs while the latter can even be embedded and reinforced with concrete for greater security.
Find out if Bollards are the best solution for your security needs by contacting us today. Our team will work closely with you to analyze your needs and develop a customized stand-alone or integrated solution.
Tiger Teeth are traffic controllers that are used where one-way traffic flow needs to be enforced. While the torsion spring actuated “Tigers Teeth” permit vehicular movement in one direction, they restrict free flow in the other direction due to the ability of the sharp “Tigers Teeth” to puncture/damage pneumatic tires (including steel-belted radials).
Find out if Tigers Teeth is the best solution for your security needs by contacting us today. Our team will work closely with you to analyze your needs and develop a customized stand-alone or integrated solution.
Logical ACS Solutions
Biometric Facial Recognition is an identification (ID) system that uses the human face as a security pass code. The system comprises of cameras that capture and store high-quality digital facial imagery which is fed to intelligent image processing software that validates it against a database of stored images. Such a system has two inherent advantage over other finger/palm prints-based and iris-based biometrics ID systems:
Completely contact-less process
Archived facial images can be viewed anytime to ID a person without having to interact with them again
These systems have the potential for a wide variety of applications in defense/ law-enforcement, industrial, and civilian situations.
GE-Ctrls provides highly accurate biometric facial recognition systems sourced from reputed manufacturers. We can either implement this system as a functionally independent application or seamlessly integrated it with your existing biometric or non-biometric security solutions.
Find out if an Automated Biometric Facial Recognition System is the best solution for your security needs by contacting us today. Our team will work closely with you to analyze your needs and develop a customized stand-alone or integrated solution.
Automated Biometric Fingerprint/Palm print identification (ID) systems take advantage of the uniqueness and permanence of human finger and palm prints in using them as a security pass code. As a form of personal ID, these prints are a proven and trusted technique that is also legally accepted. These sophisticated systems use digital imaging technology hardware and intelligent software that use matching algorithms to ensure greater accuracy in terms of lower false accept rates (FAR) and false reject rates (FRR).
Palm surfaces are larger than finger surfaces and hence have a greater number of distinctive features. This makes a biometric palm print ID system a better option when enhanced security is required even if they are bulkier and more expensive than a fingerprint system.
Such systems have the potential for a wide variety of applications in defense/ law-enforcement, industrial, and civilian situations.
GE-Ctrls provides highly accurate automated biometric fingerprint/palm print recognition systems that are sourced from reputed manufacturers. We can either implement this system as a functionally independent application or can seamlessly integrated it with your existing biometric or non-biometric security solutions.
Find out if an Automated Biometric Fingerprint/Palm print Recognition System is the best solution for your security needs by contacting us today. Our team will work closely with you to analyze your needs and develop a customized stand-alone or integrated solution.
RFID-based Access Control Systems(ACS) provide an quick, easy, and very cost-effective solution for limiting access to only authorized personnel. The system typically comprises of RFID-embedded identification (ID) cards, specialized entry/exit card readers, and software. The system verifies the information “read” from the card against a database of authorized personnel (called an access control list) and grant/deny access based on its authentication.
Features and Benefits:
Works on 120-125kHZ (low frequency), 13.56 MHz (high frequency), and 433 MHz (ultrahigh frequency)
Reading range of 10cm up to 100m
Supports 64-bit encryption
32-bit or 8-bit processor models
Single or multi-door systems
LED-based alert generation for successful/unsuccessful access events
Built-in battery backup for continued operation during power outages
Fast and accurate authentication (usually less a second)
Real-time access logs
GE-Ctrls can also integrate the RFID system with other security system such as your existing CCTV system, gate automation, ACS, etc. for an enhanced security solution.