proteng@protenggroup.eu

CCTV surveillance

To ensure the security of the object and the possibility of immediate inspection of the object, the CCTV system is an irreplaceable choice when choosing the protection of objects.


The CCTV monitoring system can provide an overview of what is happening in the object 24 hours a day. It is an invaluable helper both for ensuring the safety of the object and for its actual operation. With the help of a camera system, it is possible to prevent crisis situations, and if a crisis situation already occurs, it is recorded in detail for further investigation. Today, it is no longer a problem to connect a camera system with transmission. Authorized persons have the opportunity to find out the current status in the object from anywhere where there is an Internet connection. By combining security systems ESS, CCTV, transmission technologies and security for PCO operators, consistent and effective technical security of the object is possible. To ensure the security of the object and the possibility of immediate inspection of the object, the CCTV system is an irreplaceable choice when choosing the protection of objects.


Security of houses, apartments, cottages, companies, garages, shops, banks

The basis of every electronic security system (ESS) is a control panel to which individual security, information or control elements are connected. The device is assembled as an autonomous element with its own power supply in case of power failure. This feature is important to keep the device running at all times. The ESS system contains sensing detectors, which are located in the monitored area. The basic detectors for security are motion detectors, mechanical detectors for windows, doors, detectors for fire detection. The ESS system can be extended by detectors ensuring the operation of the space - temperature detectors, gas detectors, flood detectors and detectors ensuring the safety of persons - emergency medical buttons, emergency buttons in case of intrusion. It is also possible to assign control and monitoring elements to the ESS system, which ensure the convenience of the ESS system use itself.


It allows you to control technologies such as heating, air conditioning, irrigation, ventilation, camera systems. These technologies can be controlled not only directly from the object, but also from more distant places. For example, it is not a problem to ensure that the heating is switched on/off or to just "look" through the camera system what is currently happening in the object. Another possibility of using the ESS system is an overview and records of what is happening in the monitored area, but also about what has happened in it. The advantage is the possibility of finding out the condition of the object, for example when you return from vacation. For example, it is possible to find out if a neighbour really watered the flowers, when he walked in your object and for how long. Today, the ESS system can offer you an overview of electricity consumption, heat, water consumption and can even inform you that the limit you have entered has been exceeded. At present, there is a wide range of ESS systems on the market, the quality, functionality and price of which range from one hundred to several thousand euros. Therefore, it is advisable to consult experts just like when buying a computer or car.


Outdoor protection

Perimeter protection is used to secure and protect land, fences, walls, spaces and objects. It is commonly used to protect industrial sites, photovoltaic and other power plants, or special purpose facilities such as military bases or airports. However, it can also be used to secure sports grounds, courtyards/gardens of family houses and private objects.


Attendance system

They are intended for users with a need for greater security, which requires great flexibility, such as banks, industrial companies, universities, private houses, public buildings, stores. Every day you encounter a variety of visits at the entrance and exit of office buildings, employees, visitors, suppliers, traders ... Management of such a system requires a flexible approach in which we can define individually or as a group of users for security zones, sensitive areas such as data rooms or archives.

COPYRIGHT 2020 | PROTENG