Security Management

48 posts

For all physical and electronic security services including (but not exclusive of) CCTV Surveillance (Design, installation and Maintenance), Intruder Alarm (Installation & Maintenance), Access Control (installation & Configuration).


HERE ARE SOME KNOWLEDGE TO BE EQUIPPED WITH:    How Much Does It Cost To Install a professional Security Cameras system (For an average home).   1. National Average: $1,441 (based on 8-channel system 150 K).   2. Typical Range: $737 – $2,148 [ KES 75K – 220,000] (4 camera system & 16 Camera system)   3. Low End: $179 [ KES 18K] (A single self-supported camera system   4. High End: $3,500 [ KES 350K] (16 Camera IP-based Cameras with a resolution of up to 4 MP)   The size and type will depend on many factors: Namely: – The […]

Installing A CCTV System? What you need to consider

We have come to a stage in life where personal safety and security for our property is threatened by so many factors. Fortunately, there are a number security devices that we can deploy to mitigate the situation. In fact the gadgets are so many and come with different capabilities and qualities. This is were the average person gets mixed up when making a choice on what to go for. To complicate the matter,  we have a number of installers of these devices who have little knowledge about them but are quick to make quick bucks. Such installers would easily sell you […]

Where is the Tipping Point for IP Video?

Where is the tipping point for IP Video? Like enterprise telephony, the security industry is converging. Convergence has already impacted how products are built (analog cameras to digital cameras), what companies provide products (Axxon software, Axis cameras, Cisco video servers), sales channels (Data Communication distributors Anixter, Graybar) and the buying process. IT & SECURITY Many organizations have given their IT department full responsibility for the security system. IP-enabled card readers, cameras, network attached storage systems and standard databases resemble most other IT systems. Security becomes another application on top of the existing IT infrastructure. HOW IS THIS CHANGE BEING EFFECTED? ANY […]