Browse Intruder Alarms: Communicators & Communication Systems

Intruder alarm communicators - Expert commentary

The growing popularity of personal safety apps
The growing popularity of personal safety apps

The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults.   And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.

Sensor data fusion for more reliable intrusion alarm systems
Sensor data fusion for more reliable intrusion alarm systems

Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source.  This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag.   Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.

Back to school: Best practices for a holistic approach to security
Back to school: Best practices for a holistic approach to security

In the past decade, we’ve seen an unfortunate increase in gun-related incidents on school campuses, making security and policy efforts a top priority for educational facilities nationwide. While the causes for this increase are hotly debated in and around the education community, the facts remain that specific steps can be taken to mitigate risks. To tackle this issue, officials from campus stakeholders, law enforcement officials, architects, and security personnel, have met to find solutions for protecting educational facilities. Further complicating matters, educational campuses are again tasked with mitigating health risks associated with COVID-19, as we head into the third pandemic school year. Video communication tools To safely reopen, new technologies and policies in many K-12 and higher education institutions have been released, with many searching for a way to leverage existing security infrastructure. Achieving both health safety and physical security requires an integrated approach—from all-around best practices, to video communication tools and enhanced security infrastructure. The simple intercom has been a security staple in the education market for many years A holistic approach is best to ensure the safety of students, staff, and visitors. The simple intercom has been a security staple in the education market for many years, but now in a pandemic-centric world, these devices provide a new set of required capabilities. Intercoms, once thought to be a basic security tool, can now be combined with video, offering users the ability to solve multiple pain points associated with COVID-19. Controlled access points In this article, we’ll discuss some best practices for educational decision-makers, as well as how video intercoms can enhance overall security architecture. A school’s first opportunity to mitigate threats lies in its ability to deter threats entering in the first place. This begins with ensuring policies, procedures, and equipment are all up to standard. Most campus shootings and other violent acts occur once the individual has made it through the front door of a building; putting the emphasis on controlled access points at key entries to add an extra barrier of safety between threats and students. While written policies help staff understand how visitors are approved for entry, they should also be informed of more simple items, such as why doors can’t be left propped open, when to lockdown, or how to evacuate during an emergency. Physical security solutions The security industry has also created effective physical security solutions for protecting a campus Another best practice would be training staff to spot signs of distressed and potentially violent students, while providing ways to get help for them. When it comes to campus security, there is no one-size-fits-all approach, which is why security integrators should also be included in planning processes to tailor a custom solution for each campus to address its unique security needs. While best practices, including mental health screenings, stricter discipline codes, and faster law enforcement responses are all crucial to campus safety, the security industry has also created effective physical security solutions for protecting a campus—which includes enhanced two-way video and audio/visual communication solutions such as a video intercom. For years educational facilities have utilised intercoms to manage access, but now, it’s more important than ever to ensure the safety of students and staff by thoroughly vetting all those who enter a building. Providing visual verification Long gone are the days of asking visitors to check in manually using a sign-in book, or simply walking into a school. Best practices now require the presence of a visitor management system (VMS), which is a more accurate and seamless way to manage access. Using a VMS, a campus could add its own custom watch list, which when properly implemented, can provide protection from abuse orders, custodial issues, and offer names and pictures of disgruntled former employees and students. Using a VMS, a campus could add its own custom watch list, which when properly implemented As security technology has become more sophisticated, so have intercom capabilities—extending far beyond what they used to be. Going further than a simple button and speaker system, when used in conjunction with an IP video system, intercoms provide visual verification that the person requesting access into a school building does indeed belong there. Contact tracing solutions Whether it’s a student, parent, or staff member, verifying a person’s identity and ensuring that the individual has proper credentials is key. Pairing an intercom with a camera allows for this important, real-time visual and audio communication between the front office and those requesting access. Additionally, intercoms can be used as contact tracing solutions by leveraging an audit trail in case of an outbreak. For example, if a number of students at a college or university all use a mobile app to gain access to a dormitory through an intercom system, in the event that someone tests positive for COVID-19, they are able to contact all students, staff, or visitors who frequent that building. IP video intercoms can assist in pandemic related and security use cases by limiting unnecessary human-to-human interaction and replacing that with remote management capabilities. Remote monitoring station Remote monitoring allows for eyes on a facility while personnel are not physically present There is increased flexibility when working from a mobile app, or remote monitoring station, especially for security directors or officers on educational campuses. For example, if a campus is not able to staff a lobby of a building or a dormitory, they can remotely manage access from a mobile device. This enables security personnel to access video feeds and directly communicate with students or staff requesting access into a building. Remote monitoring allows for eyes on a facility while personnel are not physically present, thus increasing overall security. It can also give the appearance of the building being occupied at all times, even when it’s not. Another way an educational facility can leverage their video intercom system is to shift to mobile applications that offer a touchless way to gain access. Mobile application credential A mobile application removes the need for a physical key card and eliminates the potential of loss or theft of that access credential. It also allows for easy updating to credential status. For example, if a student, staff member or visitor is added to an ‘access denied’ list, security personnel can simply revoke a mobile application credential, versus having to track down a physical key and run the risk of copies or other issues. The importance of visual confirmation cannot be stressed enough when it comes to educational campuses The importance of visual confirmation cannot be stressed enough when it comes to educational campuses. Not only for security purposes to visually confirm identity, or screen for suspicious behaviours or other anomalies, simply having the ability to have a conversation with someone requesting access is vital. Better audio feedback There’s been a shift in recent years, in some cases spurred by the pandemic, to focus on how existing technologies can meet the unique needs of students, staff and visitors. For example, intercoms allow for two-way video which is crucial for an individual who is deaf, or hearing impaired, who needs to communicate using sign language. Additionally, intercoms can be integrated with t-coil features, to allow for better audio feedback for those with hearing aids. The past few years have taught us that while best practices, attention to the mental wellbeing of students, enhanced security at main entry points, and exits are all important focuses, educational security needs to be holistic and comprehensive. From physical security risks, to potential pandemic-related outbreaks, to the regular day-to-day communication needs of all individuals, decision-makers recognise intercom systems easily address each unique need.

Latest Pyronix Limited news

Pyronix announces the release of their wireless SPEAKER/SOUNDER-WE indoor siren
Pyronix announces the release of their wireless SPEAKER/SOUNDER-WE indoor siren

Pyronix is pleased to announce the release of its indoor siren with combined courtesy light, the mains-powered wireless SPEAKER/SOUNDER-WE. Replicating the tones of the control panel, the SPEAKER/SOUNDER-WE audibly alerts users to system activity, while the bright courtesy light on the front illuminates and flashes in conjunction with alarm events or mains fail. “We’re delighted to release the SPEAKER/SOUNDER-WE, our latest added-value option for the Enforcer V11 and other Pyronix hybrid systems using the EURO-ZEM32-WE. The product provides clear audible and visual indications of system activity across the property to keep the user completely aware of any changes,” Laurence Kenny, Pyronix Marketing Director, said. Providing visual indication Following the recent release of the Enforcer V11, the SPEAKER/SOUNDER-WE perfectly complements the system by replicating the chime, entry/exit, alarm, fire and even PA tones across the property to grab the user’s attention and keep them informed. The SPEAKER/SOUNDER-WE perfectly complements the system by replicating the chime Meanwhile, the in-built bright courtesy light provides a visual indication of system activity; strobing in the event of alarm activation, slow flashing for a chime and illuminating constantly as the user enters/exits the property or as a safety light in the event of a fire. This functionality can be particularly useful for hard-of-hearing users; keeping them up to date with any activity. The bright courtesy light will also illuminate constantly for up to 30 minutes in the event of a mains power fail. Audible and visual indication The SPEAKER/SOUNDER-WE is also compatible with the latest EURO-ZEM32-WE release with hub version 4.03.052. “We’re very pleased to add the SPEAKER/SOUNDER-WE to the range and we feel this really adds value to any installation,” Laurence said. He continued: “Quickly and easily set up and configured by the installer, things like volumes and the bright courtesy light can also be adjusted by the user, should their preferences change at a later date; they can enter the setup mode on the unit to adjust the volume by five increments, as well as activate or deactivate the light.” Learned in the new ‘Arming Station/Speaker’ slots, up to four SPEAKER/SOUNDER-WE’s can be added to the system for audible and visual indication of system activity. Only compatible with the Enforcer V11 or EURO-ZEM32-WE v4.03.052 onwards, the SPEAKER/SOUNDER-WE provides an easy upsell to keep users aware, grab their attention and light the way.

Pyronix announces two Enforcer tablet kits to provide installers with convenient accessibility
Pyronix announces two Enforcer tablet kits to provide installers with convenient accessibility

Pyronix is pleased to announce the release of two Enforcer tablet kits; providing the easiest and most convenient way of purchasing the Enforcer V11 control panel with the brand-new 10-inch touchscreen control station, the AndroidTablet and HomeControlHUB app. Enforcer Tablet Kit 1 (Partcode: ENF-TAB/KIT1-UK) contains: 1 x Enforcer V11 all-in-one two-way wireless control panel with Wi-Fi built onboard the main PCB 1 x AndroidTablet (compatible with HomeControlHUB app) 2x KX10DP-WE - wireless KX pet immune PIR detector 10m range 1x MC1MINI-WE - two-way wireless mini magnetic contact 1x DELTA/MOD-WE - wireless Deltabell module Enforcer Tablet Kit 2 (Partcode: ENF-TAB/KIT2-UK) contains: 1 x Enforcer V11 all-in-one two-way wireless control panel with Wi-Fi built onboard the main PCB 1 x AndroidTablet (compatible with HomeControlHUB app) 2x KX10DP-WE - wireless KX pet immune PIR detector 10m range 1x MC1MINI-WE - two-way wireless mini magnetic contact Providing enhanced installation The Enforcer V11 is the most advanced Pyronix system released to date and delivers real added value “We’re very excited to release these two kits to the market, as they provide installers with convenient accessibility to the tablet interface and all the many benefits the system provides,” Pyronix Marketing Director, Laurence Kenny, said. The Enforcer V11 is the most advanced Pyronix system released to date and delivers real added value with every installation; security, automation and video that can be tailored, controlled and scheduled for any user preference. Featuring Wi-Fi communications built onboard the main PCB, the Enforcer V11 provides enhanced installation, selectable supervision per zone, occupancy timers on zones and much more, along with compatibility with the AndroidTablet, HomeControlHUB app and SmartPlug. Free support services The AndroidTablet with HomeControlHUB not only becomes the new local programming option for the installer for the initial install and maintenance visits, but also the touchscreen security hub where the user can control their system, their Pyronix or Hikvision cameras and also the new SmartPlug to control plug-in appliances around the home. The interface also doubles as a conventional tablet for the user to use day-to-day to surf the internet The interface also doubles as a conventional tablet for the user to use day-to-day to surf the internet, watch videos and play games, or open the HomeControlHUB app to access their security, automation and video. Installers can find out all about this brand-new solution and all advantages it provides to both them and their customers, along with the extensive free support services Pyronix offers by registering to attend an Enforcer on the tour date, where they can also claim a free £20 All4One voucher. Changing user requirements “With the security market constantly having to adapt and evolve to changing user requirements, the innovations of the Enforcer V11 in combination with the AndroidTablet and HomeControlHUB interface make this the most flexible and proactive solution we’ve ever released,” Laurence said. He continued: “The tablet kits enable our installers to easily offer a complete one-platform solution that protects not only the property but also its occupants, the perimeter, vans, caravans, elderly relatives and more, while also providing access to automation around the home and camera streams for video surveillance and direct action.”

Pyronix launches ZEM8/E+P-BOX, versatile 8-zone expansion
Pyronix launches ZEM8/E+P-BOX, versatile 8-zone expansion

Pyronix announces the release of its ZEM8/E+P-BOX; a sleek and modern RS485 expander that adds 8 zones to any expandable Pyronix wired or hybrid system. Suitable for either residential or commercial settings, the ZEM8/E+P-BOX is a neat solution for refined, adaptable, and convenient zone expansion. Pyronix Marketing Director, Laurence Kenny, said, “We’re pleased to introduce the ZEM8/E+P-BOX to the market; bringing a sleek and modern design to panel zone expansion with optimised installation.” Flexible installation The ZEM8/E+P-BOX expands the control panel by 8 zones to add flexibility to any installation. The PCB features a reset button to allow jumper header address changes while the system is powered on. This is useful for changing the address of an expander, whilst the system is powered on. Simply address the expander, and then press the reset button. The installation has also been optimised on the ZEM8/E+P-BOX, with keyhole and slotted mounting holes featured on the back for easier levelling, while 4 cable tie anchorage points allow for easier cable management and a neater finish. Tamper protection P-BOX is advantageous in new house builds or restorations, where the cables can be routed into a back box The P-BOX also has front and rear tamper protection. The standard back box mounting is also advantageous in new house builds or restorations, where the cables can be routed into a back box and protected while the room is plastered. Fixing these cables before plastering provides a neater installation and protection to cabling during the first fix stage. Laurence added, “We always strive to make our customers' lives easier and installations smooth. The ZEM8/E+P-BOX do just that – delivering a tidy installation that ticks all the boxes.” The ZEM8/E+P-BOX also features additional 12V terminals; allowing installers to distribute the AUX power cables and prevent overcrowding of the terminals. An all-rounded zone expander, providing additional zones with a modern finish.

Related white papers

Preparing your organisation with quality situational awareness