LINQ2 is capable of monitoring two eFlow Series Power/Supply Chargers

LINQ2 provides remote control and real-time monitoring and reporting of Altronix’s new eFlow Power

Altronix is introducing its LINQ2 Network Communication Module here at ASIS 2014. LINQ2 provides remote control and real-time monitoring and reporting of Altronix’s new eFlow™ Power Supply/Chargers.

“As the security industry continues to migrate towards enterprise level integration, it is increasingly important to deliver products that can be monitored and controlled via the network in real time,” said Alan Forman, President, Altronix. “With their ability to remotely detect and pinpoint potential or existing power supply problems, LINQ2 reduces costly service calls.”

LINQ2 monitors DC output voltage, output current draw, AC and battery status, along with unit temperature. Diagnostics are reported by email and/or SNMP trap messages, and an event log tracks activity history. In addition, the eFlow™ power outputs and two LINQ2 Form “C” relays may be remotely controlled. LINQ2 is capable of monitoring two eFlow Series Power/Supply Chargers.

As with all Altronix products, the LINQ2 Network Communication Module is made in the U.S.A. and backed by a lifetime warranty.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...