Connected Technologies, LLC, Crystal Lake, Illinois, continues to respond to new industry and market trends through the Connect ONE cloud-hosted service, including the exciting capability to add voice-initiated system control through home and mobile platform systems such as Siri and Google Assistant.

Voice recognition control

"With our new voice recognition control, monitoring of third party devices, that have email capabilities, integration with IFTTT (If This Then That) including geo-location, dealers have the ability to offer cutting-edge integration solutions and bundling a wide range of services that will provide new recurring monthly revenue (RMR) streams," explains Michael Simon, Managing Partner at Connected Technologies.

Maybe your customer would like devices automatically activated when they reach their destination

Millennial customers are helping drive the integration of Internet of Things (loT) connectivity and want the latest solutions. With voice commands and providing a personal identification number (PIN) end-user customers can activate devices to lock or unlock access doors, arm and disarm security systems along with other Connect ONE features as well as connecting to just about any device with email capabilities.

Automatic activation

The possibilities for added convenience are endless. Maybe your customer would like devices automatically activated when they reach their destination. Or, perhaps your customer’s service business wants to know when one of their vehicles reaches a destination. Geo-location notices and device activations are easily integrated into Connect ONE to provide this functionality. Through one single interface, Connect ONE, customers can connect to equipment that before was not available in security integration offerings.

Now if a customer asks: ‘Can you consolidate all my systems into one interface?’, the answer could be yes.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...