RISCO Group ACM Module is an advanced communication module for the ProSYS Integrated Security System
Technical Specification
- Make: RISCO Group
- Model code: ACM Module
- Digital Communicators: Yes
- Transmission Media: TCP / IP transmission
The ACM is RISCO Group's Advanced Communication Module for the ProSYS Integrated Security System. The ACM reports alarms and events via the TCP/IP network, thus dramatically reducing the monthly payment to the telephone company. ACM is a key aspect today when integrating the ProSYS into an integrated control and management software system, such as the SynopSYS Integrated Security and Building Management System by supporting UPnP™ communications protocol. The ACM supports automatic e-mail reports to designated e-mail accounts as well as enabling upload/download operation via the TCP/IP network. All data of ACM is encrypted in SSL format, using 256 AES encryption key.
Read more| Make | RISCO Group |
|---|---|
| Manufacturer | RISCO Group |
| Category | Intruder Alarms>Intruder alarm communicators |
| Model code | ACM Module |
| Digital Communicators | Yes |
| Transmission Media | TCP / IP transmission |
| Additional info |
The ACM is RISCO Group's Advanced Communication Module for the ProSYS Integrated Security System. The ACM reports alarms and events via the TCP/IP network, thus dramatically reducing the monthly payment to the telephone company. ACM is a key aspect today when integrating the ProSYS into an integrated control and management software system, such as the SynopSYS Integrated Security and Building Management System by supporting UPnP™ communications protocol. The ACM supports automatic e-mail reports to designated e-mail accounts as well as enabling upload/download operation via the TCP/IP network. All data of ACM is encrypted in SSL format, using 256 AES encryption key. |
More RISCO Group Intruder alarm communicators
Related Whitepapers
Preparing your organisation with quality situational awareness
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
