Intruder Alarm Systems are primarily deployed for ‘space protection’ mainly against burglary. Space means the space that we occupy whether in terms of business premises or residential dwellings. In this context it is important to understand what distinguishes a burglary from a theft or a robbery. A burglary occurs when the offender illegally enters a building with the intention to commit a crime. While the entry may be a trespass, burglary implies intention to commit a crime such as theft, robbery or unlawful damage to property.
Why therefore do people and businesses deploy Intruder Alarm Systems? Simply, it is because there is credible risk of burglary where there are vulnerabilities that can be exploited in the commission of a crime and because basic prevention is not enough.
The main concern for customers who need and rely on Intruder Alarm Systems and Alarm Response Services is that there is a real chance of system failure that could defeat the purpose of the system in the first place.
Substandard security systems lie on the doorstep of security companies and installers as the parties that offer outsourced security services, but the innovation journey is not theirs alone. The market needs to evaluate new technologies and ideas and begin to aggressively push for higher standards. One way is by leveraging the expertise of competent consultants who work more holistically and are measured by solving problems as opposed to merely making sales. They offer unbiased assessments from a more dynamic disposition with recommendations that align to the needs of individuals, businesses and organisations. Expert consultants ensure that customers invest appropriately to secure their people and their property.
Intruder Alarm Systems will fail if the following key elements are not observed:
- Power Backup is designed to ensure the alarm system can sustain for a reasonable period in the event of a mains failure.
- Cabling is critical as the right quality and distances guarantee that all the devices that are connected will function as intended
- Zoning allows both the user and the security company to identify the source of an alarm event. Grouping of devices into zones is therefore not advisable. Instead zone expanders should be used for larger systems.
- Tamper protection simply means that the security system must be secure itself. The control panel box should have a tamper switch to prevent malicious tamper. Additionally, all devices and cabling should be protected using end-of-line resistors.
- Partitioning is necessary where the same alarm system is to be used in two separate areas so. Partitions allow for the creation of separate areas that can be operated independently in order to enhance the utility of the system and therefore overall security.
- Alarm Transmission is relevant where the customer has signed up to a security company for 24-hour alarm monitoring and response services. In line with No. 3 above it is a must that the transmitter installed by the security company is able to transmit all the zones as configured and not a single zone for a group of devices