Vous êtes sur la page 1sur 107

CHAPTER 1

INTRODUCTION TO SECURITY INDUSTRY


Security is the condition of being protected against danger or loss. In the
general sense, security is a concept similar to safety.
The nuance between the two is an added emphasis on being protected from
dangers that originate from outside. Individuals or actions that encroach upon the
condition of protection are responsible for the breach of security.
The word "security" in general usage is synonymous with "safety," but as a
technical term "security" means that something not only is secure but that it has been
secured. In telecommunications, the term security has the following meanings:
[1]
condition that results from the establishment and maintenance of protective
measures that ensure a state of inviolability from hostile acts or influences.
!ith respect to classified matter, the condition that prevents unauthori"ed
persons from having access to official information that is safeguarded in the interests
of national security.
#easures ta$en by a military unit, an activity or installation to protect itself
against all acts designed to, or which may, impair its effectiveness.
%ecurity has to be compared and contrasted with other related concepts:
%afety, continuity, reliability. The $ey difference between security and reliability is
that security must ta$e into account the actions of active malicious agents attempting
to cause destruction.
CONCEPT OF SECURITY
&ertain concepts recur throughout different fields of security.
Risk -
a ris$ is a possible event which could cause a loss
Threat -
a threat is a method of triggering a ris$ event that is dangerous
Vulera!ility -
a wea$ness in a target that can potentially be e'ploited by a
threat
E"#l$it -
a vulnerability that has been triggered by a threat ( a ris$ of
1.) *1))+,
C$uter%easure -
a countermeasure is a way to stop a threat from triggering a
ris$ event
De&ese i 'e#th -
never rely on one single security measure alone
Assurace -
assurance is the level of guarantee that a security system
will behave as e'pected
I(PORTANCE OF HO(E SECURITY SYSTE(
The home security system is a tas$ of protection that is given to the homes of
the citi"ens. The home security system and the tactics of safety give a safe and secure
shelter to the people, where they can retreat from the outside world and ta$e deep
breath of rela'ation.
-ome security is a proven deterrent to the intruders, but the alarm dealer from
the cost of thousand dollars can fit any home security system. #any home security
companies of the world are providing the high .uality home security system to the
people.
The ma/or aim of home security %ystem &ompanies is to provide total safety
to the home with the help of alarms, lights and other different ways. 0very home
security system company provides many services of security, li$e control panels,
$eypads, siren, doors, window contacts, etc.
SECURITY E)UIP(ENTS
%ecurity is a $ey factor that is of utmost concern to corporate individuals as
well as households and cannot be compromised upon.
#anufacturing the security e.uipments such as access control systems alarm
panels auto dialer1s $eeping in mind the factors that ensure acute security to your
property and privacy is the lubricating business now(a(days.
Security is one business that constantly needs to rediscover and $eep
pace with tech$l$*y+ 2ewer technology means more effective and powerful
s$luti$s+ !hich in turn translates to peace of mind.
CHAPTER ,
INTRODUCTION TO CO(PANY
PE-ASUS - ONE OF THE .EADER
3egasus is one of the leading professional manufacture speciali"ed in
researching and developing in field of signal processing and auto identification
products in Taiwan, especially focus on the personal access control systems and time
attendance systems.
lso 3egasus provides and develops a complete series of magnetic stripe card
readers either standalone *computer off(line, or networ$ing *computer on(line, with
the associated multi(channels controllers, electric stri$e 4 electromagnetic
loc$s....etc. to be applied in simple access control, central controlled building
automation system, time recorder, T# foyer access ...etc. lso, 3egasus supplies
the controller are functional e'pandable to be interfaced with more high technology
identification devices such as 3ro'imity, !iegand reader 4 56 card reader which
can identify the card for up to 7(8 meters for vehicle access control.
3egasus consistently strives to do the best in the development and sales of
high .uality, high technology and reliable products for customers. 9olumes :0# or
technical challenged :;# are heartily welcomed.

3egasus was founded to address the growing demand for security, access
control and other identification needs in the government, defense, healthcare,
corporations, and other verticals. 3egasus provides our clients with the solutions
necessary to protect the interest of security and access control for the company and
ensure efficiency of employees.
3egasus, with a wor$force of <= employees carries over 1= man years of
54;, technical and management e'pertise in offering and implementing hi(tech
scientific solutions. 3egasus has over >) products. 3egasus &lients include 9i/aya
?an$, ;hanala$shmi ?an$, ?an$ of ?aroda, #T2@, Intel, ;a$sh e services *a 7))
crore division of I?#,, !ipro, ??, 0pson, Intel *unit II,, Toyota Airlos$ar,
%iemens and so on.
3egasus has been fully able to utili"e the technical and management e'pertise
from 3ongee Industries &o., @td as an e'clusive distributorship agreement been
signed between the two companies to promote, distribute and service the entire range
of pro'imity, smart card based solutions in the Indian mar$et.
3egasus is dedicated to providing customer specific .uality biometric, smart
card and 56I; solutions to enable a secure, easy and reliable way for businesses and
individuals to protect their digital information.
3egasus has implemented security and identification solutions using multiple
fingerprint units wor$ing in a @ocal and !ide area networ$s. It has also implemented
fingerprint data transfer applications from branch offices to head office. #ulti(level
authentication solutions also have been implemented using combination technologies.
OUR STRATE-IC TIE-UPS
n e'clusive ;istributor agreement was signed in Taipei, Taiwan on
#onday, the <8
th
of pril <))B, by #r Curuprasad 2A and #r %amuel @in,
managing directors of their respective companies to provide seamless integration of
the entire range of 3ongeeDs 3roducts, and also for providing support to all 3egasus
&ustomerDs in India.
3ongee Industries is a company of very high repute in Taiwan 5:&, having
implemented a whole lot of solutions for the Taiwan ;efense organi"ations. -aving
formed in 1E>7, they have gone from success to success. They were the second
company in the world to launch 56 I; products. 3ongee products have been made
available in India from 1EE1 onwards. !ith over >) different product lines, and
more than 1) different products in each product line, no wonder, they are mar$et
leaders in most of the segments.
!ith over 1)) design engineers wor$ing round the cloc$ to bring in new
products, they have been able to launch a new product F variant almost every
fortnightG It would be appropriate to mention that, #r %amuel @in had developed
coin identification system for toll gate and successfully implemented way bac$ in
1E>7. Today 3ongee is wor$ing on medical electronics to provide hassle free blood
sugar test for diabetes patients without ta$ing a blood sample. This product is
e'pected to be launched within the ne't si' months time. 2eedless to say, it would
be a boon for all diabetic patients and diabetic specialty hospitals F doctors who can
have the blood sugar chec$ed every day, in a painless way.
3ongeeDs products have found acceptance in more than 1)) countries world
wide, helping them churn out a turnover of more than a billion dollars.
3ongee was accredited with I%: E))1 in the year <))1 and all their products
have been &0 certified.
PROFESSOR TECHNO.O-Y CO+/ .TD/ TAI0AN
-eaded by #r Hac$ @iang. #anaging ;irector with a team of more than =)
dedicated engineers, they have been able to successfully design and create wireless
data transfer technology, ?luetooth, and also build customi"ed wireless data transfer
solutions on a very high end platform.
They are mar$et leaders in development of wireless communication
e.uipments wor$ing on <.B C-". They are :0#s for large multinationals li$e
&isco, @ucent @abs for providing wireless @ocal rea 2etwor$ interface cards.
#Fs 3rofessor are also in consumer durables mar$et, in providing wireless F
cordless headphones which provides ;olby ;igital =.1 &hannel surround %ound,
headsets, using their in(house developed technology of wireless data transfer.
#Fs 3rofessor has tied up with 3egasus to distribute their range of products in
India and also to offer support and service.
#Fs 3rofessor is also wor$ing with 3egasus to provide wireless data transfer
solution for access control and time attendance solutions. This is e'pected to be
launched in India by mid of %eptember this year.
SCIENTECH E.ECTRONICS CO+/ .TD/ TAI0AN
#Fs %cientech was formed in 1EIE to with an e'clusive aim of providing
home security products. Today, they have a wide range of home security products,
both wired and wireless type, to cater to the entire needs of the home security mar$et.
It is worthwhile to note that %cientech products are e'ported to Hapan, *which
is considered as the best country for electronic products, and also to Israel.
%cientech has partnered with 3egasus to provide its entire range of wireless
home security products and the entire range of home automation products to Indian
customers.
Tal$s are underway with most of the prominent builders in India, to
implement @ife%:% products in apartment comple'es. Trial runs have already
ensured that @ife %:% has found acceptance with ma/or builders in India.
1IO2EY SYSTE( CO+/ .TD/ 2OREA
?io$ey %ystem is a leading authority on 6inger print verification algorithm
and also one of the worldDs leading manufacturers of finger print readers, finger print
sensors. ?io$ey was one of the primary companies to launch Touch %ensor and uto
sensor based finger print readers. Today, ?io$ey ta$es the lead in the fastest finger
print matching algorithm, with EE.EE+ accuracy, along with providing audio and
visual indications in the hardware.
?io$ey has partnered with 3egasus to distribute their ?A%B8)) range of
6inger print readers in India along with its ?A%<8)) *finger print registration
terminal, with direct J%? connectivity, and an award winning ?io$ey software,
wor$ing on a three tier architecture.
It would be worthwhile to note that leading Covernment organi"ations of
India, namely :rdinance factories, 3assport offices, 6ood &orporation of India
among others have decided on ?io$ey products after thorough testing and trials.
lot of private sector organi"ations li$e Hapan irlines, #edreich %terilab,
#ani$chand &orporate office, JTI ?an$, 9i/aya ?an$, ;hana$shmi ?an$, among
others have also opted for ?io$ey finger print readers in the last couple of years.
-UAN-3HOU 4IAHE E.ECTRONICS CO+/ .TD/
CHINA
Hiahe 0lectronics is one of the worldDs leading :0# manufacturers for 9ideo
;oor 3hones *table top, wall mountable, color, bFw, multiple output systems,, udio
;oor 3hones, partment %ecurity systems *audio and video, and also for public
address systems.
Hiahe 0lectronics have ventured into a tie up with 3egasus to distribute their
entire product range in India, through the channel partners of 3egasus with great
success. lot of ma/or builders in ?angalore, 2ew ;elhi have partnered with
3egasus for using our products in their up coming lu'ury flats F apartment comple'es.
INDIAN INSTITUTE OF SCIENCE 5IISC6/ 1AN-A.ORE
3egasus has tied up with #Fs Indian Institute of %cience *II%c, at their &entre
of 0lectronics ;esign and Testing *&0;T, facility to develop certain access control
products to meet the specific re.uirement of Indian companies. The pro/ect was
started way bac$ in <))< and is almost near completion.
-ead :ffice : 781,IIIrd 6loor,9IIIth #ain, ?hagyavantaru 5oad,
?asaveshwar 2agar, ?angalore =8))IE. India.
3h: KE1 >) <7<7 8))1.
6a': KE1 >) <7<7 8))<
5egional :ff : 6lat 2o.17, IInd 6loor, <)? 5adha pprts,
Arishna 2agar, %afdar/ung 0nclave, 2ew ;elhi (<E
3h: KE1 11 <818 1B77 F B7 6a': KE1 11 <818 1B==
!eb %ite : www.pegasuse.uipments.com
PE-ASUS (ISSION
3egasus is committed to provide safety to customer by continuously
developing and delivering F offering new technologies, innovative products, solutions
and delightful services, by abiding all its commitments to customers.
!e will nurture our channel partners by providing profitable avenues of
growth and fulfill responsibilities towards shareholders by achieving consistent
growth in shareholderDs value and adhering to fair practices in all its dealings with
employees and business partners.
VISION AND VA.UES OF PE-ASUS


OUR CORE VA.UES
%tay tuned to the &ustomer at all times
Aeep raising the bar on 3erformance
!or$ with Transparency, Integrity and ccountability
PE-ASUS CO(PETITORS
3ICO(
Licom has been a change(leader since inception, creating a niche for itself and
bringing to the mar$et superior products and services that best address security
demands. :ver the years, Licom has played an integral part to allay fears of lac$ of
security by ushering in state(of(the(art electronic surveillance systems for small,
medium and large establishments and government pro/ectsM and by offering
impeccable service regardless of the nature of the industry.
Today, they are the largest electronic security systems provider in the
country, with offices in over 7) cities and towns, employing over B)) people. Jntil
the advent of Licom, electronic security systems were seen as complicated devices
that cost the earth. Today, simple and easy(to(use systems that fit any budget have
proliferated the mar$et place, owing to Licom.
:ur strategic tie(ups with global leaders ensure a steady stream of relevant
technology and $now(how, to cater to any demanding situation that may face us. :ur
continued commitment to e'cellence in our products is matched by our resolve to
create a world(class wor$ force, with only the best of the industry as our manpower.
%cientific training and wor$ environment at Licom prove conducive to better
productivity and customer service.
(ANA-E(ENT STRUCTURE OF 3ICO(

Manohar Bidaye
Chairman
Rathin Kumar Banerjee
CEO - Security Solutions Group
Pramoud Rao
Managing Director
Santonu Choudhury
CEO - Consumer Service Group
Mukul Desai
Director
Santosh Pillai
Chief Technology Officer
Vijay G. Kalantri
Director
He%e'ra Pali7al
&hief 6inancial :fficer
Achyut Godbole
Director
Reji homas
Head - Human Resources
Dr. B. Samal
Director
Sameer !a"#al
ice !resident
"#uilding Solution Group$
Satya Pal al$ar
Director
Shirish Desh#a'e
9ice 3resident N %ales :perations
*&onsumer %ervice Croup,
&-I090#02T :6 LI&:#
1889
Licom became India1s first 0lectronic %ecurity systems company to get listed on the
Indian ?ourses.
188:
The company installed the &ountry1s 6irst &entral #onitoring %tation
188;
!e became the first to indigenously manufacture ccess &ontroller and 6ire larm
3anel with inherent %oftware &apabilities.
188<
!e were the first in the country to introduce !ireless %ecurity %ystems
1888
Licom e'panded the <B'I :nline lerts 2etwor$ to other cities.
,===
The company forged a tie(up with #otorola and %chlumberger for %mart card
?usiness


,==,
The company received the &omputer ssociates, J% %mart &ertification for
intelligent ;oor &ontroller. lso, became the first to manufacture ?iometric based
ccess &ontrol %ystem integrated with %mart &ards
,==>
Licom was the first in 0lectronic %ecurity Industry in India to start a Toll 6ree
2umber, 1 8)) << B=8I.
,==?
Licom has become the first 0lectronic %ecurity %ystems &ompany to launch a
%ervice %cheme, "L(%ecurity"
,==9
Too$ the first step in the overseas mar$et by setting up /oint venture in J0 to cater
to gulf mar$et.
,==:
Licom was the 1st in India to introduce 5etail 0lectronic %ecurity %howrooms pan
India.
,==;
c.uisition of J2I%60 6ire 3rotection %pecialists @@&, ;ubai
HISTORY OF 3ICO(
Licom 0lectronic %ecurity %ystems is the leading 0lectronic %ecurity
%olutions provider in India. The company offers a wide range of products including
access control systems, &&T9 surveillance, fire alarm systems, smart cards,
biometrics, remote video surveillance, perimeter protection system, law enforcement
products, etc. The company has also integrated all this multiple security applications
into one coordinated hardware and software pac$age. The company has got strong
software capabilities relating to the security business.
%ince its inception in 1EE=, Licom has always driven the mar$et with
innovations. Licom pioneered the concept of &entral #onitoring %tation in India. The
company was the first to introduce wireless security systems.
Licom services the diverse and demanding security needs of private and
public sectors. Its customers include several large Indian and multinational
companies in the field of infotech, telecom, media, ban$ing, finance, industrial, etc.
as well as various public sector units.
CHANA2YA E.ECTRONICS
CO(PANY PROFI.E
0stablished in the year 1E>I,
&hana$ya 0lectronics is a leading
organi"ation engaged in the manufacturing,
supply and e'port of sophisticated digital
and analog electronic e.uipment. :ne of
the $ey reasons for our success has been our
high level of awareness regarding the .uic$
changes that are prevalent in the industry.
!e try our best to $eep abreast with all the
latest technological changes so that our
products are the best, e'tremely innovative
and simple to use.
:ver the years we have created credibility for ourselves and our goodwill is
spread in the mar$et and thus we have been able to strengthen our position in the
mar$et. !e try to give our customers the best .uality goods and services at the most
competitive prices. 6or the past two decades we have been able to grow , by
providing our customers with 9alue (for ( money products. :ur aim is to $eep up to
our customer1s e'pectations by continuing with our e'cellent wor$manship and
sincere service and to reach new heights of success.
SECURITY E)UIP(ENT
!e have developed a complete range of security systems and e.uipment for
use in business and commercial offices as well as residential properties. Jsing proven
sophisticated technology, we have manufactured all our security products in a way so
as to ensure flawless performance and long service life.
-ODRE4 SECURITY E)UIP(ENTS
Codre/ is a part and parcel of every IndianDs life. 6rom loc$s to personal care.
6rom appliances to air care. 6rom furniture to construction. There are innumerable
ways we enrich .uality of life ( everyday, everywhere.
They offers an entire spectrum of industrial solutions from storage to material
handling to process e.uipment and many, many more. !hether clients are loo$ing
for standard e.uipment or custom engineering solutions, the first name is Codre/.
CHAPTER >
CO(PARISON OF SECURITY E)UIP(ENT OF VARIOUS
CO(PANY
SO(E OF THE PRODUCTS OF PE-ASUS
PRODUCT NA(E @ .IFE SOS .S >=
FIN-ER E)UIP(ENTS
T1= FACE -UARD
FEATURES T1= FACE -UARD
(O1I.E PHONE 4A((ERS (ODE. NA(E@TH-1=11
PICTURE@ TH-1=11
(ii%u% $r'er Auatity@1))3&%
SPECIFICATION
Out#ut
FreAuecy
ABera*e Out#ut P$7er
Chael Out#ut P$7er
CD(A
>I)(>>)#-"
7=d?m *7!,
1)d?mF1))A-" *min,
C%#
E7)(E8)#-"
7=d?m *7!,
=d?mF1))A-" *min,
;&%
1>)=(1>=)#-"
77d?m *<w,
<d?mF1))A-" *min,
3-%
or &;#1E))
1E))(1E1=#-"
or 1EI=(1E>)#-"
77d?m *<w,
<d?mF1))A-" *min,
P$7er@ 1)w
P$7er S$urce@ &<<)9 =)-" or ;&=9
Shiel'i* Ra'ius@ *<)(8),mOI=d?m (eas@ <1)P=)P1I)mm
0HATCS NE0

(i&are Rea' D 0rite Access E Pre#ai' Value Car' Syste% 5PP->;:=D(,-(FO6

The 33(7I8)F#< #ifare card read F write system which integrate the supreme
features of secured read F write data to #ifare card and the powerful functions
possessed by the 33(7I8) access 4 time recorder, so that the system can program the
personal data to the individual I; card, and load the system parameters to each access
recorder, then thru the very thoughtful algorism, the system can be configured to
support the on(line F off(line applications in either time attendance, or perfect access
controller and the prepaid value systems or their combinations.
Sta'al$e D Net7$rki* (ulti-'$$rs Access C$tr$ller 5PC-1=>;6
Serve as a centralized station and event buffers to management
the access of subordinate 16 pieces 707 series access readers
(PG-707, PP-707, P!"-#77 etc$ %et&or'ing 707 readers s(stem
to controller the access b( data access map ()*, P)%, time
zone$ for real time mode %et&or' communication through +S-
,#,-.+S-/,, interface b( P-P-0#,-11 multi-channel controller

%M & 'M R()D *on" Ran"e Pro+imity Card Reader , P(-.
/012.%02&'023
!eather resistant and water proof, ?uilt(in ?eeper sound B77.E#-" type
reading 56I; hand free card
Interface 5%B>=, 5%<7<&, !iegand
5eading range: #a'. 8 meters*36-(E<1)(8<), or #a'. 7 meters*36-(E<1)(
7<),
;imensions:<I)*@,'<I)*!,'7E*-, mm
%2cm R()D *on" Ran"e Pro+imity Card Reader , P(-./012.
%2 3
!eather resistant and water proof, ?uilt(in ?eeper sound
1<=A-" type reading passive contactless card or $eyfobs re.uire no batteries
Interface 5%B>=, 5%<7<&, !iegand
5eading range: #a'. 8)cm
;imensions:<I)*@,'<I)*!,'7E*-, mm
)ntelli"ent 4n.line&455.line Pro+imity Access Controller , PP.
%672 3
@&; display. !ater proof
Intelligent functions.
&ost down.
2peration modes-+3 onl(, +3 4 'e(pad, +3 . 'e(pad, free
access onl(
5eading range from = to 1= cm
;imensions:17I*@,'>=*!,'<E*-, mm
Sim#le Smart 4n.line&455.line Pro+imity Access Controller
, PP.%6'2 3
@0; display. !ater proof E,EEE cards holders
:peration modes(56 only, 56 K $eypad, 56 F $eypad, free access only
5eading range from = to 1= cm
;imensions:17I*@,'>=*!,'<E*-, mm
Mini Pro+imity Card Reader , PP.112 3
&ompact si"e, !eather resistant
Interface 5%B>=, 5%<7<&, !iegand
3assive contactless card or $eyfobs re.uire no batteries
5eading range := to 1= cm
<8 bit standard !iegand output
;imensions:EB*@,'B7*!,'1=*-, mm
CP&)P Con8erter , PC.122 3
uto(detecting 1)F1)) #bps 0thernet
?uilt(in 0thernet and support, T&3FI3, J;3, 53, I&#3 protocol
&ould connect e'ternal device with 5%(<7<& serial interface to 0thernet
@ower cost with effective performance
DI-ITA. 2EYPAD
P--1=12 Di*ital key#a' 5 3ic all$y case 7ith %etal key#a' 6
S#eci&icati$s@
3asscode 3rogrammable from B to > digits
#onitor inputs
;oor contact, 0'it push button, &ase tamper
3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation
:peration temperature (1)Q& R =)Q&
-umidity <)+RE)+ 5-, 2on condensation
;imensions 1<)*@,' 1))*!,' 7<*;,mm
!eight EB)gS=+
Features@
Linc alloy sturdy body with case loc$
!ith tamper switch and one loop sensor input to trigger alarm when case is
tampered or loop is intruded.
2on(volatile memory for 1)(1)) years data retention without any battery
bac$up.
;& 1<9 operated therefore battery operation is possible when & power is
interrupted.
Intelligent programmable functions through $eypad by @0;1s and audible
beep1s indication.
I *optional EE groups, independent codes from B to > digits, up to EE,EEE,EEE
combinations.
3rogrammable door release time, alarm time from 1 to EE period through
$eypad.
P--1=>2 Di*ital key#a' 5 A1S case 7ith %e%!rae key#a'/ 7ater#r$$& 6
S#eci&icati$s@
3asscode
3rogrammable from B to > digits
#onitor inputs
;oor contact, 0'it push button, &ase tamper
3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation
:peration temperature (1)Q& R =)Q&
-umidity <)+RE)+ 5-, 2on condensation
;imensions 1<)*@,' >7*!,' 7)*;,mm
!eight 71)gS=+
Features@
?% case with membrane $eypad for waterproof application
!ith tamper switch and one loop sensor input to trigger alarm when case is
tampered or loop is intruded.
2on(volatile memory for 1)(1)) years data retention without any battery
bac$up.
;& 1<9 operated therefore battery operation is possible when & power is
interrupted.
Intelligent programmable functions through $eypad by @0;1s and audible
beep1s indication.
I independent codes from B to > digits, up to EE,EEE,EEE combinations.
3rogrammable door release time, alarm time from 1 to EE period through
$eypad.
P--1=?2 Di*ital key#a' 5 3ic all$y case 7ith %etal key#a' 6
S#eci&icati$s@
3asscode
3rogrammable from B to > digits
#onitor inputs
;oor contact, 0'it push button, &ase tamper
3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation
:peration temperature (1)Q& R =)Q&
-umidity <)+RE)+ 5-, 2on condensation
;imensions 1B)*@,' 8)*!,' 7=*;,mm
!eight 8=)gS=+
Features@
Linc alloy sturdy body with case loc$
!ith tamper switch and one loop sensor input to trigger alarm when case is
tampered or loop is intruded.
2on(volatile memory for 1)(1)) years data retention without any battery
bac$up.
;& 1<9 operated therefore battery operation is possible when & power is
interrupted.
Intelligent programmable functions through $eypad by @0;1s and audible
beep1s indication.
I independent codes from B to > digits, up to EE,EEE,EEE combinations.
3rogrammable door release time, alarm time from 1 to EE period through
$eypad.
P--1=92 Di*ital key#a' 5 A1S case 7ith #lastic key#a' 6
S#eci&icati$s@
3asscode
3rogrammable from B to > digits
#onitor inputs
;oor contact, 0'it push button, &ase tamper
3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation
:peration temperature (1)Q& R =)Q&
-umidity <)+RE)+ 5-, 2on condensation
;imensions 118*@,' I7*!,' 17*;,mm
!eight <=)gS=+
Features@
?% case with plastic $eypad, compact and low profile
!ith tamper switch and one loop sensor input to trigger alarm when case is
tampered or loop is intruded.
2on(volatile memory for 1)(1)) years data retention without any battery
bac$up.
;& 1<9 operated therefore battery operation is possible when & power is
interrupted.
Intelligent programmable functions through $eypad by @0;1s and audible
beep1s indication.
I independent codes from B to > digits, up to EE,EEE,EEE combinations.
3rogrammable door release time, alarm time from 1 to EE period through
$eypad.
P--1=:2 Di*ital key#a' 5 A1S case 7ith #lastic key#a'/ 7ater#r$$& 6
S#eci&icati$s@
3asscode
3rogrammable from B to > digits
#onitor inputs
;oor contact, 0'it push button, &ase tamper
3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation
:peration temperature (1)Q& R =)Q&
-umidity <)+RE)+ 5-, 2on condensation
;imensions 17I*@,' >=*!,' <E*;,mm
!eight 7<)gS=+
Features@
?% case with plastic $eypad. !aterproof.
!ith tamper switch and one loop sensor input to trigger alarm when case is
tampered or loop is intruded.
2on(volatile memory for 1)(1)) years data retention without any battery
bac$up.
;& 1<9 operated therefore battery operation is possible when & power is
interrupted.
Intelligent programmable functions through $eypad by @0;1s and audible
beep1s indication.
I independent codes from B to > digits, up to EE,EEE,EEE combinations.
3rogrammable door release time, alarm time from 1 to EE period through
E)UIP(ENTS OF CHANA2YA E.ECTRONICS
CCTV SURVEI..ANCE SYSTE( D RE(OTE SURVEI..ANCE
:ur range of &&T9 surveillance systems provide very high reliability and
include security cameras and the monitoring screens. !ith built in software, these
systems are designed to wor$ throughout the day, <BTI. These state(of(the(art
surveillance systems are available at competitive prices. Jsing internet you can view
your showroom, warehouse, factory from any where in the world.
SECURITY CA(ERAS D IP CA(ERAS
%ecurity cameras and I3 &ameras in various shapes and si"es are available
with us to monitor the activities at any particular place or location. :ur range of
security cameras wor$ very efficiently and are pretty easy to install as well.

A.AR(S
!e manufacture, e'port and supply professional security alarm systems. !e
have a wide assortment of alarm control panels, $eypads, and sensors, motion
detectors to suit every need.
DOOR PHONES AND 1U-S
!e offer a large variety of udio ?ugs, udio ;oor 3hones F 9ideo ;oor
3hones and 0lectric @oc$s, to suit every need.
-UARD (ONITORIN- SYSTE(S
:ur guard monitoring systems ensure that your Cuard is not sleeping while
on his /ob. They are dual powered, wor$ing on <<) 9 & #ains, as well as low
voltage re(chargeable battery.
DVR CARDS
;95 cards provide complete digital video recording solutions to a
surveillance system. ;95 card surveillance systems integrate with color .uad
processors, motion sensors, switchers etc. and come with advanced features, li$e
#30C(B -ardware &ompression, high(speed processing, audio recording etc.
TI(E ATTENDANCE RECORDERS
-ighly sophisticated, contemporary attendance systems are designed to offer
years of trouble free service. :ur time attendance recorders wor$ flawlessly and are
provided with 56I; card reader, which digitally record attendance entries.
-ODRE4 E)UIP(ENTS
ACCESS CONTRO. SYSTE(S
FIN-ERSCAN 0ITH PROFI(ITY READERS 5FS(ART6
FEATURES
&ombines many functions into a single model and footprint
=)) finger print templates with e'tended memory version upto BI))
templates.
3I2K6ingerprint, 6ingerprint(only, and Aeypad(only in a single unit,
definable by user
%uperior optical sensor and read algorithm
%oftware and hardware tools for aiding in enrollment and template
management
<),))) to 7),))) event storage capacity
5%(B>= networ$ing between readers for template sharing
USA-E
:ffices
54; 0stablishments
%oftware &os
3harma 4 ?iotech
-otels
-ospitals
&orporates
ACCESS CONTRO. SYSTE(S -ODRE4 PROFI(ITY
SYSTE(
Features
!orldwide leader in pro'imity systems
!ide product range to meet customer re.uirements
6ield programme
5ead ranges from = to <> inches
!eather resistant and highly durable
1<=$-" contactless reader
;esigned for simple field installation
daptable levels of security
USA-E
?an$s, 3rivate %afe ;eposit 9aults, 6inancial Institutions, :ffices, Sh$#s, 6actories,
!arehouses, Re&ieries a' Allie' I'ustries/ (ultist$rey 1uil'i*s/ Resi'etial
C$l$ies/ H$tels a' H$s#ital+
E)UIP(ENT OF -ODRE4
E.ECTRONIC SAFES FA.CON 1UR-.AR A.AR(
SYSTE(
FEATURES
Two "one dedicated burglar alarm panel.
0ase of operations
rm and ;isarm mode
5ange of detectors and sensors such as #agnetic door sensor, #otion sensor,
9ibration sensor, Class brea$ sensor, 3anic switch.
-ooter optput capable of driving multiple hooters up to total of =))m load
In built utomatic Telephone ;ialer with following features (
o Ten programmable phone numbers each upto 1= digits.
o <) seconds recordable message.
o :ption of programming from remote location.
o 9erification by playbac$ of recorded message during programming.
o 3rogrammable password, message repeat count, redial setting.
3rovision of parallel telephone instrument.
o Ten years retention of telephone numbers and messages, in case of no
power. -ighest priority for alarm condition dialing. In case of alarm
detection, parallel instrument is disconnected and dialler ta$es over
instantaneously.
o 6acility of remote s$ipping of a particular telephone number for ne't
redials after being called by T;.
o Jser programmable password protected facility of remote rming F
;isarming of alarm systems Fresetting of alarms.
!ide input range of operation from 1=) 9 & to <I) 9 &.
utomatic switch over to battery in case of & 3ower failure.
?attery bac$up of 78 hrs for standard configuration.
utomatic battery charging once the & 3ower is restored.
@ow ?attery indication.
udio(visual alarm indications

Techical S#eci&icati$s
2o of Lones ( < *;elayed 4 <B hours,.
-ousing ;imensions ( <<= mm *-, ' <I< mm *!, ' >= mm *;,.
3rimary 3ower ( 1=)9 to <I)9, =)-".
%econdary 3ower ( 1<9 F I - battery.
&urrent &onsumption ( 1))m.
@oop 5esponse ( appro'. =))ms.
-ooter output ( ma'imum load of =)) m.
3hone numbers storage capacity ( 1) numbers each of 1= digit long.
#essage length ( <) seconds.
%hipping !eight ( 8 Ag.
E.ECTRONIC SAFES DRA-ON FIRE A.AR(
The Codre/ ;ragon 6ire larm %ystem is programmed to provide high levels of
security. ?e it to secure your family and yourself or to protect valuable assets in your
home, office or establishment from the threat of fire.
Cenerally confirms to I% <1>E.
%trong 6ire red colored, 1.8mm thic$ cabinet.
Jser friendly operations.
&ompitable with all types of conventional detectors.
?attery bac$up with in built charging.
utomatic switch over to ?attery in case of & mains failure.
%ignal %ilence to ac$nowledge 6ireF6ault condition.
ctive fire "ones in case of isolating of other "ones.
I'icati$s
%eparate twin @0; indication for fire for each "one.
Lonewise 6ault *:pen F short circuit, indications.
6ireF6ault status in unambiguaous colored indication.
& 6ail F @ow ?attery warning.
&harger :2 F&harger 6ail indication.
6use blown indication for & and ;& fuses.
0rth fault indications.
-ooter &ut ;etection with audio visual warning.
Out#uts
Individual hooter outputs for each "one and a common hooter output.
Two numbers 6:5# & 5elay output for actuators li$e elevator control, -J
shut(off, 6ire e'tinguishing system.
%electable ctivation of 5elays either at larm condition or at Trouble
condition.
3rovision for 5epeater 3anel for 5emote annunciation.
O Pael Testi* Facilities
:ne man wal$ test facility.
@amp Test 6acility
;rill switch to activate alarm sounders manually.
0ase of #aintenance with u'iliary isolate feature.
Lone isolation facility.
Techical S#eci&icati$s
2o of Lones ( 7(> "ones
-ousing ;imensions ( 7>8 mm *-, ' 71E mm *!, ' EB mm *;, *7 "one,.
3rimary 3ower ( 1=)9 to <I)9, =)-".
%econdary 3ower ( <B9 ;& ( *1<9 F I - battery ( )<nos,
&urrent &onsumption ( 1))m.
@oop 5esponse ( appro'. =))ms.
-ooter output ( "one wise K common output
Lone Input ( < wire loop with B$I end on line resistor
u'iliary output ( )< 2os. 2: F 2&
u'iliary contact ratings ( 7 O <7)9 a&
CHAPTER ?
RESEARCH (ETHODO.O-Y
0HAT DOES RESEARCH (EANS
5esearch is a common parlance refers to search for $nowledge. It is an art of
scientific investigation. It is a careful investigation or, in.uiry especially through
research for new facts in any branch of $nowledge. In fact it is a systemati"ed effort
to gain new $nowledge.
RESEARCH O14ECTIVES
5esearch methodology is a way to solve the research problem systematically. It may
be understood as a science of studying how research is done scientifically. !e study
various steps that are generally adopted by a researcher in studying to $now not only
the research method but also methodology. 5esearcher not only to $now how to
develop certain indices or, tests, how to calculate mean, the mode, the median, the
standard deviation or chi(s.uire, how to apply a particular research techni.ue, but
also methodology is relevant. 5esearcher needs to $now the assumptions underlying
various techni.ue or, procedure, will be applicable to certain problem 4 other will
not. ll this means that it is necessary for the researcher to design his methodology
for his problem as same way differ from problem to problem.
%o we can say research methodology has may dimensions 4 research methods do
constitute a part of the research methodologyU
TYPES@ (
1. DESCRIPTIVE RESEARCH: (
It includes surveys 4 facts findings, en.uiries of different $inds. The ma/or purpose
of descriptive research is description of the state of affairs as it e'ists at present.. The
ma/or characteristic of this method is that researcher has no control over the
variables. -e can only report what has happened 4 what is happening.
<. ANA.YTICA. RESEARCH@ -
The researcher has to use facts or, information already available 4 analyse this to
ma$e a critical evaluation of the material.
7 EFP.ORATARY RESEARCH : (
It is the development of hypothesis rather then there testing. 6ormali"ed research
studies are those with substantial structure 4 with specific hypothesis to be tested.
B EFPERI(ENTA. RESEACH@ -
The main characteristic of it is that here researcher has greater control over
environment 4 variables are manipulated to observe their effect on other variables.
5esearcher establishes one e'planation or reason for a particular observation they
ta$e the help.
5esearch methodology is a way to solve the research problem systematically. It may
be understood as a science of studying how research is done scientifically. !e study
various steps that are generally adopted by a researcher in studying to $now not only
the research method but also methodology. 5esearcher not only to $now how to
develop certain indices or, tests, how to calculate mean, the mode, the median, the
standard deviation or chi(s.uire, how to apply a particular research techni.ue, but
also methodology is relevant. 5esearcher needs to $now the assumptions underlying
various techni.ue or, procedure, will be applicable to certain problem 4 other will
not. ll this means that it is necessary for the researcher to design his methodology
for his problem as same way differ from problem to problem.
%o we can say research methodology has may dimensions 4 research methods do
constitute a part of the research methodologyU
PURPOSE OF STUDY
?asically the main ob/ective of study was to determine the success rate of various
products of 3egasus.
To determine the demand of security e.uipments in various channels.
To determine the performance of e.uipment.
To obtain the respondent view will found to be helpful in improving the scope
of growth.
CHAPTER 9
DATA INTERPRETATION
?asically during my pro/ect all the data were collected online while communicating
with respondent through internet.
%ome of details of data collected are as follows :
DID YOU USE ANY SECURITY E)UIP(ENTS
STATUS
NO+ OF RESPONDENTS
Ves >=
2o. 1=
TOTA. 1==
%es
&'(
)o*
+'(
%es
)o*
0HICH E)UIP(ENTS ARE 1EIN- USED 1Y YOU
THE (OST
(ODE. NA(E
NO+ OF RESPONDENTS
8I=)i =E
6ace Cuard =
T1) 6inger print <E
#obile Hammer I
FRO( 0HERE YOU -ET 2NO0.ED-E OF PE-ASUS E)IP(ENTS+
Product Sale Percentage
,-'.i
'/(
0ace Guard
'(
T+. 0inger
print
1/(
Mo2ile
3ammer
-(
,-'.i 0ace Guard T+. 0inger print Mo2ile 3ammer
HO0 DO YOU -ET INFOR(ATION A1OUT THE
PRODUCT
S$urce
NO+ OF RESPONDENTS
2ewspaper 11
Internet =1
&ompany1s 5esponse <1
:thers 1I
++
'+
1+
+-
.
1.
4.
,.
&.
+..
)e5spaper 6nternet Company7s
Response
Others
Source
P
e
r
c
e
n
t
a
g
e
Series+
0HICH E)UIP(ENT YOU THIN2 IS THE 1EST 0ITH
RE-ARD TO SECURITY
(ODE. NA(E
NO+ OF RESPONDENTS
8I=)i <I
6ace Cuard =E
T1) 6inger print 11
#obile Hammer 7
1-
'/
++
8
.
+.
1.
8.
4.
'.
,.
-.
,-'.i 0ace Guard T+. 0inger
print
Mo2ile
3ammer
P
e
r
c
e
n
t
a
g
e
Series+
CHAPTER :
FINDIN-
1. #a/ority respondent uses 8I=)i *ccess controller, as compare to other
products of the company.
<. #a'imum publicity and customer are achieved by the company by thought
internet as compare to other source.
7. bout =I+ of product sold are 8I=)i due to its cheaper sale.
B. Technically as well as practically 6ace Cuard is found to be the best security
e.uipments in terms of security.
CHAPTER ;
.I(ITATION
1. &ompany products cost is very high which ma$e it difficult for the Indian
user to purchase.
<. &ompany also needs to provide better after sale services.
7. &ompany needs to improves its networ$ all over the company.
CHAPTER <
CONC.USION
1. %ale of 8I=)i *ccess controller, is higher as compare to other products.
<. &ompanies achieves its ma'imum customer through Internet.
7. bout =I+ of product sold are 8I=)i due to its cheaper sale.
B. Technically as well as practically 6ace Cuard is found to be the best security
e.uipments in terms of security.
=. &ompany needs to improve its distribution and after sale service networ$ in
India.
CHAPTER 8
RECO((ENDATION
1. &ompany needs to give more emphasis on T9 advertisement.
<. &ompany also needs to lower down their mar$et rates due to tough
competition in the mar$et.
7. &ompany officials also needs to employee .uality sales e'ecutive which can
present their products in a better way to customers.
B. &ompany also needs to impart regular training and seminar sessions to its
employees.
APPENDIF
1+ 1I1.IO-RAPHY
,+ COPIES OF )UESTIONNAIRES
>+ DETAI.S OF SA(P.ES
1I1.IO-RAPHY
1. &&&5google5com
<. www."icom.com
7. www.pegasus.com
B. www.chana$aya.com
=. 5esearch #ethodology
by A.&.Aothari
8. #ar$eting #anagement
by 3hilip Aotlar

Vous aimerez peut-être aussi