Security is the condition of being protected against danger or loss. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security. The word "security" in general usage is synonymous with "safety," but as a technical term "security" means that something not only is secure but that it has been secured. In telecommunications, the term security has the following meanings: [1] condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences. !ith respect to classified matter, the condition that prevents unauthori"ed persons from having access to official information that is safeguarded in the interests of national security. #easures ta$en by a military unit, an activity or installation to protect itself against all acts designed to, or which may, impair its effectiveness. %ecurity has to be compared and contrasted with other related concepts: %afety, continuity, reliability. The $ey difference between security and reliability is that security must ta$e into account the actions of active malicious agents attempting to cause destruction. CONCEPT OF SECURITY &ertain concepts recur throughout different fields of security. Risk - a ris$ is a possible event which could cause a loss Threat - a threat is a method of triggering a ris$ event that is dangerous Vulera!ility - a wea$ness in a target that can potentially be e'ploited by a threat E"#l$it - a vulnerability that has been triggered by a threat ( a ris$ of 1.) *1))+, C$uter%easure - a countermeasure is a way to stop a threat from triggering a ris$ event De&ese i 'e#th - never rely on one single security measure alone Assurace - assurance is the level of guarantee that a security system will behave as e'pected I(PORTANCE OF HO(E SECURITY SYSTE( The home security system is a tas$ of protection that is given to the homes of the citi"ens. The home security system and the tactics of safety give a safe and secure shelter to the people, where they can retreat from the outside world and ta$e deep breath of rela'ation. -ome security is a proven deterrent to the intruders, but the alarm dealer from the cost of thousand dollars can fit any home security system. #any home security companies of the world are providing the high .uality home security system to the people. The ma/or aim of home security %ystem &ompanies is to provide total safety to the home with the help of alarms, lights and other different ways. 0very home security system company provides many services of security, li$e control panels, $eypads, siren, doors, window contacts, etc. SECURITY E)UIP(ENTS %ecurity is a $ey factor that is of utmost concern to corporate individuals as well as households and cannot be compromised upon. #anufacturing the security e.uipments such as access control systems alarm panels auto dialer1s $eeping in mind the factors that ensure acute security to your property and privacy is the lubricating business now(a(days. Security is one business that constantly needs to rediscover and $eep pace with tech$l$*y+ 2ewer technology means more effective and powerful s$luti$s+ !hich in turn translates to peace of mind. CHAPTER , INTRODUCTION TO CO(PANY PE-ASUS - ONE OF THE .EADER 3egasus is one of the leading professional manufacture speciali"ed in researching and developing in field of signal processing and auto identification products in Taiwan, especially focus on the personal access control systems and time attendance systems. lso 3egasus provides and develops a complete series of magnetic stripe card readers either standalone *computer off(line, or networ$ing *computer on(line, with the associated multi(channels controllers, electric stri$e 4 electromagnetic loc$s....etc. to be applied in simple access control, central controlled building automation system, time recorder, T# foyer access ...etc. lso, 3egasus supplies the controller are functional e'pandable to be interfaced with more high technology identification devices such as 3ro'imity, !iegand reader 4 56 card reader which can identify the card for up to 7(8 meters for vehicle access control. 3egasus consistently strives to do the best in the development and sales of high .uality, high technology and reliable products for customers. 9olumes :0# or technical challenged :;# are heartily welcomed.
3egasus was founded to address the growing demand for security, access control and other identification needs in the government, defense, healthcare, corporations, and other verticals. 3egasus provides our clients with the solutions necessary to protect the interest of security and access control for the company and ensure efficiency of employees. 3egasus, with a wor$force of <= employees carries over 1= man years of 54;, technical and management e'pertise in offering and implementing hi(tech scientific solutions. 3egasus has over >) products. 3egasus &lients include 9i/aya ?an$, ;hanala$shmi ?an$, ?an$ of ?aroda, #T2@, Intel, ;a$sh e services *a 7)) crore division of I?#,, !ipro, ??, 0pson, Intel *unit II,, Toyota Airlos$ar, %iemens and so on. 3egasus has been fully able to utili"e the technical and management e'pertise from 3ongee Industries &o., @td as an e'clusive distributorship agreement been signed between the two companies to promote, distribute and service the entire range of pro'imity, smart card based solutions in the Indian mar$et. 3egasus is dedicated to providing customer specific .uality biometric, smart card and 56I; solutions to enable a secure, easy and reliable way for businesses and individuals to protect their digital information. 3egasus has implemented security and identification solutions using multiple fingerprint units wor$ing in a @ocal and !ide area networ$s. It has also implemented fingerprint data transfer applications from branch offices to head office. #ulti(level authentication solutions also have been implemented using combination technologies. OUR STRATE-IC TIE-UPS n e'clusive ;istributor agreement was signed in Taipei, Taiwan on #onday, the <8 th of pril <))B, by #r Curuprasad 2A and #r %amuel @in, managing directors of their respective companies to provide seamless integration of the entire range of 3ongeeDs 3roducts, and also for providing support to all 3egasus &ustomerDs in India. 3ongee Industries is a company of very high repute in Taiwan 5:&, having implemented a whole lot of solutions for the Taiwan ;efense organi"ations. -aving formed in 1E>7, they have gone from success to success. They were the second company in the world to launch 56 I; products. 3ongee products have been made available in India from 1EE1 onwards. !ith over >) different product lines, and more than 1) different products in each product line, no wonder, they are mar$et leaders in most of the segments. !ith over 1)) design engineers wor$ing round the cloc$ to bring in new products, they have been able to launch a new product F variant almost every fortnightG It would be appropriate to mention that, #r %amuel @in had developed coin identification system for toll gate and successfully implemented way bac$ in 1E>7. Today 3ongee is wor$ing on medical electronics to provide hassle free blood sugar test for diabetes patients without ta$ing a blood sample. This product is e'pected to be launched within the ne't si' months time. 2eedless to say, it would be a boon for all diabetic patients and diabetic specialty hospitals F doctors who can have the blood sugar chec$ed every day, in a painless way. 3ongeeDs products have found acceptance in more than 1)) countries world wide, helping them churn out a turnover of more than a billion dollars. 3ongee was accredited with I%: E))1 in the year <))1 and all their products have been &0 certified. PROFESSOR TECHNO.O-Y CO+/ .TD/ TAI0AN -eaded by #r Hac$ @iang. #anaging ;irector with a team of more than =) dedicated engineers, they have been able to successfully design and create wireless data transfer technology, ?luetooth, and also build customi"ed wireless data transfer solutions on a very high end platform. They are mar$et leaders in development of wireless communication e.uipments wor$ing on <.B C-". They are :0#s for large multinationals li$e &isco, @ucent @abs for providing wireless @ocal rea 2etwor$ interface cards. #Fs 3rofessor are also in consumer durables mar$et, in providing wireless F cordless headphones which provides ;olby ;igital =.1 &hannel surround %ound, headsets, using their in(house developed technology of wireless data transfer. #Fs 3rofessor has tied up with 3egasus to distribute their range of products in India and also to offer support and service. #Fs 3rofessor is also wor$ing with 3egasus to provide wireless data transfer solution for access control and time attendance solutions. This is e'pected to be launched in India by mid of %eptember this year. SCIENTECH E.ECTRONICS CO+/ .TD/ TAI0AN #Fs %cientech was formed in 1EIE to with an e'clusive aim of providing home security products. Today, they have a wide range of home security products, both wired and wireless type, to cater to the entire needs of the home security mar$et. It is worthwhile to note that %cientech products are e'ported to Hapan, *which is considered as the best country for electronic products, and also to Israel. %cientech has partnered with 3egasus to provide its entire range of wireless home security products and the entire range of home automation products to Indian customers. Tal$s are underway with most of the prominent builders in India, to implement @ife%:% products in apartment comple'es. Trial runs have already ensured that @ife %:% has found acceptance with ma/or builders in India. 1IO2EY SYSTE( CO+/ .TD/ 2OREA ?io$ey %ystem is a leading authority on 6inger print verification algorithm and also one of the worldDs leading manufacturers of finger print readers, finger print sensors. ?io$ey was one of the primary companies to launch Touch %ensor and uto sensor based finger print readers. Today, ?io$ey ta$es the lead in the fastest finger print matching algorithm, with EE.EE+ accuracy, along with providing audio and visual indications in the hardware. ?io$ey has partnered with 3egasus to distribute their ?A%B8)) range of 6inger print readers in India along with its ?A%<8)) *finger print registration terminal, with direct J%? connectivity, and an award winning ?io$ey software, wor$ing on a three tier architecture. It would be worthwhile to note that leading Covernment organi"ations of India, namely :rdinance factories, 3assport offices, 6ood &orporation of India among others have decided on ?io$ey products after thorough testing and trials. lot of private sector organi"ations li$e Hapan irlines, #edreich %terilab, #ani$chand &orporate office, JTI ?an$, 9i/aya ?an$, ;hana$shmi ?an$, among others have also opted for ?io$ey finger print readers in the last couple of years. -UAN-3HOU 4IAHE E.ECTRONICS CO+/ .TD/ CHINA Hiahe 0lectronics is one of the worldDs leading :0# manufacturers for 9ideo ;oor 3hones *table top, wall mountable, color, bFw, multiple output systems,, udio ;oor 3hones, partment %ecurity systems *audio and video, and also for public address systems. Hiahe 0lectronics have ventured into a tie up with 3egasus to distribute their entire product range in India, through the channel partners of 3egasus with great success. lot of ma/or builders in ?angalore, 2ew ;elhi have partnered with 3egasus for using our products in their up coming lu'ury flats F apartment comple'es. INDIAN INSTITUTE OF SCIENCE 5IISC6/ 1AN-A.ORE 3egasus has tied up with #Fs Indian Institute of %cience *II%c, at their &entre of 0lectronics ;esign and Testing *&0;T, facility to develop certain access control products to meet the specific re.uirement of Indian companies. The pro/ect was started way bac$ in <))< and is almost near completion. -ead :ffice : 781,IIIrd 6loor,9IIIth #ain, ?hagyavantaru 5oad, ?asaveshwar 2agar, ?angalore =8))IE. India. 3h: KE1 >) <7<7 8))1. 6a': KE1 >) <7<7 8))< 5egional :ff : 6lat 2o.17, IInd 6loor, <)? 5adha pprts, Arishna 2agar, %afdar/ung 0nclave, 2ew ;elhi (<E 3h: KE1 11 <818 1B77 F B7 6a': KE1 11 <818 1B== !eb %ite : www.pegasuse.uipments.com PE-ASUS (ISSION 3egasus is committed to provide safety to customer by continuously developing and delivering F offering new technologies, innovative products, solutions and delightful services, by abiding all its commitments to customers. !e will nurture our channel partners by providing profitable avenues of growth and fulfill responsibilities towards shareholders by achieving consistent growth in shareholderDs value and adhering to fair practices in all its dealings with employees and business partners. VISION AND VA.UES OF PE-ASUS
OUR CORE VA.UES %tay tuned to the &ustomer at all times Aeep raising the bar on 3erformance !or$ with Transparency, Integrity and ccountability PE-ASUS CO(PETITORS 3ICO( Licom has been a change(leader since inception, creating a niche for itself and bringing to the mar$et superior products and services that best address security demands. :ver the years, Licom has played an integral part to allay fears of lac$ of security by ushering in state(of(the(art electronic surveillance systems for small, medium and large establishments and government pro/ectsM and by offering impeccable service regardless of the nature of the industry. Today, they are the largest electronic security systems provider in the country, with offices in over 7) cities and towns, employing over B)) people. Jntil the advent of Licom, electronic security systems were seen as complicated devices that cost the earth. Today, simple and easy(to(use systems that fit any budget have proliferated the mar$et place, owing to Licom. :ur strategic tie(ups with global leaders ensure a steady stream of relevant technology and $now(how, to cater to any demanding situation that may face us. :ur continued commitment to e'cellence in our products is matched by our resolve to create a world(class wor$ force, with only the best of the industry as our manpower. %cientific training and wor$ environment at Licom prove conducive to better productivity and customer service. (ANA-E(ENT STRUCTURE OF 3ICO(
Manohar Bidaye Chairman Rathin Kumar Banerjee CEO - Security Solutions Group Pramoud Rao Managing Director Santonu Choudhury CEO - Consumer Service Group Mukul Desai Director Santosh Pillai Chief Technology Officer Vijay G. Kalantri Director He%e'ra Pali7al &hief 6inancial :fficer Achyut Godbole Director Reji homas Head - Human Resources Dr. B. Samal Director Sameer !a"#al ice !resident "#uilding Solution Group$ Satya Pal al$ar Director Shirish Desh#a'e 9ice 3resident N %ales :perations *&onsumer %ervice Croup, &-I090#02T :6 LI&:# 1889 Licom became India1s first 0lectronic %ecurity systems company to get listed on the Indian ?ourses. 188: The company installed the &ountry1s 6irst &entral #onitoring %tation 188; !e became the first to indigenously manufacture ccess &ontroller and 6ire larm 3anel with inherent %oftware &apabilities. 188< !e were the first in the country to introduce !ireless %ecurity %ystems 1888 Licom e'panded the <B'I :nline lerts 2etwor$ to other cities. ,=== The company forged a tie(up with #otorola and %chlumberger for %mart card ?usiness
,==, The company received the &omputer ssociates, J% %mart &ertification for intelligent ;oor &ontroller. lso, became the first to manufacture ?iometric based ccess &ontrol %ystem integrated with %mart &ards ,==> Licom was the first in 0lectronic %ecurity Industry in India to start a Toll 6ree 2umber, 1 8)) << B=8I. ,==? Licom has become the first 0lectronic %ecurity %ystems &ompany to launch a %ervice %cheme, "L(%ecurity" ,==9 Too$ the first step in the overseas mar$et by setting up /oint venture in J0 to cater to gulf mar$et. ,==: Licom was the 1st in India to introduce 5etail 0lectronic %ecurity %howrooms pan India. ,==; c.uisition of J2I%60 6ire 3rotection %pecialists @@&, ;ubai HISTORY OF 3ICO( Licom 0lectronic %ecurity %ystems is the leading 0lectronic %ecurity %olutions provider in India. The company offers a wide range of products including access control systems, &&T9 surveillance, fire alarm systems, smart cards, biometrics, remote video surveillance, perimeter protection system, law enforcement products, etc. The company has also integrated all this multiple security applications into one coordinated hardware and software pac$age. The company has got strong software capabilities relating to the security business. %ince its inception in 1EE=, Licom has always driven the mar$et with innovations. Licom pioneered the concept of &entral #onitoring %tation in India. The company was the first to introduce wireless security systems. Licom services the diverse and demanding security needs of private and public sectors. Its customers include several large Indian and multinational companies in the field of infotech, telecom, media, ban$ing, finance, industrial, etc. as well as various public sector units. CHANA2YA E.ECTRONICS CO(PANY PROFI.E 0stablished in the year 1E>I, &hana$ya 0lectronics is a leading organi"ation engaged in the manufacturing, supply and e'port of sophisticated digital and analog electronic e.uipment. :ne of the $ey reasons for our success has been our high level of awareness regarding the .uic$ changes that are prevalent in the industry. !e try our best to $eep abreast with all the latest technological changes so that our products are the best, e'tremely innovative and simple to use. :ver the years we have created credibility for ourselves and our goodwill is spread in the mar$et and thus we have been able to strengthen our position in the mar$et. !e try to give our customers the best .uality goods and services at the most competitive prices. 6or the past two decades we have been able to grow , by providing our customers with 9alue (for ( money products. :ur aim is to $eep up to our customer1s e'pectations by continuing with our e'cellent wor$manship and sincere service and to reach new heights of success. SECURITY E)UIP(ENT !e have developed a complete range of security systems and e.uipment for use in business and commercial offices as well as residential properties. Jsing proven sophisticated technology, we have manufactured all our security products in a way so as to ensure flawless performance and long service life. -ODRE4 SECURITY E)UIP(ENTS Codre/ is a part and parcel of every IndianDs life. 6rom loc$s to personal care. 6rom appliances to air care. 6rom furniture to construction. There are innumerable ways we enrich .uality of life ( everyday, everywhere. They offers an entire spectrum of industrial solutions from storage to material handling to process e.uipment and many, many more. !hether clients are loo$ing for standard e.uipment or custom engineering solutions, the first name is Codre/. CHAPTER > CO(PARISON OF SECURITY E)UIP(ENT OF VARIOUS CO(PANY SO(E OF THE PRODUCTS OF PE-ASUS PRODUCT NA(E @ .IFE SOS .S >= FIN-ER E)UIP(ENTS T1= FACE -UARD FEATURES T1= FACE -UARD (O1I.E PHONE 4A((ERS (ODE. NA(E@TH-1=11 PICTURE@ TH-1=11 (ii%u% $r'er Auatity@1))3&% SPECIFICATION Out#ut FreAuecy ABera*e Out#ut P$7er Chael Out#ut P$7er CD(A >I)(>>)#-" 7=d?m *7!, 1)d?mF1))A-" *min, C%# E7)(E8)#-" 7=d?m *7!, =d?mF1))A-" *min, ;&% 1>)=(1>=)#-" 77d?m *<w, <d?mF1))A-" *min, 3-% or &;#1E)) 1E))(1E1=#-" or 1EI=(1E>)#-" 77d?m *<w, <d?mF1))A-" *min, P$7er@ 1)w P$7er S$urce@ &<<)9 =)-" or ;&=9 Shiel'i* Ra'ius@ *<)(8),mOI=d?m (eas@ <1)P=)P1I)mm 0HATCS NE0
(i&are Rea' D 0rite Access E Pre#ai' Value Car' Syste% 5PP->;:=D(,-(FO6
The 33(7I8)F#< #ifare card read F write system which integrate the supreme features of secured read F write data to #ifare card and the powerful functions possessed by the 33(7I8) access 4 time recorder, so that the system can program the personal data to the individual I; card, and load the system parameters to each access recorder, then thru the very thoughtful algorism, the system can be configured to support the on(line F off(line applications in either time attendance, or perfect access controller and the prepaid value systems or their combinations. Sta'al$e D Net7$rki* (ulti-'$$rs Access C$tr$ller 5PC-1=>;6 Serve as a centralized station and event buffers to management the access of subordinate 16 pieces 707 series access readers (PG-707, PP-707, P!"-#77 etc$ %et&or'ing 707 readers s(stem to controller the access b( data access map ()*, P)%, time zone$ for real time mode %et&or' communication through +S- ,#,-.+S-/,, interface b( P-P-0#,-11 multi-channel controller
%M & 'M R()D *on" Ran"e Pro+imity Card Reader , P(-. /012.%02&'023 !eather resistant and water proof, ?uilt(in ?eeper sound B77.E#-" type reading 56I; hand free card Interface 5%B>=, 5%<7<&, !iegand 5eading range: #a'. 8 meters*36-(E<1)(8<), or #a'. 7 meters*36-(E<1)( 7<), ;imensions:<I)*@,'<I)*!,'7E*-, mm %2cm R()D *on" Ran"e Pro+imity Card Reader , P(-./012. %2 3 !eather resistant and water proof, ?uilt(in ?eeper sound 1<=A-" type reading passive contactless card or $eyfobs re.uire no batteries Interface 5%B>=, 5%<7<&, !iegand 5eading range: #a'. 8)cm ;imensions:<I)*@,'<I)*!,'7E*-, mm )ntelli"ent 4n.line&455.line Pro+imity Access Controller , PP. %672 3 @&; display. !ater proof Intelligent functions. &ost down. 2peration modes-+3 onl(, +3 4 'e(pad, +3 . 'e(pad, free access onl( 5eading range from = to 1= cm ;imensions:17I*@,'>=*!,'<E*-, mm Sim#le Smart 4n.line&455.line Pro+imity Access Controller , PP.%6'2 3 @0; display. !ater proof E,EEE cards holders :peration modes(56 only, 56 K $eypad, 56 F $eypad, free access only 5eading range from = to 1= cm ;imensions:17I*@,'>=*!,'<E*-, mm Mini Pro+imity Card Reader , PP.112 3 &ompact si"e, !eather resistant Interface 5%B>=, 5%<7<&, !iegand 3assive contactless card or $eyfobs re.uire no batteries 5eading range := to 1= cm <8 bit standard !iegand output ;imensions:EB*@,'B7*!,'1=*-, mm CP&)P Con8erter , PC.122 3 uto(detecting 1)F1)) #bps 0thernet ?uilt(in 0thernet and support, T&3FI3, J;3, 53, I protocol &ould connect e'ternal device with 5%(<7<& serial interface to 0thernet @ower cost with effective performance DI-ITA. 2EYPAD P--1=12 Di*ital key#a' 5 3ic all$y case 7ith %etal key#a' 6 S#eci&icati$s@ 3asscode 3rogrammable from B to > digits #onitor inputs ;oor contact, 0'it push button, &ase tamper 3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation :peration temperature (1)Q& R =)Q& -umidity <)+RE)+ 5-, 2on condensation ;imensions 1<)*@,' 1))*!,' 7<*;,mm !eight EB)gS=+ Features@ Linc alloy sturdy body with case loc$ !ith tamper switch and one loop sensor input to trigger alarm when case is tampered or loop is intruded. 2on(volatile memory for 1)(1)) years data retention without any battery bac$up. ;& 1<9 operated therefore battery operation is possible when & power is interrupted. Intelligent programmable functions through $eypad by @0;1s and audible beep1s indication. I *optional EE groups, independent codes from B to > digits, up to EE,EEE,EEE combinations. 3rogrammable door release time, alarm time from 1 to EE period through $eypad. P--1=>2 Di*ital key#a' 5 A1S case 7ith %e%!rae key#a'/ 7ater#r$$& 6 S#eci&icati$s@ 3asscode 3rogrammable from B to > digits #onitor inputs ;oor contact, 0'it push button, &ase tamper 3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation :peration temperature (1)Q& R =)Q& -umidity <)+RE)+ 5-, 2on condensation ;imensions 1<)*@,' >7*!,' 7)*;,mm !eight 71)gS=+ Features@ ?% case with membrane $eypad for waterproof application !ith tamper switch and one loop sensor input to trigger alarm when case is tampered or loop is intruded. 2on(volatile memory for 1)(1)) years data retention without any battery bac$up. ;& 1<9 operated therefore battery operation is possible when & power is interrupted. Intelligent programmable functions through $eypad by @0;1s and audible beep1s indication. I independent codes from B to > digits, up to EE,EEE,EEE combinations. 3rogrammable door release time, alarm time from 1 to EE period through $eypad. P--1=?2 Di*ital key#a' 5 3ic all$y case 7ith %etal key#a' 6 S#eci&icati$s@ 3asscode 3rogrammable from B to > digits #onitor inputs ;oor contact, 0'it push button, &ase tamper 3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation :peration temperature (1)Q& R =)Q& -umidity <)+RE)+ 5-, 2on condensation ;imensions 1B)*@,' 8)*!,' 7=*;,mm !eight 8=)gS=+ Features@ Linc alloy sturdy body with case loc$ !ith tamper switch and one loop sensor input to trigger alarm when case is tampered or loop is intruded. 2on(volatile memory for 1)(1)) years data retention without any battery bac$up. ;& 1<9 operated therefore battery operation is possible when & power is interrupted. Intelligent programmable functions through $eypad by @0;1s and audible beep1s indication. I independent codes from B to > digits, up to EE,EEE,EEE combinations. 3rogrammable door release time, alarm time from 1 to EE period through $eypad. P--1=92 Di*ital key#a' 5 A1S case 7ith #lastic key#a' 6 S#eci&icati$s@ 3asscode 3rogrammable from B to > digits #onitor inputs ;oor contact, 0'it push button, &ase tamper 3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation :peration temperature (1)Q& R =)Q& -umidity <)+RE)+ 5-, 2on condensation ;imensions 118*@,' I7*!,' 17*;,mm !eight <=)gS=+ Features@ ?% case with plastic $eypad, compact and low profile !ith tamper switch and one loop sensor input to trigger alarm when case is tampered or loop is intruded. 2on(volatile memory for 1)(1)) years data retention without any battery bac$up. ;& 1<9 operated therefore battery operation is possible when & power is interrupted. Intelligent programmable functions through $eypad by @0;1s and audible beep1s indication. I independent codes from B to > digits, up to EE,EEE,EEE combinations. 3rogrammable door release time, alarm time from 1 to EE period through $eypad. P--1=:2 Di*ital key#a' 5 A1S case 7ith #lastic key#a'/ 7ater#r$$& 6 S#eci&icati$s@ 3asscode 3rogrammable from B to > digits #onitor inputs ;oor contact, 0'it push button, &ase tamper 3ower re.uirement 1<9 ;& 7))m standby, =)) m on relay operation :peration temperature (1)Q& R =)Q& -umidity <)+RE)+ 5-, 2on condensation ;imensions 17I*@,' >=*!,' <E*;,mm !eight 7<)gS=+ Features@ ?% case with plastic $eypad. !aterproof. !ith tamper switch and one loop sensor input to trigger alarm when case is tampered or loop is intruded. 2on(volatile memory for 1)(1)) years data retention without any battery bac$up. ;& 1<9 operated therefore battery operation is possible when & power is interrupted. Intelligent programmable functions through $eypad by @0;1s and audible beep1s indication. I independent codes from B to > digits, up to EE,EEE,EEE combinations. 3rogrammable door release time, alarm time from 1 to EE period through E)UIP(ENTS OF CHANA2YA E.ECTRONICS CCTV SURVEI..ANCE SYSTE( D RE(OTE SURVEI..ANCE :ur range of &&T9 surveillance systems provide very high reliability and include security cameras and the monitoring screens. !ith built in software, these systems are designed to wor$ throughout the day, <BTI. These state(of(the(art surveillance systems are available at competitive prices. Jsing internet you can view your showroom, warehouse, factory from any where in the world. SECURITY CA(ERAS D IP CA(ERAS %ecurity cameras and I3 &ameras in various shapes and si"es are available with us to monitor the activities at any particular place or location. :ur range of security cameras wor$ very efficiently and are pretty easy to install as well.
A.AR(S !e manufacture, e'port and supply professional security alarm systems. !e have a wide assortment of alarm control panels, $eypads, and sensors, motion detectors to suit every need. DOOR PHONES AND 1U-S !e offer a large variety of udio ?ugs, udio ;oor 3hones F 9ideo ;oor 3hones and 0lectric @oc$s, to suit every need. -UARD (ONITORIN- SYSTE(S :ur guard monitoring systems ensure that your Cuard is not sleeping while on his /ob. They are dual powered, wor$ing on <<) 9 & #ains, as well as low voltage re(chargeable battery. DVR CARDS ;95 cards provide complete digital video recording solutions to a surveillance system. ;95 card surveillance systems integrate with color .uad processors, motion sensors, switchers etc. and come with advanced features, li$e #30C(B -ardware &ompression, high(speed processing, audio recording etc. TI(E ATTENDANCE RECORDERS -ighly sophisticated, contemporary attendance systems are designed to offer years of trouble free service. :ur time attendance recorders wor$ flawlessly and are provided with 56I; card reader, which digitally record attendance entries. -ODRE4 E)UIP(ENTS ACCESS CONTRO. SYSTE(S FIN-ERSCAN 0ITH PROFI(ITY READERS 5FS(ART6 FEATURES &ombines many functions into a single model and footprint =)) finger print templates with e'tended memory version upto BI)) templates. 3I2K6ingerprint, 6ingerprint(only, and Aeypad(only in a single unit, definable by user %uperior optical sensor and read algorithm %oftware and hardware tools for aiding in enrollment and template management <),))) to 7),))) event storage capacity 5%(B>= networ$ing between readers for template sharing USA-E :ffices 54; 0stablishments %oftware &os 3harma 4 ?iotech -otels -ospitals &orporates ACCESS CONTRO. SYSTE(S -ODRE4 PROFI(ITY SYSTE( Features !orldwide leader in pro'imity systems !ide product range to meet customer re.uirements 6ield programme 5ead ranges from = to <> inches !eather resistant and highly durable 1<=$-" contactless reader ;esigned for simple field installation daptable levels of security USA-E ?an$s, 3rivate %afe ;eposit 9aults, 6inancial Institutions, :ffices, Sh$#s, 6actories, !arehouses, Re&ieries a' Allie' I'ustries/ (ultist$rey 1uil'i*s/ Resi'etial C$l$ies/ H$tels a' H$s#ital+ E)UIP(ENT OF -ODRE4 E.ECTRONIC SAFES FA.CON 1UR-.AR A.AR( SYSTE( FEATURES Two "one dedicated burglar alarm panel. 0ase of operations rm and ;isarm mode 5ange of detectors and sensors such as #agnetic door sensor, #otion sensor, 9ibration sensor, Class brea$ sensor, 3anic switch. -ooter optput capable of driving multiple hooters up to total of =))m load In built utomatic Telephone ;ialer with following features ( o Ten programmable phone numbers each upto 1= digits. o <) seconds recordable message. o :ption of programming from remote location. o 9erification by playbac$ of recorded message during programming. o 3rogrammable password, message repeat count, redial setting. 3rovision of parallel telephone instrument. o Ten years retention of telephone numbers and messages, in case of no power. -ighest priority for alarm condition dialing. In case of alarm detection, parallel instrument is disconnected and dialler ta$es over instantaneously. o 6acility of remote s$ipping of a particular telephone number for ne't redials after being called by T;. o Jser programmable password protected facility of remote rming F ;isarming of alarm systems Fresetting of alarms. !ide input range of operation from 1=) 9 & to <I) 9 &. utomatic switch over to battery in case of & 3ower failure. ?attery bac$up of 78 hrs for standard configuration. utomatic battery charging once the & 3ower is restored. @ow ?attery indication. udio(visual alarm indications
Techical S#eci&icati$s 2o of Lones ( < *;elayed 4 <B hours,. -ousing ;imensions ( <<= mm *-, ' <I< mm *!, ' >= mm *;,. 3rimary 3ower ( 1=)9 to <I)9, =)-". %econdary 3ower ( 1<9 F I - battery. &urrent &onsumption ( 1))m. @oop 5esponse ( appro'. =))ms. -ooter output ( ma'imum load of =)) m. 3hone numbers storage capacity ( 1) numbers each of 1= digit long. #essage length ( <) seconds. %hipping !eight ( 8 Ag. E.ECTRONIC SAFES DRA-ON FIRE A.AR( The Codre/ ;ragon 6ire larm %ystem is programmed to provide high levels of security. ?e it to secure your family and yourself or to protect valuable assets in your home, office or establishment from the threat of fire. Cenerally confirms to I% <1>E. %trong 6ire red colored, 1.8mm thic$ cabinet. Jser friendly operations. &ompitable with all types of conventional detectors. ?attery bac$up with in built charging. utomatic switch over to ?attery in case of & mains failure. %ignal %ilence to ac$nowledge 6ireF6ault condition. ctive fire "ones in case of isolating of other "ones. I'icati$s %eparate twin @0; indication for fire for each "one. Lonewise 6ault *:pen F short circuit, indications. 6ireF6ault status in unambiguaous colored indication. & 6ail F @ow ?attery warning. &harger :2 F&harger 6ail indication. 6use blown indication for & and ;& fuses. 0rth fault indications. -ooter &ut ;etection with audio visual warning. Out#uts Individual hooter outputs for each "one and a common hooter output. Two numbers 6:5# & 5elay output for actuators li$e elevator control, -J shut(off, 6ire e'tinguishing system. %electable ctivation of 5elays either at larm condition or at Trouble condition. 3rovision for 5epeater 3anel for 5emote annunciation. O Pael Testi* Facilities :ne man wal$ test facility. @amp Test 6acility ;rill switch to activate alarm sounders manually. 0ase of #aintenance with u'iliary isolate feature. Lone isolation facility. Techical S#eci&icati$s 2o of Lones ( 7(> "ones -ousing ;imensions ( 7>8 mm *-, ' 71E mm *!, ' EB mm *;, *7 "one,. 3rimary 3ower ( 1=)9 to <I)9, =)-". %econdary 3ower ( <B9 ;& ( *1<9 F I - battery ( )<nos, &urrent &onsumption ( 1))m. @oop 5esponse ( appro'. =))ms. -ooter output ( "one wise K common output Lone Input ( < wire loop with B$I end on line resistor u'iliary output ( )< 2os. 2: F 2& u'iliary contact ratings ( 7 O <7)9 a& CHAPTER ? RESEARCH (ETHODO.O-Y 0HAT DOES RESEARCH (EANS 5esearch is a common parlance refers to search for $nowledge. It is an art of scientific investigation. It is a careful investigation or, in.uiry especially through research for new facts in any branch of $nowledge. In fact it is a systemati"ed effort to gain new $nowledge. RESEARCH O14ECTIVES 5esearch methodology is a way to solve the research problem systematically. It may be understood as a science of studying how research is done scientifically. !e study various steps that are generally adopted by a researcher in studying to $now not only the research method but also methodology. 5esearcher not only to $now how to develop certain indices or, tests, how to calculate mean, the mode, the median, the standard deviation or chi(s.uire, how to apply a particular research techni.ue, but also methodology is relevant. 5esearcher needs to $now the assumptions underlying various techni.ue or, procedure, will be applicable to certain problem 4 other will not. ll this means that it is necessary for the researcher to design his methodology for his problem as same way differ from problem to problem. %o we can say research methodology has may dimensions 4 research methods do constitute a part of the research methodologyU TYPES@ ( 1. DESCRIPTIVE RESEARCH: ( It includes surveys 4 facts findings, en.uiries of different $inds. The ma/or purpose of descriptive research is description of the state of affairs as it e'ists at present.. The ma/or characteristic of this method is that researcher has no control over the variables. -e can only report what has happened 4 what is happening. <. ANA.YTICA. RESEARCH@ - The researcher has to use facts or, information already available 4 analyse this to ma$e a critical evaluation of the material. 7 EFP.ORATARY RESEARCH : ( It is the development of hypothesis rather then there testing. 6ormali"ed research studies are those with substantial structure 4 with specific hypothesis to be tested. B EFPERI(ENTA. RESEACH@ - The main characteristic of it is that here researcher has greater control over environment 4 variables are manipulated to observe their effect on other variables. 5esearcher establishes one e'planation or reason for a particular observation they ta$e the help. 5esearch methodology is a way to solve the research problem systematically. It may be understood as a science of studying how research is done scientifically. !e study various steps that are generally adopted by a researcher in studying to $now not only the research method but also methodology. 5esearcher not only to $now how to develop certain indices or, tests, how to calculate mean, the mode, the median, the standard deviation or chi(s.uire, how to apply a particular research techni.ue, but also methodology is relevant. 5esearcher needs to $now the assumptions underlying various techni.ue or, procedure, will be applicable to certain problem 4 other will not. ll this means that it is necessary for the researcher to design his methodology for his problem as same way differ from problem to problem. %o we can say research methodology has may dimensions 4 research methods do constitute a part of the research methodologyU PURPOSE OF STUDY ?asically the main ob/ective of study was to determine the success rate of various products of 3egasus. To determine the demand of security e.uipments in various channels. To determine the performance of e.uipment. To obtain the respondent view will found to be helpful in improving the scope of growth. CHAPTER 9 DATA INTERPRETATION ?asically during my pro/ect all the data were collected online while communicating with respondent through internet. %ome of details of data collected are as follows : DID YOU USE ANY SECURITY E)UIP(ENTS STATUS NO+ OF RESPONDENTS Ves >= 2o. 1= TOTA. 1== %es &'( )o* +'( %es )o* 0HICH E)UIP(ENTS ARE 1EIN- USED 1Y YOU THE (OST (ODE. NA(E NO+ OF RESPONDENTS 8I=)i =E 6ace Cuard = T1) 6inger print <E #obile Hammer I FRO( 0HERE YOU -ET 2NO0.ED-E OF PE-ASUS E)IP(ENTS+ Product Sale Percentage ,-'.i '/( 0ace Guard '( T+. 0inger print 1/( Mo2ile 3ammer -( ,-'.i 0ace Guard T+. 0inger print Mo2ile 3ammer HO0 DO YOU -ET INFOR(ATION A1OUT THE PRODUCT S$urce NO+ OF RESPONDENTS 2ewspaper 11 Internet =1 &ompany1s 5esponse <1 :thers 1I ++ '+ 1+ +- . 1. 4. ,. &. +.. )e5spaper 6nternet Company7s Response Others Source P e r c e n t a g e Series+ 0HICH E)UIP(ENT YOU THIN2 IS THE 1EST 0ITH RE-ARD TO SECURITY (ODE. NA(E NO+ OF RESPONDENTS 8I=)i <I 6ace Cuard =E T1) 6inger print 11 #obile Hammer 7 1- '/ ++ 8 . +. 1. 8. 4. '. ,. -. ,-'.i 0ace Guard T+. 0inger print Mo2ile 3ammer P e r c e n t a g e Series+ CHAPTER : FINDIN- 1. #a/ority respondent uses 8I=)i *ccess controller, as compare to other products of the company. <. #a'imum publicity and customer are achieved by the company by thought internet as compare to other source. 7. bout =I+ of product sold are 8I=)i due to its cheaper sale. B. Technically as well as practically 6ace Cuard is found to be the best security e.uipments in terms of security. CHAPTER ; .I(ITATION 1. &ompany products cost is very high which ma$e it difficult for the Indian user to purchase. <. &ompany also needs to provide better after sale services. 7. &ompany needs to improves its networ$ all over the company. CHAPTER < CONC.USION 1. %ale of 8I=)i *ccess controller, is higher as compare to other products. <. &ompanies achieves its ma'imum customer through Internet. 7. bout =I+ of product sold are 8I=)i due to its cheaper sale. B. Technically as well as practically 6ace Cuard is found to be the best security e.uipments in terms of security. =. &ompany needs to improve its distribution and after sale service networ$ in India. CHAPTER 8 RECO((ENDATION 1. &ompany needs to give more emphasis on T9 advertisement. <. &ompany also needs to lower down their mar$et rates due to tough competition in the mar$et. 7. &ompany officials also needs to employee .uality sales e'ecutive which can present their products in a better way to customers. B. &ompany also needs to impart regular training and seminar sessions to its employees. APPENDIF 1+ 1I1.IO-RAPHY ,+ COPIES OF )UESTIONNAIRES >+ DETAI.S OF SA(P.ES 1I1.IO-RAPHY 1. &&&5google5com <. www."icom.com 7. www.pegasus.com B. www.chana$aya.com =. 5esearch #ethodology by A.&.Aothari 8. #ar$eting #anagement by 3hilip Aotlar