PH.
625-4000

24 HRS.

Services
MONITORING
CENTRALARM provides monitoring services for your home, store, company and industry with highly trained, responsible employees through a computerized Central which operates 24 hours a day, 365 days a year, guaranteeing that the signals generated by our customers' alarms will be received and action will be taken at once.

INTERNET-BASED OPENING AND CLOSING
At CENTRALARM, with our state-of-the-art technology, customers can go online and check, at any time, the openings, closings, alarm signals, etc., that have occurred in their business, office or home.
If you prefer, we can provide at your request a report of the days, times and code numbers of the people who opened and/or closed your establishment or home, as well as the alarms reported by the control panel. This report can be sent in writing or via e-mail.

HOW TO ACCESS CENTRALARM'S WEBSITE AND SEE YOUR ACCOUNT TRANSACTIONS
• Go to CENTRALARM's website www.centr-alarm.com
• Click once on Acceso a Clientes.
• Register as a new user by following the simple steps indicated by our web Access page.

IMMEDIATE RESPONSE
If you get an alarm signal, our operators will get immediately in touch with you and/or with a persona appointed by you to report the cause of this signal, while calling the police, fire department or medical services if needed.

MAINTENANCE SERVICE
Periodically or upon request we will make visits to check the proper operation of your alarm system. If you get an additional component for your alarm system, we will install it free of charge.

CHANGING SECURITY CODES
If, for security reasons, you need to modify your code or cancel any registered codes, CENTRALARM, through its Central System, will provide an immediate response after getting your request and at no additional charge. If you forget your personal code, we can reset it immediately.

What's an Alarm System?
It is an electronic device that acts as defense against any kind of theft. The main function of an alarm system is to advert the non-authorized intruder entrance or entrance attempt. These system combines the perimeter and interior protection of your property. Each access door or window should stay protected with some kind of sensor.



The inside of your property is protected with movement sensors. The most common type of sensor detects the presence of a person by comparing body temperature to the room temperature. There are different types of alarms, according to your needs they may be WIRED or WIRELESS. Wired alarms are fully cabled and are more commonly used for businesses or warehouses. Wireless alarms don't use any wires and are therefore recommended for finished homes to preserve cosmetic appearance.



Components of an alarm system

KEYPAD: This device has numbered keys that are used to enable and/or disable the alarm system. It can be LED based or have a text display.

MOVEMENT SENSOR: This device provides internal protection for the property. It identifies the presence of people inside.

MAGNETIC CONTACT: This is the first defense against an intrusion attempt. They determine whether a door or window has been opened.

BACK-UP BATTERY: It keeps your alarm system operating in the event of a power outage.

CONTROL PANEL: A Control Panel or Brain is the core of the system, as it controls the overall operation of the equipment. The Control Panel or Brain is actually an electronic card with protected circuits in a cabinet.

HORN: If your alarm system is activated, this will announce the unauthorized entrance of an intruder to your property by sounding a horn.

Monitoring System
This is a supplement to the alarm system, which verifies the status of the system 24/7 through signals that are sent to the monitoring central over the phone line and/or other communication devices (radio, cellular transmission, Internet, etc.), reporting, among other things: Openings, closings, theft, fire, medical emergencies, police, power outages, robbery signals, etc.

How it works
When your alarm system is activated and an event takes place, whether an intrusion or a robbery, the alarm panel captures the phone line and issues a signal to the central monitoring station. The panel sends data over the phone line that are received and recognized by a device known as a receiver, which sends the alarm information to the CENTRAL MONITORING COMPUTER, where it is interpreted, processed and presented to an operator who will take action.

In the event of an intrusion, robbery, fire or medical emergency, the operator can try to verify the event by calling the monitored site and will then call the emergency services (police, fire department and ambulance). The operators can also send medical help or firefighters and will notify the people appointed by the user, according to a phone list prepared when the Monitoring Service is hired.

An electronic security system (alarm) has three parts:
1.- Sensing (sensors)
2.- Processing (central, keypad)
3.- Response (lights, horn, monitoring)

1. Sensing
a) Indoor: This is basically done with movement sensors.

b) Perimeter: With magnetic opening sensors. Less often, glass breaking and photoelectric sensors are used.


An ideal protection uses both indoor and perimeter sensing. If only indoor sensors are used, the response will be produced once the thief is inside the property, and if the site is a residence, these sensing areas cannot work when there are people inside, and protection is only enabled when there's nobody in the house.

If only perimeter sensors are used, you can sleep peacefully, because if an intruder tries to get in, there will be an immediate response, but if the place is empty and there is an opening, the perimeter will not be protected as it has been violated.

With the proper use of the two systems you eliminate the cross risks of each individual system, because one covers the shortcomings of the other.

2. Processing


To do this, there is an alarm central, preferably it should be installed in a hidden place, and at least one keypad is installed to enable, disable and manage the system.

 

The alarm system should have a maintenance-free battery system with enough autonomy to sustain the system during a power outage.

 

About the type of central, all centrals work, but it should be chosen to meet the standards, because that's the only thing that assures a quality standard and future security.


       

If the system will be installed in a small business or in a small home with only one way in, it will be enough to use one keypad installed by the entrance, near the door. On the other hand, if the property has several floors and has an independent service entrance, a keypad should be installed in the secure area near a bedroom where, in the event of a robbery, people can lock themselves in to await help.

In this case, through indications in the keypad, it will be possible to know where the intrusion took place and whether there's movement and where. Furthermore, through pulsers in the keypad, a help call will be sent out. More keypads should be added to any additional independent entrances.

 

3. Response
This is what makes everything else necessary. Locally, in the event of an intrusion attempt or of a fire alarm, one or more hidden alarms will sound inside the home and a strobe light can be added on the outside so that when the police come, they can identify the place quickly.
Finally, MONITORING IS WHAT TURNS AN ALARM INSTALLATION INTO A SECURITY SYSTEM, since in the event of an alert, not only will there be a sound alarm, but also, instantaneously and automatically, the monitoring central will get a signal, notifying the police and the persons listed by the owner in each case.

At the monitoring central, events are followed up by specially trained employees who will follow every directive.

Monitoring is not only a fundamental support for a theft alarm, but the only solution to respond to robbery attempts, fires, medical emergencies, etc., while also permanently checking electric circuits, batteries, antisabotage circuits, power outages, etc., which allows us, through ongoing technical checks, to make sure that the alarm system is always operational and alert to perform its function.

When an alarm is not monitored, it is isolated and its future operation cannot be guaranteed unless all of its circuits and zones are checked periodically.

© 2005 CentrAlarm - Web Design: Versión 2 Publicidad