Honeywell Enhanced Pro-Watch Security Management System
Honeywell’s Pro-Watch 4.1 security management system adds support for the company’s Vindicator high security intrusion detection system, as well as SALTO disconnected readers and Mercury Security control panels.
Through the Pro-Watch platform, Honeywell Integrated Security (HIS) integrators can deploy Vindicator products to enhance their customers’ intrusion detection systems, reducing deployment costs, strengthening perimeter protections by taking advantage of the graphic user interface (GUI) in the Pro-Watch platform, according to the company.
The addition of disconnected readers from SALTO to the Pro-Watch platform also complements the recent addition of wireless readers from Ingersoll Rand’s (IR) Schlage brand. These solutions extend electronic access control to areas that were previously cost prohibitive to reach and give users access to the platform’s advanced reporting functions, the company says.
Pro-Watch 4.1 also adds support for Mercury Security’s standard protocol control panels by giving integrators a path to migrate customers using third-party access control solutions, supported by Mercury Security control panels, to the Pro-Watch platform. Organizations have the option to keep or upgrade their existing access control hardware to Honeywell components, including readers and access cards. Users also get access to the system’s advanced badging and reporting functions to pull real-time dynamic reports.
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.