EtherLock Security Systems
are the most:
Efficient: uses ethernet
infrastructure and creates no communications
* Effective: monitors
for physical removal of an asset and can provide notification in real-time
* Economical: uses the
existing network wires and requires no
provides an easy-to-use, non-intrusive, reliable
security solution. Contact CMS Technologies today
for more information regarding Return on Investment (ROI) analysis or a demonstration.
II is a centralized piece of equipment which applies DC current to the
physical layer, to continuously monitor the physical connection,
distinguish Ethernet end devices and provide notification.
network-connected alarm module for active
security in a distributed computing environment.
The Watcher™ is internally configurable.
It's delivered in a default mode to start working
as soon as it is connected to the network. It
uses standard dry relay contacts to control CCTV,
motion detectors, lights, audible alarms,
auto-locking doors, etc. The Watcher
enables routing alarms from the EtherLock II
system to building security systems that are
programmable control key is used with the EtherLock
II system to
acknowledge event notifications and to arm and/or
disarm the alarm system. It's immediately
recognized by EtherLock when it is plugged into a
network walljack or patch cord from the walljack.
It has a unique, permanent electronic
identification number, which can be assigned to
each user for tracking and record keeping
The EtherLock IDentificatiom device
or ELID device works in conjunction with the EtherLock II unit allowing
for real-time identification and tracking of a computers' physical
location on an Ethernet network providing absolute control over what
equipment connects to your data network. The ELID device also
allows for a complete location-based inventory of all your assets even
if the assets are powered off.