Manuel VillanuevaOBJECTIVES

Develop a different way of selling, which is aligned with the culture of customer focus, differentiate ourselves from the competition by individualizing products, services and behaviors we offer.

Resulting in customer loyalty by identifying these, their needs and exceed their expectations achieving beliefs.

Sergio RiveraObjective

Establish a group of basic knowledge for professionals and safety experts showing the essential elements required for planning and design of the perimeter security of a project. Through the review of basic concepts, methodologies and examples, it is intended to provide the tools and adequate criteria for an orderly and responsible for perimeter security planning.

The main objective of this program is to show how through proper integration of people, processes and equipment in a project, it is possible to improve the security perimeter of a site reducing false alarm rates and meet the overall objectives of physical security set.

Chapter I Overview of EAC

Defining a Personal Access Control

Parts of a Personal Access Control
• Networks
• panels
• Output Elements
• RTE (buttons, sensors, panic bars)
• Edging Power
• Edging Magnéticas
• Talanqueras
• Turnstiles / Turnstiles
• Software
• Communication Protocols

Carlos GuzmanObjective

This course was developed by the Association of Security Industry (SIA) and translated and adapted by ALAS in 1997, in order to meet the needs of vocational training in the area of ​​Latin America and the Caribbean.

Currently the industry develops new products and technologies that demand general and basic knowledge to ensure design, installation and commissioning of access control systems with high satisfaction for the end user.

Germán Alexis CortésOBJECTIVE

Knowing how the industry has advanced level of digital image processing. Digital recording. Remote transmission Images.

Knowledge of data networks, applied to the video security industry. Knowledge of advanced features in new digital cameras. real and virtual matrices Matrices. IP cameras. Digital Video. Computer security video network. Practical Applications.


article thumbnailSony The HAW-S series is the first NVR compatible Sony 4K device that can record and play in 4K resolution, for monitoring systems of ...
article thumbnailSeco-Larm The new multifunctional timer and counter SA-025MQ includes operation with low current consumption, seven modes easily ...
article thumbnailJohnson Controls The new 8.0 version of Kantech's EntraPass now adds support for the American Dynamics NVR network recorders through the app ...
article thumbnailST Electronics The AgilFence perimeter intrusion detection system developed for perimeter fences offers reliable detection and ...
article thumbnailAxis Communications The new AXIS Companion Dome Mini LE camera is designed to meet the needs of video surveillance in small businesses ....
article thumbnailU.S. For the first time in its history, the WINGS Summit will have online registration open to the public to visit the commercial exhibition and ...
article thumbnailInternational. Information technology (IT) managers are more likely to catch cybercriminals on servers and networks ...
article thumbnailU.S. Recent reports from Business Insider, CNN Business and many other publications have highlighted the undisclosed on-board microphone ...
article thumbnailInternational. ASIS International launched the Selection and Training Guide for Private Security Officers (PSO) of ASIS (ASIS PSO-2019) that ...
article thumbnailInternational. The World Wide Web Consortium (W3C) has just approved the web authentication API, also known as the WebAuthn standard, which is ...