United Kingdom
Catalog   /   Home & Renovation   /   Security Systems   /   Security Systems & Smart Hubs

Comparison PoliceCam GSM 10A vs Alfa ViP 606c

Add to comparison
PoliceCam GSM 10A
Alfa ViP 606c
PoliceCam GSM 10AAlfa ViP 606c
Outdated ProductOutdated Product
TOP sellers
Typealarm systemalarm system
Connecting sensorswireless and wiredwireless and wired
Wireless zones9999
Wired zones47
Backup power8 h
Features
Security functions
partial protection
push button alarm
 
 
 
auto arming
Control panel features
 
 
intercom
listening
 
 
siren output
display
keyboard
intercom
listening
voice guidance
relay output
siren output
Connection to control panel
Max. wireless sensors9999
Max. key fobs8
Users (numbers to call)66
Numbers for SMS36
Complete with central
Motion sensors11
Opening sensors11
Control fobs22
Siren
General
Control
 
control fob
phone (GSM)
control panel keypad
control fob
phone (GSM) /call, SMS/
Siren volume110 dB
Added to E-Catalogfebruary 2018february 2018

Wired zones

The number of security zones that can be covered by this set when using wired sensors.

In this case, a security zone means a separate protected area for which you can separately set the operating mode — for example, "Protection", "Protection disarmed" or a special tracking format. In many models, the number of zones corresponds to the maximum number of wired sensors that can be connected to the device (see "Wireless sensors"). However, there are exceptions: one zone can be served by several sensors at once, and based on this number of zones, there may be less than the number of sensors.

Backup power

The time that the alarm is able to work on its own built-in power supply, in case of failure of an external power source.

Backup power allows the security system to remain operational during power outages (including during deliberate shutdown). The longer the time of operation on backup power, the more reliable the alarm, the lower the likelihood that due to power outages, the security will be completely disabled. At the same time, note that the specifications usually indicate an “perfect” battery life, with minimal power consumption; in fact, this period may be less — depending on the specific mode of operation, the frequency of operations and the quality of the batteries used (if replaceable batteries play the role of an autonomous source). So it is worth choosing according to this indicator with a certain margin — at least 15 – 20%.

Security functions

Partial security. Possibility of work of a set in the mode of partial protection. In this mode, the alarm does not arm the entire protected space, but only a part of it — for example, individual rooms, or only sensors of a certain type (opening, movement). Specific features of the partial protection format may be different, they should be specified separately in each model. However, anyway, this function expands the capabilities of the signaling and may be useful in some specific situations. For example, in a residential building at night, you can turn on the perimeter sensors without using motion sensors — in this way, the alarm will only turn on when you try to enter the house and will not respond to people inside.

Alarm on pressing the button. Possibility to turn on the alarm signal manually by pressing a special button. This function will be indispensable in extreme situations in which automatic sensors are useless — for example, during an open robbery or attack. Specific alarm functions, of course, may be different: some models include a siren, others are able to send a signal to the dispatcher's console, etc.; these details should be specified separately.

Auto arming. Possibility of automatic arming of the alarm system. Most often, in this case, the inclusion of protection is implied by the schedule of hours and days of the week specified b...y the user; some models allow you to store several schedules in memory at once. This feature ensures that the protected zone "out of hours" will not be left without an alarm, even if the user forgets to turn it on manually. In addition, other methods of auto-arming may be provided — for example, when all key fobs are removed from the communication zone; the presence of such functions should be clarified separately.

Control panel features

Functions and capabilities of the central signaling unit.

Display. Own display, which the control panel is equipped with, can have a different size and functionality — from the simplest indicator matrix with several characters to a full-fledged colour screen. Anyway, this function makes working with the alarm more convenient and visual. The display can show various data about the system operation: the current mode of operation, the status of security zones and sensors, the arming and disarming log, battery charge, etc. At the same time, it should be noted that the absence of a display does not mean that it is impossible to receive such information — some models are able to display data on an external display, for example, on a smartphone or tablet via the Internet (see "Control").

Keyboard. Own keyboard that allows you to control the functions of the central unit directly from its body. For more information about this feature, see "Control"; here we note that the keyboard in most cases is combined with the display described above.

SOS button. The presence of its own SOS button (panic button) on the body of the central unit. This button allows you to quickly raise an alarm in an emergency; it is usually made large and clearly visible, and the alarm can be triggered in a way that reduces the likelihood of false alarms — for example, by l...ong or repeated pressing.

Intercom. The possibility of using the system for two-way communication — between a remote subscriber and a person located near the central unit. This function is found only in models with the possibility of remote control via GSM (see "Control"). It allows you to use the control panel as an impromptu landline phone — to communicate with phones stored in memory. In some cases, this possibility is useful: for example, if there is a person on duty at the protected facility, when the alarm is triggered, he can report the details of the incident via the intercom. Often this function is combined with listening (see below); in fact, intercom differs from listening only in that the remote user can not only hear what is happening in the room, but also fully speak with the people who are there.

Listening. The ability to use the system to listen to the room in which the central unit is installed. This function is found only in models with the possibility of remote control — via GSM or Wi-Fi (see "Control"). At the same time, in some models, listening is activated only when the system is triggered, in others it can be turned on at the request of the user by calling the control panel through the telephone network or through an Internet application.

— Voice guidance. The presence in the system of the function of voice accompaniment — "sounding" by voice messages of various actions and events. This function is found only in models with the possibility of remote control via GSM or Wi-Fi (see "Management") and mainly concerns communication with a remote user. When the system is triggered, a call is received to the specified phone number, and when the user answers it, the system announces the data on the trigger (sensor type, time, security zone, etc.). This makes it possible to obtain detailed information on the incident, and not just an alarm; in addition, in many models, after informing, a voice menu is activated, which allows you to control the security from your phone.

— Relay output. Availability of a relay output in the central unit — an output whose contacts are connected to the built-in relay and can be closed and opened on command from the control panel. The ways of using such an output can be different: in some models, the contacts are triggered when the guard is turned on / off, in others they are closed on an alarm signal, some systems allow you to control the line output from the phone or via the Internet; these details should be clarified separately. However, anyway, this function allows you to connect various additional equipment to the device. For example, in a control room where the relay is triggered by an alarm, an additional siren or spotlight can be connected to the relay output.

Exit to the siren. Availability of a separate output in the control panel for connecting an additional external siren. In this case, both a hardware connector for a wired siren and the ability to connect a wireless siren may be implied, depending on the model (these details should be specified separately). However, anyway, if you are going to use a "non-native" siren, you should choose a model with this feature.

Max. key fobs

The number of control fobs that can be simultaneously connected to a system that supports such accessories (see "Control").

At least one key fob is usually supplied with such a system, but this may not be enough. If several people should have access to the alarm through key fobs, it is worth making sure that the appropriate number of key fobs is supported by the selected set.

Numbers for SMS

The number of numbers for sending SMS, which can be stored in the control panel's memory.

Many models that support managed control via GSM (see "Management") are able to send SMS notifications about various events to specified numbers. In some situations, such notifications are more preferable than voice calls (see "Users (numbers to call)"). One of the conveniences is that the SMS message is automatically stored in the phone, unlike voice calls. In addition, if both functions are available, you can “share responsibility”: set up voice calls for emergencies, and SMS messages for various “on-duty notifications” that are not a cause for alarm (for example, the alarm was disarmed, external power was lost from switching to backup, the sensor warns of low battery, etc.). Many alarm models allow you to store several numbers in memory and send SMS messages to them almost simultaneously.

Control

Control methods provided in the set.

Keypad of the control panel. Keyboard control on the central unit. The simplest and most inexpensive method, which has long been used in alarms and is suitable for even the simplest low-cost-level kits. To access the controls, you need to be directly near the central unit — this can be both a disadvantage and an advantage, depending on the situation. So, it is not always convenient to approach the control panel every time; on the other hand, if remote control methods are not provided for in the design, the alarm system turns out to be as resistant to hacking as possible: it cannot be hacked remotely, and in order to physically get to the central unit, you usually need to overcome the protected perimeter.

Keychain. Controlled by a wireless remote control, similar to those used in car alarms. This method is quite convenient from a practical point of view: you can give alarm commands from a distance, and it is convenient to carry the key fob with you — for example, by attaching it to the same key ring that opens the protected room. The range of key fobs (see above) in modern alarms ranges from 40 – 50 m to 1.5 km or even more. The disadvantage of this option is the actual dependence on the key fob, which can be lost or stolen; and the batteries in the key fob also need to be monitored so as not to be left without a remote control at the most inopportune moment.

From the phone (GSM). Phone control via GSM networks. Note that you do not need a smartphone to use this function: control is carried out via SMS and/or voice menu and is available from any mobile phone, and in some models from a stationary phone with tone dialing. In addition to the ability to access the alarm from almost anywhere in the world where there is a mobile connection, this type of control has another important advantage: the design often provides for feedback, namely the ability to send voice calls and/or SMS messages to the user's phone (see Fig. "Users (numbers to call)", "Numbers to SMS"). However here it is worth considering that in order to use GSM control, it is necessary to buy and install a SIM card of a mobile operator in the central signaling unit; and for calls and SMS from the central office, the mobile operator will charge on a general basis.

From the Internet (Wi-Fi).... Management via the Internet — through an application on a computer or mobile gadget or through a special page in any browser; via Wi-Fi, in this case, the alarm is connected to the Internet. Like the mobile communication described above, this method makes it possible to control the alarm from anywhere in the world (if there is access to the World Wide Web), and receive various notifications from the alarm. Specific features of such management should be clarified separately. Among other things, this method is especially convenient for those who often travel abroad: mobile roaming on such trips is not cheap, it can be easier to find Internet access.

Siren volume

The volume of the siren, which comes standard with the set.

The louder the siren, the higher the likelihood that a triggered alarm will attract the nearest police patrol or at least random citizens. In addition, a loud sound can have a psychological, disorienting effect on an intruder. Thus, the alarm sirens become quite noisy. So, in the most "quiet" volume level is about 70 – 80 dB, this can be compared with a noisy city street, the ringing of an alarm clock or a scream at a distance of about 1 m. And in the loudest, this value reaches 130 dB, which is comparable to the sound of a working perforator , the pain threshold is approximately at the same level. More detailed comparisons of different volume values with real sound sources can be found in special tables.