The Connect2Go IP module is a powerful TCP-IP based bus-level interface to DSC PowerSeries* panels and Honeywell Vista* panels. It allows you to view the status of and even control your alarm panel through a standard web-browser or smart-phone. VOIP Friendly.
Authorized dealer for API monitoring
Fire alarm systems shall be inspected and tested in conformance with CAN/ULC-S536, ‘Inspection and Testing of Fire Alarm Systems’.
Annual Fire Monitoring Inspections. We can:
- provide an annual fire monitoring panel and transmitter inspection
- our technicians test all functionality of the system
Intercom is a stand-alone voice communications system for use within a building or small collection of buildings, functioning independently of the public telephone network. Intercoms are generally mounted permanently in buildings and vehicles.
Ultratech Solution is proud to be Certified by Kantech for Access Control System installation .
Access control systems provide authorized individuals safe and secure access in and out of various parts of your business while keeping unauthorized people out. They can range from electronic keypads that secure a single door to large networked systems for multiple buildings. Access Systems also greatly simplify management of your facility: no need to replace lost keys, hunt down old keys from terminated employees, or wonder who has access to which areas.
Our Technicians have ability to install hard-wired and wireless security alarm systems of different brands, such as DSC, Honeywell, Concord, DMP and etc.
With the new systems combined with a "WiFi" module the presence of a phone line is no longer required.
Remote Security Services:
Fire Alarm Monitoring Panel Inspection
For over 30 years, a.p.i. has provided monitoring services to thousands of independent dealers and 300,000 customers from coast to coast. Our goal is to provide high quality monitoring the only way we know how… The way you want it – Your way!
Authorized dealer of Connect2Go
Door Access Control System
Surveillance can include observation from a distance by means of electronic equipment (such as CCTV cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls); and it can include simple, relatively no- or low-technology methods such as human intelligence agents and postal interception.