Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Our Solutions

Center Tec offers the following solutions,

Intelligent Fire Detection and Suppression Systems

Fire detection and suppression systems are used to detect smoke and fire, suppress flames, and notify building occupants and emergency personnel about dangerous conditions. Products include emergency call systems, fire alarm control panels (FACP), fire sprinkler heads, fire suppression systems, flame detectors, head detectors, and smoke detectors..

Fire detection and suppression systems can detect, suppress, or both detect and suppress fire and flames. Flame detectors, heat detectors, and smoke detectors are sensor-based devices that are used with fire alarms or larger fire suppression systems. Flame detectors use optical sensors to analyse incoming ultraviolet (UV) and/or infrared (IR) radiation at selected wavelengths. Heat detectors sense heat produced by combustion and can trigger an alarm when a rapid temperature rise occurs, or a specified temperature is reached. Smoke detectors are designed to sense the products of combustion. There are two basic types of devices: ionization chamber smoke detectors and photoelectric smoke detectors.

We design complete fire suppression systems to suppress flames in the event of a fire. Suppliers of fire detection and suppression systems may also provide fire alarm control panels (FACP) and emergency call systems. FACPs receive information from fire detectors while emergency call systems transmit an alarm to emergency services personnel such as building security or a fire department.

Emergency Call Systems
Emergency call systems are designated terminals used to call or transmit a need for attention. Emergency call systems may also be known as a panic alarms, man down alarm systems, duress systems, or a personal emergency response systems. 

Fire Alarm Control Panels
Fire alarm control panels (FACP) are systems which receive information from input devices (smoke detectors, heat detectors, etc.), process the information, and trigger an output device such as an audio or visual alarm.

Automated Suppression systems
Protect your Critical Operations with Fire Suppression systems.
By installing a gaseous fire suppression system you can starve a fire of oxygen or heat, therefore eliminating the three requirements for a fire to burn; oxygen, fuel and heat.
Our Suppression systems will detect a fire usually by smoke detectors and trigger a series of outputs which release a gas agent into the protected area. This gas will then suffocate the fire of oxygen or heat and therefore extinguish the fire. We can provide the following systems:

FM200 based
FM2OO™ is a compressed gas which is stored as a liquid and dispensed into the hazard areas as a clear, odourless and electrically non-conductive vapour that does not obscure vision. It leaves no residue and, at the correct design concentration, is suitable for the protection of occupied areas.

Inert Gas Systems
Inert gas systems work by reducing the concentration of oxygen in the atmosphere to a level which will not sustain combustion (below 14%). A relatively large volume of the gas therefore needs to be released into the atmosphere to achieve this objective. Unlike Halon and halocarbons, inert gases are stored as high pressure gases and hence require a large number of high pressure storage cylinders - with implications for space and weight.

Inert gases such as nitrogen can be used alone but inert gas mixtures (typically blends of nitrogen and argon) are also available. As these systems use natural gases which are obtained from natural sources they have zero ozone depletion potential.

Water Mist
Water mist or fine water spray systems are relatively new technology for fire fighting. Their method of extinguishing is cooling plus some localised oxygen reduction. Research has shown that fine water sprays do not conduct electricity in the same way as a solid stream of water, so sprays can be considered for use on live electrical equipment. Fine sprays can also be used on fire of flammable liquids, but should not be used on substances that will react violently with water such as reactive metals.

Water mist systems cause no environmental damage and are safe to use in occupied areas. There is likely to be some water damage, although this is considerably less than that associated with a sprinkler system

Wired and wireless Voice and data connectivity solutions

Structured cabling infrastructures can combine both voice and data communications whether the terminations are copper or fibre.. A Center Tec installed structured cabling system however, is specifically designed to offer the highest performance levels available, enabling current and foreseeable future network protocols to be accommodated, protecting your IT investment.

Center Tec offer cabling solutions achieving multi-gigabit data speeds with maximum reliability.

Center Tec offers Universal Cabling Solution for a building or series of buildings with cable, outlets, floor distributors, building distributors and campus distributors. The aim is to meet the requirements of all potential users of the building during its lifetime, without the need for re-cabling.

Center Tec through its supplier introduces the complete range of optical fibre connectivity combined with the complete range of Fibre Optic Cables, covering 62.5μ, 50μ and OM3 50μ fibres guaranteeing full application distance, plus the single-mode fibre range for long distance support of up to 10 km for 10 Gbps.

Optic fibre cabling for backbone cabling.
The global requirement for advances in digital technology, communication and information increases by the day. Data traffic is growing at an explosive rate. Transmission speeds need to increase in line with these trends. This calls for high performance transmission media. The response has been the worldwide adoption of fibre-optic (FO) cables Optical fibre technology has become an integral part of the networks of today. Internet access, client server applications, web hosting and data storage must be handled by the network. These need a customized system that allows maximizing the space and minimizing the time and money.

Fibre Optics in Security
The new generation intrusion detection system utilizes the unique qualities of optical fibres, lasers and high-speed computers to produce a highly effective, robust and reliable distributed sensor. Fibre optic sensing system has made it to be used in protection of pipelines fences. The system requires no power no electronics in the field to provide high fidelity detection of vibration and movement along the length of the fibre.

The cost of optical fibre technology continuing to decrease, many of today's businesses are utilizing this technology in building distribution and/or workstation applications. Optical fibre's inherent immunity to both electromagnetic interference (EMI) and radio interference (RFI), and its relatively light weight and enormous bandwidth capabilities make it ideal for voice, video and high speed.

Copper Solutions
Cat.7 is the highest performance standards compliant copper solution available in the market.

The Category 7/Class F solution provides backwards-compatible performance beyond 600MHz and features the revolutionary GG45 connector.
Cat.6 is considered as the best horizontal solution for most enterprise requirements by combining high Category 6/Class E performance for today, room for growth tomorrow, and high reliability and efficiency.

Cat.5 systems are made to the same high standards and provide all the benefits of a matched, integrated system but are intended for situations where only Category 5e/Class D performance is considered necessary.

Wireless Network (Wi-Fi Networks & Hotspots)

Center Tec is a partner with OEM'S to provide the most complete solution for WiFi solutions, ranging WLANs continue, over the past few years, to experience phenomenal growth. Today, enterprises are looking to implement Wireless LAN solutions across entire campus facilities, with requirements that include security, manageability, and flexibility with seamless roaming. Cost-conscious enterprises are looking for a simple, efficient way to extend their existing wired LAN infrastructure into the wireless environment. But they want more than connectivity. They want to provide their mobile workers with advanced tools and applications like Telephony, ERP/CRM and Internet/Email access.

The WLAN serves many environments from the simplest small office to large enterprise corporations, from educational institutions, manufacturing floors and health care environments. WLANs can be applied to just about any environment that requires seamless and effortless communication and installation. It delivers robust, high-bandwidth, long-range communication.

With its unique feature set and flexible architecture, the WLAN Series offers an enhanced user experience through true flexibility, total security, and integrated management.

Critical facility build-up

Center tec Offers the best Critical facility back-up solutions.

Surveillance and Access control systems

IP-based video surveillance is widely predicted to be the way of the future, and network cameras are now readily available – in packages, bundled together with software and support, or on their own. With most IP camera systems, all you need to do is choose where you want the cameras, and plug them in – it's that easy! The most difficult part of setting up a video surveillance system is finding the right cameras for your specific application. IP cameras come in so many varieties that choosing the right models may seem daunting. What makes one camera different from another? What kind of cameras work best for retail stores? For homes? Hospitals? How do you figure out exactly what you need?

The Center Tec Video Surveillance team is here to help. Our goal is to provide you with clear information about IP-based video surveillance. We have years of security and surveillance experience and are ready to put it to work for you.  We're dedicated to not only helping you find the best security solution, but also helping you learn more about IP surveillance technology.

Center Tec have everything you need to set up a professional video surveillance system, and we're happy to help you in your search for the ideal video security solution.

Industrial sites like factories and warehouses can benefit greatly from the security provided by video surveillance. Increased terrorism threats and theft of raw materials have made the manufacturing, storing and shipping of important goods riskier and more expensive in recent years. A smartly installed security camera system can have many benefits for your industrial site, including:

  1. Reduced theft – Prominently displayed security cameras can prevent theft from occurring and help you identify those who do steal or vandalize your property
  2. Protect employees – Video surveillance can help keep your employees safe from intruders or thieves, and also from occupational hazards like damaged equipment.
  3. Building security – IP video surveillance can help you expand your current security system. Instead of constantly watching monitors, security guards can patrol more and actively protect your building while still being able to monitor your cameras.

Advances in camera technology have made it easier to monitor your cameras and site security at any time. Modern IP (Internet Protocol) camera systems are flexible and easy to install, often only requiring you to mount the cameras and connect them to a central recorder or computer. Unlike analog CCTV cameras, IP cameras do not require complicated wiring or specialized technicians for maintenance. They can also be reconfigured at any time should your security needs change. The addition of an NVR (Network Video Recorder) to your system also allows you to broadcast your surveillance footage over the internet so you can check on any of your cameras from any internet connection – including those on many cell phones.

There are a number of factors to consider when setting up an IP-based surveillance system. Network cameras transmit data over your existing IP network, so optimizing bandwidth is important. You'll also need to think about storage: How long will footage be archived? What type of image quality do you require? Will recording be continuous or triggered by motion? Other key considerations include network security and system scalability. Putting thought into these areas before you set up your system will help to ensure that you have the right equipment and the proper game plan to fulfil your surveillance requirements.

Access control Systems
Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure. Access control is, in reality, an everyday phenomenon.

Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.

Physical access

Physical access by a person may be allowed depending on payment, authorization, etc. Also there may be one-way traffic of people. These can be enforced by personnel such as a border guard, a doorman etc., or with a device such as a turnstile. There may be fences to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence,.

In physical security, the term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human, through mechanical means such as locks and keys, or through technological means such as access control systems like the Access control vestibule. Within these environments, physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or access to certain small assets.

Physical access control is a matter of who, where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Historically this was partially accomplished through keys and locks.

Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented.

Credential
A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something you know (such as number or PIN), something you have (such as an access badge), something you are (such as a biometric feature) or some combination of these items.

Access control system components
An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier where granting access can be electronically controlled. Typically the access point is a door. An electronic access control door can contain several elements. At its most basic there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader.

Access control decisions are made by comparing the credential to an access control list. This lookup can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the lookup out from a central host to the edge of the system, or the reader.

Indoor and outdoor security solutions

Whenever an area needs to be secured, the most common solution is surrounding the area's perimeter with a fence. Many cases require for the secure area to be extended beyond the confines of the fence; that means to create an external perimeter so that the approach of an intruder will be detected well before he reaches the inner area. Proper Perimeter Security means tailoring a solution based on Virtual Fencing and Physical Fencing.

Virtual Fencing
Perimeter Security can be improved substantially by implementing a "Virtual Fence". In principle it is a combination of detecting elements based on Laser Radar and other optical means that provide for intruder detection in a zone around the secured perimeter. Virtual Fencing allows for easy and fast deployment around critical targets like airplanes, where Physical Fencing is not an option.

Virtual Fencing includes part of all of the following elements:

  • Area Laser Sensor (ALS)
  • Laser Fence Sensor (LFS)
  • Cross Line Detector (CLD)
  • Dense Laser Curtain (DLC)
  • Integrated Security System Control (SSIS)

Physical Fencing
Physical Fencing means a physical obstacle enhanced by the use of sensing elements that detect intrusion. Those elements detect the presence of an intruder by sensing his physical effect on them, which means his touch, the impact of his weight while walking, etc.

Physical security describes measures that are designed to deny access to unauthorized personnel (including attackers or even accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts. Physical security can be as simple as a locked door or as elaborate as multiple layers of barriers, armed security guards and guardhouse placement. Good physical security uses the concept of layered defence, in appropriate combinations to deter and delay intrusions (passive defence), and detect and respond to intrusions (active defence). Ultimately it should be too difficult, risky or costly to an attacker to even attempt an intrusion. However, strong security measures also come at a cost, and there can be no perfect security. It is up to a security designer to balance security features and a tolerable amount of personnel access against available resources, risks to assets to be protected and even aesthetics. There are also life-cycle sustaining costs to consider.

Physical security is not a modern phenomenon. Physical security exists in order to deter or prevent persons from entering a physical facility. Historical examples of physical security include city walls, moats, etc.

The technology used for physical security has changed over time. While in past eras, there was no passive infrared (PIR) based technology, electronic access control systems, or video surveillance system (VSS) cameras, the essential methodology of physical security has not altered over time. Fundamentally, good physical security is a combination of defensive principles designed to:

  • Deter
  • Delay
  • Detect, and
  • respond (and ultimately, deny access)

... to intrusions into critical physical spaces. The first two actions of deter and delay are considered passive defence, while the remaining are active in nature

Perimeter Security

  • Physical Airport Perimeter Security (Infrared, Chain Link, Taut Wire, Sensors)
  • Closed Circuit Television and Intelligent CCTV Systems
  • Interoperable Solutions (Command, Control and Communications Centres)
  • Fencing Systems: Includes Taut Wire, Infrared/Thermo graphic Sensing. Fencing systems determine boundaries, deter casual intruders, control access and create delays in the event of intrusion.
  • Taut Wire: Wire that is tightly wound around a fence line that signals movement or tampering.
  • Fibre Optic: Glass fibre optic cable is used in video signals that communicate between short or long run locations. It is also used in remote sensing, buried under the secure side of a barrier and can sense light movements.
  • Intelligent CCTV: Intelligent CCTC analyses specific behaviour patterns and algorithms and assesses the scene for security breaches. It possesses capabilities to alert the specific authorities’ through network systems.
  • False Alarms: No alarm stimulation.
  • Nuisance Alarms: Detection of stimuli that was not an attempt to enter the perimeter.
  • Intrusion Detection System (IDS): Set detection systems and technologies that define, observe, control, and sense entry into a secure area.
  • Access Control System (ACS): This manages various combinations of entry, exit and movement within sterile and non-protected areas. ACS is a subsystem that supports intrusion detection systems.
  • Perimeter and Access Control: This refers to simple barriers, fences, identity badges and other means of intrusion control, as well as devices that help in access control at airports.
  • Closed-circuit Television (CCTV): This refers to the video system of a collection of CCTV cameras and surveillance that act as virtual barriers and assess the situation. The use of television cameras for close scrutiny and observation allows for quick response time.
  • Volumetric Sensing: Volumetric sending monitors the physical space adjacent to fence lines for system penetration.
  • Digital Systems: Digital signal processing are used to evaluate alarms; characterized by very open architecture systems, large camera installations and a wide variety of technologies.

Bollards
Remotely activated or used in conjunction with intelligent authorization systems, automatic bollards allow the responsive, effective control of access. The rising bollard is built to withstand even the most severe attacks while being clearly visible toon coming traffic, yet visually unobtrusive. A new addition to our access control catalogue, the Rising Kerb or step barrier offers excellent protection where there could be a risk of vehicle theft or vandalism to a barrier arm. The Rising Kerb can be raised or lowered in just 2-3 seconds and is of high resistance to impact from cars or vans and provides secure and effective vehicle control.

Public address System

A public address system (PA system) is an electronic amplification system with a mixer, amplifier and loudspeakers, used to reinforce a sound source, e.g., a person giving a speech, a DJ playing prerecorded music, and distributing the sound throughout a venue or building.

Simple PA systems are often used in small venues such as auditoriums, churches etc. PA systems with a larger number of speakers are widely used in institutional and commercial buildings, to read announcements or declare states of emergency. Intercom systems, which are often used in educational institution, also have microphones in each room so that the occupants can reply to the central office.

Sound reinforcement systems and PA systems may use some similar components, but with differing application. Sound reinforcement systems are for live music or performance, whereas PA systems are for reproduction of speech and recorded music in buildings and institutions. In colloquial British English, a PA system installed for public address in a building is sometimes referred to as a tanoy system.

Small system
The simplest PA systems consist of a microphone, a modestly powered mixer amplifier and one or more loudspeakers. Simple PA systems of this type, often providing 50 to 200 watts of power, are often used in small venues such as auditoriums, churches etc. A sound source such as a CD player or radio may be connected to a PA system so that music can be played through the system.

Public address systems typically consist of input sources, preamplifiers and/or signal routers, amplifiers, control and monitoring equipment, and loudspeakers. Input sources refer to the microphones and CD Players that provide a sound input for the system. These input sources are fed into the preamplifiers and signal routers that determine the zones to which the audio signal is fed. The preamplifier signals are then passed into the amplifiers. Depending on a country's regulations these amplifiers will amplify the audio signals to 50V, 70V or 100V speaker line level. Control equipment monitors the amplifiers and speaker lines for faults before it reaches the loudspeakers. This control equipment is also used for separating zones in a PA system. The loudspeaker is used to transducer electrical signals into analog sound signals.

Large system
Public Address System consisting of amplifiers, mixers and routers for a major international airport
Some PA systems have speakers that cover an entire campus of a college or industrial site, or an entire outdoor complex (e.g., an athletic stadium). More than often this PA system will be used as voice alarm system that make announcement during emergency to evacuate the occupants in a building.

Telephone paging system
Some analog or IP private branch exchange (PBX) telephone systems use a paging facility that acts as a liaison between the telephone and a PA amplifier. In other systems, paging equipment is not built into the telephone system. Instead the system includes a separate paging controller connected to a trunk port of the telephone system. The paging controller is accessed as either a designated directory number or central office line. In many modern systems, the paging function is integrated into the telephone system, and allows announcements to be played over the phone speakers.
Many retailers and offices choose to use the telephone system as the sole access point for the paging system, because the features are integrated. Many schools and other larger institutions are no longer using the large, bulky microphone PA systems and have switched to telephone system paging, as it can be accessed from many different points in the school.

PA over IP
PA over IP refers to PA paging and intercom systems that use an Ethernet or GSM-R network instead of a centralized amplifier to distribute the audio signal to all paging locations in a building or campus. Network-attached amplifiers and intercom units are used to provide the communication function. At the transmission end, a computer application transmits a digital audio stream via the local area network, using audio from the computer's sound card inputs or from stored audio recordings. At the receiving end, specialized intercom modules receive these network transmissions and reproduce the analog audio signal. These are small specialized network appliances addressable by an IP address just like any other computer on the network.

Such systems are inter-connected by the networking infrastructure and thus allow loss less transmission to remote locations across the Internet or a local area or campus network. It is also possible to provide for multiple or re locatable transmission control stations on such a network.

Building Management System

GREEN BUILDING REQUIREMENTS
In order to fulfil the requirements of Green Building standards and initiatives, Center Tec support integration with a standard integration platform, advanced controllability, and sophisticated monitoring, measurement, verification and versatile reporting. The most important prerequisite for achieving Green Building status is the efficient functional integration of building systems. The systems will function smoothly together according to modes of the building or the space, prevailing conditions and needs/preferences of the users. The integrated operations are fully automatic, triggered by one input, having appropriate impact to all systems in the building.

Center Tec enables significantly lower energy consumption, real-time control and monitoring, and dynamic graphics according to needs. System integration creates better environmental air quality, radically improved energy performance and increased water efficiency, according to requirements of  Green Building standard and initiatives.

System integration allows for efficient system maintenance and full-scale service provisioning with radically lower cost and better quality services. Easy access to building systems will ensure that everything is in perfect condition and functions in the optimal way at all times. Should anything disturbing happen, immediate response is available. Integration will facilitate undisturbed conditions in the building and sustainable development through minimized energy consumption, first-class security and significantly lower life cycle costs.

SYSTEM INTEGRATION
Center Tec furnish and install a fully integrated Building Management System (BMS), incorporating distributed control techniques and standard open communication networks. The system is implemented as an integrated, open solution, which enables Service Center connectivity through standard Building Operating System (BOS) interface.
The integrated system includes controls and monitoring of the whole building (BMS and Security) and each room/apartment whenever applicable.
Integrated Building Management Systems include the following subsystems:

  • BMS / Building automation (cooling/heating control, ventilation control, pumps, etc.)
  • Lighting control of common areas
  • Consumption metering of water, electricity, cooling (heating) energy and gas
  • Access control system for common areas
  • Intruder alarm system for common areas
  • Video monitoring system for common areas
  • Fire alarm system
  • Central battery system

Whenever applicable, Room Controls include the following subsystems:

  • Room temperature controls
  • Lighting controls, dimming groups
  • Lighting controls, on/off groups
  • Controlled sockets, enabled/disabled
  • Curtain controls (optional)
  • Water consumption metering (optional)
  • Electricity consumption metering (optional)
  • Cooling energy consumption metering (optional)

USER INTERFACES
Systems are accessed through the Building Operating System (BOS). System must have two main user interface types – professional user interface and occupant user interface.

Professional User Interface
The system enables a client-based User Interface for professional usage and for central monitoring of systems (Service Center usage). The professional User Interface will allow for at least the following:

  • Alarm monitoring and alarm handling by multiple operators
  • Intruder alarms
  • Fire alarms
  • Alarms from electrical and mechanical systems
  • System maintenance alarms
  • Video monitoring
  • Remote diagnostics, energy optimization and trending
  • Set point adjustment
  • Control optimization
  • Peak load management
  • Trending
  • Remote diagnostics of system/devices
  • Preventive maintenance
  • Consumption reports for energy management and billing
  • Logs and reporting
  • User profile and role management
  • Access rights management

The professional User Interface is implemented as a client application, which includes an automatically adapting tree structure of the building, building’s parts, individual spaces, different systems and parts of systems. The tree structure can be used for navigation through the system. All systems connected to Building Operating System can be accessed through the same graphical User Interface. The client software can be installed to unlimited number of remote computers or laptops. The client software will allow for remote Internet usage of several sites using the same client.

The professional User Interface shows system views, floor plan views, trend view, alarm view and event log view per building and system layer. Any alarm is shown in red colour in both graphical views and tree structure. Each alarm message will include shortcut to relevant graphical system and floor plan view.

Occupant User Interface
Subsystems in e.g. meeting rooms, hotel rooms or residences is usable through a graphical browser-based occupant User Interface, using touch screen panel PC’s, tablet PC’s, IPTV, home computers, laptops, PDA’s and mobile phones. The User Interface will comply with requirements defined in the System Architecture.

The browser-based occupant User Interface is generated automatically using the structure of the building defined in the Building Information Model. The browser-based User Interface utilises latest web technologies, such as AJAX. The user interfaces will provide easy access to frequently needed functionality, such as lighting controls, temperature set point modifications, alarms, and configuration of scenes and modes of the space. The same user interface functionality is usable through any device with a browser.

The browser-based occupant User Interface allow for at least the following actions:

  • Changing the mode of the space
  • Modifying the mode settings of the controlled devices
  • Changing the set points
  • Modifying the control settings (e.g. dimming level)
  • Manual controls
  • Door controls
  • Camera views
  • Alarm list browsing

SYSTEM ARCHITECTURE
The system is implemented as an integrated, open solution, which enables Service Center
Connectivity through standard Building Operating System (BOS) interface.

The System Architecture will consist of four levels:

  • Service Level
  • Management Level
  • Control Level
  • Field Level

The system is completely modular in structure and freely expandable at any stage. Each level of the system will operate independently of the next level up as specified in the system architecture. For example, Control Level will operate independently without support from Management Level. The system is fully consistent with the latest industry standards. To enable efficient functional system integration and to provide maximum flexibility and to respond to changes in the building use, the system offered will support the use of LonWorks, Modbus, M-bus, Ethernet TCP/IP and Internet communication technologies.

Board Room Solution
  • Voice
  • Video
  • Data
  • Security
  • Electronics
  • Lighting
  • Control Systems
  • Installed Audio & Acoustics
  • Multimedia Display Systems
  • Telecom
  • IT

Top priority is to create integrated, user friendly meeting environment with the latest video and data collaboration technology.

  1. Reduce conferencing charges Audio & Video from an outside vendor.
  2. Requires a multi level maintenance free room with ease of use.

Today's Business Challenges

  1. Requires One Stop Shop Solution
  2. One infrastructure to know, buy and maintain
  3. Cost savings - Capital, personnel, training
  4. Leveraged investment for expansions and upgrades
  5. Requires an architecture that combines Products, applications & services to deliver Audio Video Integration.               
  6. Requires a Customized Fabrication
  7.  Good Acoustics & Sound Quality.
  8. Good Visibility of Images
  9. Adequate Camera Coverage
  10. Good Control System
  11. Easy to use 
  12. Requires Project Monitoring & Identification of risks
  13. Need Greater business agility for new technologies and applications

 Audio/Visual Integration Solutions

The right partner
There are many reasons why Center Tec is the right partner for your audio- visual integration requirements. However, the most important reason to choose Center Tec is the sole force that drives us is the success of our customers and their multimedia environments. Center Tec‘s all-inclusive Audio- Video Integration Solutions are based on a professional ‘A-Z ‘services so that you only have to deal with one partner. We provide solutions & services to incorporate full automation and control of all audiovisual and electronic equipment.

Innovative solutions
Over the period, we have gained expertise and experience in analyzing your specific needs and recommending the most appropriate all-inclusive audiovisual solution that suits your needs.

Cost effective, well planned systems
Center Tec's Systems Integration team is equipped to design systems, prepare specifications and CAD drawings, fabricate, install and program. Working in partnership with architects, contractors and end-users, Center Tec guides the process from start to finish.

At your service
Headquartered in Cochin, Center Tec is ready to serve you at any locations throughout the nation with  proper timely support . Our wide footprint ensures a timely response to meet your needs.

What you need, when you need it
Center Tec fully supports all systems with ost-sale service, technical support, documentation, training, repair, maintenance, and back-up inventory.

Count on Center Tec
When you require the assistance of a professional systems integrator, you can count on Center Tec‘s established reputation for dependability and professionalism.

Center Tec  design multimedia presentation and video conferencing systems for the executive boardroom. The Boardroom technology needed to adhere to a standardized platform of interface and control. Remote monitoring and control capabilities are also requirements of the system