Menú

Security systems

Experts in the sector

PHOENIX, approved by the Ministry of Interior and the Ministry of Defense, specializes in the installation of advanced security systems. Our portfolio includes access control to facilities, indoor and outdoor CCTV cameras, intrusion detection systems, anti-theft systems, and security centralizations (control centers), essential for efficient remote monitoring.

With a vast experience in equipment installation, an agile and reliable supply chain, and a service-oriented structure, PHOENIX guarantees the delivery of projects on time, with the agreed quality and budget. Our competence covers all critical areas of engineering, material supply, labor and documentation.

Quality and Guarantees
We are committed to providing the highest quality and warranties, in some cases, even for life.

Our services are centered on one slogan:

 “On Date, On Budget, No Surprises”.We adapt flexibly to our clients' needs, creating coherent and efficient project teams. Our technical sales representatives, project managers and site managers have extensive experience in the implementation of security technologies of all sizes and respond efficiently to the inevitable changes in each project.

Access Control Systems

An access control system is essential for security, managing the passage of people, objects or vehicles in protected areas. PHOENIX advises its clients in the selection, implementation and maintenance of access control policies (CCAA) and presence control (CCPP), facilitating the management of personnel in corporate headquarters.

What do access control systems consist of?

Any access control system will consist of four basic elements. Depending on the size and purpose of the system, there may be many additional types of devices. However, the four basic elements are:

  • Cards. Any credential/access card has a set of binary numbers (ones and zeros) engraved on it that are used to identify the cardholder. PHOENIX manages the manufacture of cards that are capable of carrying this type of binary data, including:
    • Magnetic Stripe Cards.
    • Wiegand Stripe (contact) Cards.
    • 125 kHz proximity cards.
    • 13.56 MHz smart proximity cards.
    • Virtual credentials for storing on mobile devices.
  • Readers (possibly equipped with keypads). Each type of reader uses its own technology to read the data from the cards. All readers are capable of converting that data to transmit it to the controller.
  • Access control panels (controllers). When the controller receives data from the reader, its internal software or firmware initiates the process to decide whether access is granted or not. The controller is the only device in the system in which the binary format of card data can be decoded and acted upon. Only the controller (and possibly the server) is aware of the composition of the format and whether the received data makes sense.
    • The card itself has no knowledge of the composition of its format, nor is it aware of the access privileges for the cardholder. That information exists only in the controller, and possibly in the server (if it is connected ON-LINE).
  • The operator interface: the Server PC. All access control systems have some type of server or PC program for operators to use.

What is MOBILE ACCESS?

  • For access control purposes, a credential can be thought of as a physical device that is presented to the system (the reader) by a user, for the purpose of proving a claimed identity. As credential technology continues to evolve, it is important to make a distinction between the physical credential, such as a plastic card with an RFID chip, and the digital credential, which is the identification data loaded onto that chip.
  • This digital credential is what provides the proof of identification. The purpose of the physical credential is simply to carry that digital credential and protect it from being copied or tampered with.
  • Physical credentials come in more and more different formats and sizes. This is what we call the form factor. The credential is no longer just an ID card. It can be a phone, a fob, a wristband, or a smartwatch. Likewise, the credential will not always communicate via RFID. It can communicate with the reader via Bluetooth®, WiFi, or some other communication protocol that has not yet been invented.
  • At PHOENIX we provide our clients with access credentials that can be carried on iOS devices (from the iPhone 4S) and Android (from models with version 4.3 with Bluetooth 4, such as the SAMSUMG III, for example).

The user experience of Mobile Access access control is the most streamlined ever experienced by the user of this type of system.

Lathes and passage control elements

Tripod turnstiles or half-height turnstiles and rotating turnstiles are one of the most effective formulas for controlling the passage of people.

Motorized corridors or security doors guarantee the unique passage of each person. By combining the technologies available at PHOENIX for identification and access control, such as Mobile Access, together with turnstiles and turnstiles, we allow our clients to have total control for the management of people in a facility.

Passage control has become a necessity for many facilities. The solutions we offer are practical, simple and effective. Additionally, we have the capacity to adapt and customize the machining to the corporate image of our clients.

CARD PRINTERS

Printing & Manufacturing
of Plastic Cards

We are distributors of the best brands of plastic card printers on the market and SW for personalization and printing. We work with manufacturers to advise you at all times on the card printer that best suits your needs.

We are specialists in the manufacture and creation of plastic credential designs. Our systems allow cards to be personalized following the guidelines set by the client, with different finishes and reading and recording technologies.

Magnetic stripe cards, contact chip, proximity in 125 KHz, 13.56 MHz or even UHF or other frequency ranges.

Credentials in keychain format, adhesive tags, bracelets or traditional cards, both the standard CR-80 format (credit cards) and in other less common formats.

 

Do I Need a Printer
When Using Virtual Cards?

When the company makes the decision to migrate to the Mobile Access model, the plastic card that we carry in our wallet, or hanging from our neck (according to the building's security regulations)… DISAPPEARS.

This creates a series of collateral effects that result in cost savings on card printers, printing supplies, lanyards, card holders, etc… Very important in some organizations that spend on all these accessories on a recurring basis due to the loss or deterioration of plastic cards.

In many environments the model is mixed, the user is allowed to have their own Mobile Access credentials on their phone while being allowed to carry the classic plastic card hanging from their neck, or with a clip or yo-yo hanging from their pants.

But of course, one day we forget the access card at home… and well, nothing happens. Another day we forget the mobile phone and…. We all know that we go back for it.

INTRUSION DETECTION SYSTEMS

Intrusion Detection and Alarms

At PHOENIX, we understand that the security of your space is a top priority. That’s why we offer intrusion detection systems designed to provide an early warning of any unauthorized presence. Our systems are equipped with advanced technology including:

  • Advanced Two-Way Control Panels: These control panels allow for efficient and secure communication between sensors and the control center, ensuring that all alarm signals are received and processed accurately and quickly.
  • Dual and Triple Technology Detectors: Equipped with microprocessors, these detectors validate alarm signals before transmitting them, thus reducing false positives and ensuring that each alert is genuine.
  • Alarm Receiving Centers (ARC): Our ARCs are equipped with innovative features that enhance the intelligence and reliability of the system, allowing for rapid and effective intervention.

The constant evolution of these systems has significantly improved their ease of installation and operation, as well as their cost-effectiveness. Today’s users demand solutions that are not only effective, but also intuitive and easy to use. At PHOENIX, we meet and exceed these expectations, providing intrusion detection solutions that integrate the latest in technology and design.

CCTV SYSTEMS

Analog and IP Systems

Technological development in the field of CCTV has transformed the way these systems are implemented and used. At PHOENIX, we specialize in offering both analog and IP solutions, adapting to the specific needs of each client:

  • Analog Technology: Ideal for existing installations that require updating without a complete system renewal. Analog systems offer an economical and reliable solution.
  • IP Technology: Provides superior image quality and greater integration capabilities. IP systems allow real-time monitoring and more flexible and advanced management.

The demand for CCTV systems has increased significantly in sectors such as banking, shopping centers, public administrations and business centers. PHOENIX has positioned itself as a leader in this field thanks to its focus on specialization and quality. Our projects are custom designed, ensuring that each installation meets the client's specifications and needs.

SECURITY IN HOTELS

We come to stay

Hotel security presents unique challenges that require innovative and adaptable solutions. At PHOENIX, we have developed a full range of products and services specifically designed for the hotel sector, both for new constructions and renovations:

  • Guest Identification: We implement automatic document recognition systems (ID, passports) to streamline and secure the check-in process.
  • Mobile Access: We facilitate access to rooms and common areas through mobile devices, offering convenience and security to the guest.
  • CCTV and Intrusion Detection Systems: Our advanced surveillance and detection systems guarantee security in all areas of the hotel.
  • Energy Savings: Solutions that optimize energy use, reducing operating costs and improving energy efficiency.
  • Safes and Parking Management: We provide secure solutions for the protection of valuable belongings and efficient parking management.

Our professionals are available to offer advice, support and technical assistance throughout the country, ensuring that each project is executed with the highest quality and efficiency.

SYSTEMS INTEGRATION

Security Systems Integration

La complexité de la gestion simultanée de plusieurs dispositifs de sécurité peut être écrasante. L’intégration des systèmes de sécurité est essentielle pour optimiser le fonctionnement et améliorer l’efficacité. Chez PHOENIX, nous proposons des solutions d'intégration qui agissent comme le cerveau opérationnel de la gestion automatisée :

  • Centralisation des services : Nos plateformes permettent de centraliser tous les systèmes de sécurité sous une seule interface, facilitant ainsi la supervision et le contrôle.
  • Automatisation intelligente : le logiciel croise les informations provenant de divers sous-systèmes, filtrant les événements et déterminant automatiquement les situations nécessitant une attention particulière.
  • Optimisation de l'opérateur : en réduisant le nombre d'écrans et d'appareils que l'opérateur doit surveiller, nous améliorons la rapidité et la précision de la réponse aux incidents.
  • Visualisation en temps réel : Notre système marque l'origine des événements dans la planimétrie configurée, affichant des images en temps réel si nécessaire.

Grâce à nos solutions, les opérateurs peuvent se concentrer sur moins d'éléments, répondant plus rapidement et plus efficacement aux événements de sécurité.

INSPECTION AND MAINTENANCE OF FACILITIES
Preventive and Corrective Maintenance

The longevity and efficiency of security systems depend largely on proper maintenance. At PHOENIX, we offer inspection and maintenance services that ensure the optimal operation of all installations:

  • Periodic Inspections: We carry out regular inspections to identify and solve problems before they affect system performance.
  • Preventive Maintenance: Our preventive maintenance strategies are designed to minimize the risk of failure and prolong the life of the equipment.
  • Corrective Maintenance: In the event of any breakdown or malfunction, our team of qualified technicians responds quickly to carry out the necessary repairs.
  • System Updates: We offer update services to ensure that all systems are kept up to date with the latest security technologies and regulations.
  • Continuous Technical Support: We provide continuous technical support to resolve any questions or incidents that may arise, guaranteeing the peace of mind of our customers.

Our commitment is to keep your security systems operational and efficient, providing a reliable service that protects your investment and guarantees ongoing security.

Do you need information?

Leave us your details and we will contact you as soon as possible. Do not use this form to send resumes. Thank you

Get in touch

Location

C/Travesía Industrial, 149 4 A 1
08907 L'Hospitalet de Llobregat

La comunicación enviada quedará incorporada a un fichero del que es responsable Phoenix Vigilancia y Seguridad SA Esta comunicación se utilizará exclusivamente para tratar sus datos para atender su solicitud, y las conservará mientras se mantenga esta relación, siempre de acuerdo al Reglamento (UE) 2016/679 (RGPD), y demás normativa complementaria vigente sobre protección de datos. Sus datos no se comunicarán a terceros, excepto por obligación legal, y se mantendrán mientras no solicite su cancelación. 

En cualquier momento usted puede ejercer los derechos de acceso, rectificación, portabilidad y oposición, o si procede, a la limitación y/o supresión del tratamiento, comunicándolo por escrito, indicando sus datos personales a C/ Travesía Industrial, 149 4 A 2, 08907, Hospitalet de Llobregat, L', (Barcelona) o mediante un email a info@phoenix.es