Guard Patrol System


Guard Patrol System


The De Tag Guard Patrol System is one of the most advanced in the market incorporating RFID technology. If offers contactless scanning that is highly tamper proof and weatherproof for both the reader and the checkpoints. It also features a comprehensive reporting system incorporated in the proprietary computer software. Apart from security guard patrolling, the De Tag Guard Patrol System can also be used by maintenance staff, delivery and collection personnel, area supervisors, golf club marshals and others. De Tag has installed this system in amongst others one of the biggest shopping malls in Malaysia, numerous renown mixed development projects, office towers, hotels, condominiums, schools, hotels, factories etc.

{{brizy_dc_image_alt imageSrc=

Reader

Guards will carry this RFID enabled device for clocking during patrol.

{{brizy_dc_image_alt imageSrc=

Checkpoint

Guards scan these RFID enabled chips that is installed strategically around your building forming the patrol route.

{{brizy_dc_image_alt imageSrc=

Guard ID

Each guard scans his personal ID tag prior to patrolling. This allows many guards to share 1 reader.

{{brizy_dc_image_alt imageSrc=

Communication Base Station

This base station is used to transfer data from the reader to the computer. It is connected wirelessly to the reader and connected by USB to the computer.

{{brizy_dc_image_alt imageSrc=

Software

The user friendly software will analyse and report the information of the patrol. It will effectively summarize the report according to the planned patrol route for quick and easy reporting.

{{brizy_dc_image_alt imageSrc=

System Features

Readers are housed in aluminium steel body with rubber moulding making them robust, weather proof and shock resistant.

Readers come with long battery life of around 1 year. Batteries are replaceable once batteries run out

High capacity data storage in reader up to 30,000 scans.

Checkpoints are highly tamper resistant and weather proof.

Checkpoints require no power hence require no maintenance.

User friendly patrol analysis by patrol software.

Checkpoint Installation Method

01
{{brizy_dc_image_alt imageSrc=

Location of checkpoint determined and wall will be drilled to prep the checkpoint installation.

02
{{brizy_dc_image_alt imageSrc=

Checkpoint is embedded into the wall ensuring that it is tamper resistant

03
{{brizy_dc_image_alt imageSrc=

Wall is plastered up to make sure checkpoint is secure and weatherproof

04
{{brizy_dc_image_alt imageSrc=

A signage is installed to indicate the location of the checkpoint for the guards to clock in

Software Screenshots

Map Report


{{brizy_dc_image_alt imageSrc=

Software Screenshots

Shift Report


{{brizy_dc_image_alt imageSrc=

Software Screenshots

Patrol Details


{{brizy_dc_image_alt imageSrc=

Software Screenshots

Basic Report


{{brizy_dc_image_alt imageSrc=
Scroll to Top