<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Suntech SARL &#8211; Site web officiel</title>
	<atom:link href="https://suntechsarl.com/en/feed/" rel="self" type="application/rss+xml" />
	<link>https://suntechsarl.com/en/home/</link>
	<description></description>
	<lastBuildDate>Sun, 26 Feb 2023 22:17:44 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://suntechsarl.com/wp-content/uploads/2022/12/cropped-cropped-cropped-logo-2-32x32.png</url>
	<title>Suntech SARL &#8211; Site web officiel</title>
	<link>https://suntechsarl.com/en/home/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>detection &#8211; fire</title>
		<link>https://suntechsarl.com/en/detection-fire/</link>
		
		<dc:creator><![CDATA[Daryl Noupik]]></dc:creator>
		<pubDate>Wed, 08 Feb 2023 21:38:13 +0000</pubDate>
				<category><![CDATA[Non classé]]></category>
		<guid isPermaLink="false">https://suntechsarl.com/?p=8971</guid>

					<description><![CDATA[A Fire Detection System ensures the detection of a phenomenon linked to the development of a fire. The signal locates it and [&#8230;]]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="8971" class="elementor elementor-8971">
									<section class="elementor-section elementor-top-section elementor-element elementor-element-936a9bd elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="936a9bd" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7f2d82" data-id="f7f2d82" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
								<div class="elementor-element elementor-element-3cd61af elementor-widget elementor-widget-text-editor" data-id="3cd61af" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
			<style>/*! elementor - v3.10.0 - 09-01-2023 */
.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}</style>				<p>A Fire Detection System ensures the detection of a phenomenon linked to the development of a fire. The signal locates it and sends this information in order to activate the appropriate commands while avoiding issuing unjustified alarms. The automatic fire detection system includes at least the automatic fire detectors and the control and signaling equipment (ECS).</p><p><br />Our fire solutions include :</p><ul><li><strong>Fire detection system</strong></li><li><strong>Fire safety system</strong></li><li><strong>Fire safety system</strong></li></ul><p>The purpose of the alarms provided is to warn all the occupants of the premises or buildings concerned and to provoke evacuation. It can be delivered manually by a supervisor or automatically.<br />The automatic detector is composed of a sensor monitoring a chemical phenomenon resulting from a fire, and which provides a corresponding signal to the ECS.</p><ul><li><strong>Heat detector</strong></li><li><strong>Standard/optical smoke detector</strong></li><li><strong>Flame detector</strong></li><li><strong>Thermo velocimetric detector</strong></li><li><strong>Gas detector</strong></li><li><strong>&#8230;</strong></li></ul><p><strong>WHICH FIRE SAFETY SYSTEM FOR MY COMPANY ?</strong></p><p><br /><strong>The health and protection of employees, staff and the public are paramount. This is why the implementation of a fire safety system must be truly thought out</strong>. For this reason, the labor code requires establishments and companies to install a fire safety system according to a very precise standard. It is a question of making the fire detection and fire fighting equipment interact with provisions including :</p><p><br />&#8211; <strong>Smoke detectors</strong>: mostly used as prevention tools, smoke detectors signal any anomaly (start of fire, flames, smoke cloud, heat source) to the central unit. If a problem is detected, the evacuation alarm will be triggered. As far as their installation is concerned, it is recommended to have them in the corridors of the ERP and if possible in each room.</p><p><br />&#8211; <strong>Smoke extraction</strong>: this is a system in its own right since it allows smoke and hot gases to be evacuated quickly. Smoke extraction is an interesting system because it can facilitate the evacuation of people and contributes greatly to the safety of the building.</p><p><br />&#8211;<strong> Carbon monoxide detectors</strong>: the protection of the public also involves the prevention of carbon monoxide levels in the premises. This odorless, colorless molecule can be fatal to humans in case of high concentration. For that, detectors can be set up. They detect excessive levels of carbon monoxide and signal them to avoid intoxication of visitors.</p><p><br />&#8211; <strong>Compartmentalization</strong>: when a fire occurs, the compartmentalization (also called partitioning) plays a crucial role because it delays and limits the spread of flames. Several equipments can be installed such as fire doors or curtains and smoke dampers or shutters.</p><p><br />&#8211;<strong> Evacuation of persons:</strong> when the fire alarm sounds, employees and all persons in the workplace must have access to the emergency exits. The employer must then ensure that they are always accessible, lit and known by the employees. Normally, the emergency exits are supposed to be automatically unlocked in case of fire risk.</p>						</div>
				</div>
					</div>
		</div>
							</div>
		</section>
							</div>
		]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WHY USE AN ACCESS CONTROL SYSTEM INSTEAD OF KEYS?</title>
		<link>https://suntechsarl.com/en/why-use-an-access-control-system-instead-of-keys/</link>
		
		<dc:creator><![CDATA[Joress BADIENGUISSA]]></dc:creator>
		<pubDate>Sun, 05 Feb 2023 11:34:36 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://suntechsarl.com/?p=8694</guid>

					<description><![CDATA[Using a physical key is the easiest way to control access to a door, and the most common method used by many [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Using a physical key is the easiest way to control access to a door, and the most common method used by many small organizations. However, even for a small business, using mechanical keys has several flaws and limitations, especially for growing businesses:</p>



<ul>
<li><strong>People lose their keys:</strong> If someone loses a key, then you need to replace the entire lock to ensure that the lost key cannot be misused.</li>



<li><strong>Keys leave no trace in a registry:</strong> You can&#8217;t tell if and when someone used a key. Therefore, you don&#8217;t know who entered a location and at what time.</li>



<li><strong>Keys are difficult to manage</strong>: If a person needs to enter multiple buildings and rooms, they will need a large number of keys, which are inconvenient to carry and use. It can be difficult to remember which key corresponds to which door, and it is too risky to label them.</li>
</ul>



<p>By using an electronic access control system, you can avoid the inconvenience of using mechanical keys and improve access control</p>



<p>An electronic access control system will be able to handle the following:</p>



<ol type="1">
<li><strong>Who has access to a location?</strong></li>
</ol>



<p>For example, you can allow automatic access only to employees, while visitors and contractors will have to go to the reception desk upon arrival.</p>



<ol start="2">
<li><strong>What doors do they have access to?</strong></li>
</ol>



<p>You may want only certain people to enter certain areas. For example, only technicians should be allowed in technical rooms.</p>



<ol start="3">
<li><strong>At what time is it possible to access a location?</strong></li>
</ol>



<p>Subcontractors and junior staff may only have access to a location during their normal working hours, while more senior staff may enter the buildings at any time.</p>



<ol start="4">
<li><strong>Under what conditions is it possible to access a place?</strong></li>
</ol>



<p>For example, you can configure your system so that contractors are only allowed to access a location if accompanied by a pre-approved member</p>



<p>A good access control system allows you to define these settings on an individual basis, or on a group basis. You can update them quickly and easily at your convenience. It will also tell you who accessed where and when, so that if an incident occurs, it&#8217;s easier to determine who might be involved.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MANY IDENTIFIERS FOR ACCESS CONTROL SOLUTIONS!!!</title>
		<link>https://suntechsarl.com/en/many-identifiers-for-access-control-solutions/</link>
		
		<dc:creator><![CDATA[Joress BADIENGUISSA]]></dc:creator>
		<pubDate>Sun, 05 Feb 2023 11:29:21 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[control]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[solutions]]></category>
		<guid isPermaLink="false">https://suntechsarl.com/?p=8688</guid>

					<description><![CDATA[Access badges are still the most common identifiers used in access control systems. You present your badge to a reader and, if [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Access badges are still the most common identifiers used in access control systems. You present your badge to a reader and, if all the conditions stored in the system are met, you are allowed to enter.</p>



<p>However, there are alternatives to badges and some offer higher levels of security.</p>



<p>The primary methods of identification are as follows:</p>



<ul>
<li><strong>An object you own,</strong> such as an access badge, or other type of identifier.</li>



<li><strong>Information you know</strong>, such as a PIN or password.</li>



<li><strong>One aspect of your identity</strong>: your biometric identifiers, such as your fingerprints or iris</li>
</ul>



<p>Each method of identification has advantages and disadvantages, so the method you choose depends on the situation. And it&#8217;s entirely possible to choose one method for the exterior doors of your building, for example, and another for the interior doors.</p>



<p>You can also combine two identification methods to improve security standards. This is called verification: you use theThe first method is to identify you and the second is to verify that it is you. Thus, for a trapeze containing valuable material, you can ask people to use their access badge to identify themselves and then provide a PIN code or present their fingerprint for verification.</p>



<ol type="1">
<li><strong>Improve efficiency through integrations</strong></li>
</ol>



<p>When it comes to deciding who has access to what, different departments are usually involved. These may include Human Resources, Facilities Management and IT, in addition to security. Often these departments have their own systems that operate independently of each other. This is often inefficient and can lead to errors that present significant security risks.</p>



<p>For optimal security and efficiency, all systems must be aligned. An access control system that has the ability to integrate with other systems can bridge the gap between them all.</p>



<ol start="2">
<li><strong>An online access control system</strong></li>
</ol>



<p>It works with an online dashboard, which allows you to log in from anywhere to control and monitor access rights. To add more functionality to your system, simply select additional options in our access control software.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
