top of page
Support
Tutorials, How-To, Instructions & Training
Customer Downloads
ULTRASYNC ALARM SYSTEM
Play Video
Play Video
01:45
Central Jersey Security Cameras
Adding Users to an UltraSync Alarm App
A quick how-to on adding users to your Ultrasync Alarm app.
Play Video
Play Video
01:44
Interlogix Security
How to Arm Away, Arm Stay and Disarm the UltraSync System
In this video we will cover the basic system operations of an UltraSync system. We’ll start with arming the system in the Arm Away mode. From the Overview screen select the Arm Away icon. This initiates the arming sequence and the hub will provide an audible beep indicating that the countdown has started. Selecting the Arm Away icon a second time will silence the audible beep and will allow the countdown to continue. To arm the system in the Arm Stay mode, select the Arm Stay icon. This will initiate the arming sequence. There is no audible beep when arming in the Stay mode. Selecting the Arm Stay icon a second time will set the system so that it immediately goes into alarm when a sensor is activated. To disarm the system, simply select the Disarm icon. This will immediately disarm the system. System arming and disarming can also be done from the Sensor screen. If a sensor is in the open state your system will indicate that it is “Not Ready to Arm”. You will need to either close the sensor or bypass the sensor before the system can be armed. Bypassing a sensor is done from the Sensor screen. The sensor that is open will appear at the top of the list. Simply select the Bypass icon and the system will then be “Ready to Arm”. The sensor will remain in the Bypass mode until you reset the sensor by selecting the Bypass icon a second time. It’s important to note that when a sensor is in the Bypass mode, the system will not go into alarm if that sensor is activated.
Play Video
Play Video
01:25
Interlogix Security
How to Connect the Interlogix UltraSync Hub to the Homeowners Wi-Fi
This is how to connect the Interlogix UltraSync hub to the internet using the homeowner's Wi-Fi network. Note that connecting the Hub to a Wi-Fi network is not necessary if it is connected directly using an Ethernet cable. From the browser, go to Menu and select Settings. Under Settings Selector, use the drop-down menu to select “WiFi Setup”. Next, select “Scan for Wireless Networks” and choose the homeowner's network. Be sure to wait until scanning is complete before you make this selection. Once the network has been selected, ask the homeowner to enter their Wi-Fi password, then select Okay. When the network has successfully connected, a notification will be shown. Now, let's confirm the Hub connection to the Wi-Fi network. It is advised to wait a couple of minutes before going through this step since it takes the Hub some time to establish an internet connection. The following steps are completed using the keypad on the Hub. Press menu, 8 and your installer code. Press Enter and then 6. The IP address will then be announced. If no IP address is found wait a couple more minutes, then press 6 again to see if the IP address is announced. If the IP address is not found or is announced as “192.168.1.3”, restart the Wi-Fi setup process.
Play Video
Play Video
00:58
Interlogix Security
How to View System Event History in Your UltraSync + SmartHome App
In this video we will show how to view the system’s history. From the Overview screen, select the MENU icon. Then select History. An unfiltered list of system events will be displayed. Swiping the screen upward reveals the system event history. If you’d like to filter the event history by date or event type, select the Filter icon. To set a start date by which you’d like to filter events, select the circle next to the “Start From Date”. Then enter the desired date. Selecting Done will apply the date filter. To filter by event type, select the event type you’d like to view. Then select Done. Once a filter has been applied, you may update the filter specifications by reselecting the Filter icon.
KEYSCAN AROURA
Play Video
Play Video
00:56
dormakaba Americas
Keyscan Aurora - Creating card templates
Keyscan Aurora comes equipped with a sophisticated platform designed to allow you to create your own high quality card design templates for use with ISO graphics quality card credentials. You can create a number of templates for employees, visitors, contractors and any other categories you wish. You can enter person fields, credentials fields and optional fields all to appear on the card. When finished, Aurora can send these to print on any dye-sublimation card printer.
Play Video
Play Video
01:00
dormakaba Canada, Whitby
Keyscan Aurora - Group setup
Setting groups using Keyscan Aurora is also a simple task. Groups are a convenient way to set access permissions for a group of individuals such as Executive staff or departmental staff. Keyscan Aurora allows any credential holder to be included among ten different groups each with differing access permissions.
Play Video
Play Video
01:32
dormakaba Canada, Whitby
Keyscan Aurora - People Management
Aurora introduces a new 'People-Centric' methodology for access control system management. This new interface simplifies database creation and maintenance by assigning credentials and permissions to the person. Aurora now provides the ability to upload and attach multiple photos for easy reference, all within a person's profile. Aurora also provides an unlimited number of optional user-defined fields to record more information. Persons can also have multiple credentials assigned to them within a single profile and they can be assigned for up to ten access groups. In addition, site permissions, visitor management, photobadging and live transaction logging are all viewed or managed from a single convenient screen.
Play Video
Play Video
01:01
dormakaba Canada, Whitby
Keyscan Aurora - Reporting
Keyscan Aurora is built with multiple and robust reporting options for site or system-wide transactions, reader access, people and group status, scheduling, report generation options and many more. Sharing reports is made easier with a number of export file formats to choose from.
PRO DATA KEY (PDK)
Play Video
Play Video
02:27
ProdataKey
Adding Groups & Rules
How To Series - How to Add Groups & Rules. In this series we will be discussing how to use Prodatakey's Mobile Access Control. Creating groups helps provide schedule building. You want to essentially use this tool to assign rules to multiple users within your system who have the same schedules or permissions. Follow along to understand the best ways on how to utilize this group and rules feature in the PDK app. Subscribe and Follow us in our other social platforms for more content! Website: https://www.prodatakey.com/ Instagram: https://www.instagram.com/prodatakey/ Facebook: https://www.facebook.com/prodatakey/ Twitter: https://twitter.com/ProdataKey LinkedIn: https://www.linkedin.com/company/prodatakey/ PDK Access control - Anytime. Anywhere. Any Device.
Play Video
Play Video
02:52
ProdataKey
Adding People & Credentials
How To Series - Adding A Person In this series we will be discussing how to use Prodatakey's Mobile Access Control. Adding a person is as easy as it sounds! With adding a person to your access control system, you would be able to develop credentials and apply who you would like to give or deny access on certain doors. Follow along to understand how to add a person and learn the various techniques you could utilize within the PDK app. Subscribe and Follow us in our other social platforms for more content! Website: https://www.prodatakey.com/ Instagram: https://www.instagram.com/prodatakey/ Facebook: https://www.facebook.com/prodatakey/ Twitter: https://twitter.com/ProdataKey LinkedIn: https://www.linkedin.com/company/prodatakey/ PDK Access control - Anytime. Anywhere. Any Device.
Play Video
Play Video
00:39
ProdataKey
Touch io by ProdataKey
With Touch, we challenged the status quo by creating a device that enhances user experience while upholding the greatest level of security. Fumbling with your phone or unintentional door opening is now a thing of the past.
Play Video
Play Video
02:24
ProdataKey
Pdk & DW Integration: Soft Trigger Creation
Learn more at https://www.prodatakey.com/
Play Video
Play Video
00:57
ProdataKey
Touch App by pdk - NOW AVAILABLE!
Download the app at https://www.prodatakey.com/touch-app
UniView
Play Video
Play Video
02:11
Uniview
How to use EZView to register account and add devices
Play Video
Play Video
03:35
EZstation Payback
EZstation Playback Instructions "Smart Playback" Find What you need fast and save it.
Alarm.com
Play Video
Play Video
00:50
Alarm.com
How to Enable Alarm.com Push Notifications for Your Phone
When there’s important activity at your home, Alarm.com lets you know with a smartphone alert. To get these alerts from your security system, you’ll need to enable Push Notifications first. Here’s how to do it.
Play Video
Play Video
01:47
Alarm.com
How to Set Up an Alarm.com User Code (Mobile App)
Creating access codes to your security system might seem like a daunting process, but with Alarm.com – it’s just a few simple steps! Simply login to your mobile app or website to grant schedule-based access to all users for your home or business. Check out this video to learn how to get started via the Alarm.com Mobile App. To learn how to create user codes via the Alarm.com Customer Website, visit https://youtu.be/sX9OWDPt0pw.
Play Video
Play Video
01:28
Alarm.com
How to Set up an Alarm.com Arming Reminder (Mobile App)
Did you arm your security system this morning? Are you absolutely sure? Here’s how to set up an Alarm.com arming reminder using your mobile app so that you’ll never feel that doubt again. (For web dashboard instructions, see: https://youtu.be/qLqfZ_ZJ5ts)
Paxton Access
Play Video
Play Video
02:11
Paxton UK
Net2 Software - Managing Users
A valuable tool to help you keep track of staff hours and keep HR processes smooth and simple.
Play Video
Play Video
03:02
Paxton UK
Net2 Software - Adding Users
Learn how to add new users to your Net2 system.
Play Video
Play Video
02:00
Paxton UK
Net2 Software - Timezones and access levels
Control the movement of people around the building by setting timezones and access level permissions that are automatically activated during pre-set periods.
Play Video
Play Video
02:18
Paxton UK
Net2 Software - Anti-Passback
Prevent unauthorised users from sharing tokens by setting restrictions within the software. This prevents the same token being used more than once to gain access.
Play Video
Play Video
03:30
Paxton UK
Net2 Software - Restricting Access Permissions
Learn how to restrict users access permissions in the Net2 software.
Keri Systems
Play Video
Play Video
03:46
Keri Systems
Time Schedules
Play Video
Play Video
02:14
Keri Systems
Access Groups
Play Video
Play Video
03:14
Keri Systems
Assigning an Auto Unlock Time Schedule to a Door
Play Video
Play Video
01:11
Keri Systems
Doors.NET - Cardholders De-activate - Quick How To
This video explains how to de-activate cardholders in the Doors.NET software.
"When you entire system goes down you're going to want Revelations there to restore it."
-Patricia Williams-
ABOUT
CONTACT US
SOLUTIONS
SUPPORT
FINANCE
More...
Use tab to navigate through the menu items.
bottom of page