CCTV

Closed Circuit Television, more commonly known as CCTV, is essentially a network of cameras and recording equipment that are all directly linked. ... Any camera that broadcasts a signal can be attached to a CCTV system, whether it's wired or wireless, but they are most often associated with high-end surveillance cameras.

Access System 

is a security technique that regulates who or what can view or use resources in a computing environment. ... Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.

Anti Virus

Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks.

Data Loss Protection

Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. ... DLP also provides reporting to meet compliance and auditing requirements and identify areas of weakness and anomalies for forensics and incident response

IP CCTV

at SMI  we believe IP cameras are the future of security camera technology. We rigorously test and review each IP camera model we sell to ensure it performs to specifications, and is easy to integrate with our network video recorders. 

Most network cameras we sell have PoE connectivity built-in, making them easy to use with any NVR with built-in PoE switch. . Although there are several advantages to using IP security cameras, the main ones are 1) resolution support beyond 2K, and 2) easy connectivity with CAT5e or better network cabling. 

For customers looking to build a future proof security cameras system, IP cameras are the best choice. Be sure to browse through our selection of IP camera systems, especially our 4K security camera systems which feature the best resolution cameras money can buy combined with our professiona

IP CCTV 
Network Video Recorder

The use of IP CCTV is inseparable from Storage HD for a place to store video data that has been recorded.

The amount of Storage will increase depending on the length of time CCTV data is stored in HD and the number of cameras used.

The more cameras and the longer the storage will require large data, therefore sometimes the NVR can be replaced with a Storage Server that has a large capacity.

Access Control 

Access control system provides security by giving flexible control over who is allowed to enter your premises.Access control system is one of the most common used system in electronic door control using a card or a magnetic stripe which can be accessed by swiping through a reader on the door. 

These access control systems are used for security purposes.The areas or organizations which require high security use different types of access control systems like bio metric, RFID, door controllers and card readers etc. 

Each access point may be controlled individually as per the requirement of company or organizations where high security is necessary. Network security is also important, especially in a company which handles sensitive data.

Biometric Access Control System

The Bio metric Access Control System is a time attendance control system with fingerprint access and it tracks and records data of Visitors and Employees through its Access Software. 

This is widely used in confidential places for its easy installation and high security.


Finger Print AccessBio metric Access Control System uses fingerprint instead of card system for access. The Access Control System not only permits entry but also gives the data regarding the entry of persons. 

The Attendance Software can be integrated with any existing payroll software and it gives automatic record of information generated by the Attendance System and this saves time and resources in recording. It increases productivity and profitability for any organization.

Proximity Control System

The proximity access control system is more confidential access control system. It ensures a safety environment and it is widely used in office, factory, bank, etc.. There are about 50 kinds of time zone settings and 5 open door groups..

Proximity with Door Access System

Access Control Door opening/closing System is a compact, low cost, standalone. It is ready to use, easy to install device. Any electrician can install it with electromagnetic lock with simple instructions provided. It is widely used in Offices, Server rooms, Homes, Airports, Defense, Data centers etc.


Access control systems within a building may be linked or standardized based on the size of the organization and the varying levels of security. It is suitable for homes, offices and other access control applications. 

Access control systems were typically administered in a central location. Besides electronic door locks, there are access control panel models, magnetic door locks with uninterrupted power supplies.

Door Access Control System An administrator grants access to a person with the settings built inside the administration software and a key which opens all of the doors in a building in a door access control systemand these update the information within the system and each user being given a unique identity.

Brand 

SMI have many experiance CCTV and access system for many type of industry such as : Government, Hospitality, Military , Manufacturing and education. 

We work with many famous brand in the world as follow : Hikvision, Dahua, Axis, Bosch, Panasonic, Sanyo, Amtek and many more. 

We deliver full solutions of security system to our customer . 

Viruses

 helps block harmful software that replicates itself and spreads itself to other devices.

Worms

 helps block malware that replicates itself without using a host file (unlike viruses, who use a file).

Malware

has defenses for various types of malicious software, including viruses, Trojans, worms, etc.

Ransomware

elps protect against malware that encrypts a computer’s contents and then demands a ransom to restore them.