Feature Enclosure hardware
Concealed hardware – the ultimate solution
If an enclosure is to be installed outdoors, not only does it need to protect against the climate, but it will need to ensure resistance against vandalism. Concealed hardware from EMKA can provide the answer
T
echnology is spreading onto our streets to deal with the growing need for traffic and utility con- trol, as well as for greater digital interconnectivity. As a result, the needs of telecommunications pillars, energy distribution cabs, electronic equipment housings and outdoor monitoring or control stations, to name just a few, call for new thinking. To meet these demands, EMKA offers concealed systems that not only have protection up to IP65 but also ensure a high level of resistance to vandalism. The concealed hardware available includes invisible mounting of all catches and hinge components – removing all externally visible points of attack. The system utilises active open- ing and closing which is achieved by electro-mechanical operation, so that the door swings softly out when open- ing. Conversely, when closing it moves to the framework and is pulled auto- matically into the locking device posi- tion where it is electro-mechanically locked into position. The concealed catch is ideal for limited space condi- tions, with retrofitting possible on many installations, and it is not restricted by the type of enclosure. This, coupled with identification and monitoring – for example, by GSM, transponder system or control station as part of an EMKA ELM security installation – offers locking, protection, monitoring and alarm functions. The ELM program
36
(Electronic Locking Module) demon- strates a technology approach to vandalism both for remote installa- tions and in fully staffed facilities such as factories, where operators may vandalise cabinets to re-set machines without authority. These systems are not only keyless in operation but also activate alarms when improperly opened and enable a 24-hour control access log. They are likely to find application in indoor electronic racks, data centres, server cabinets, co-location cabi- nets etc., as well as outdoor telecoms cabinets, such as in remote situations where lack of keys and remote unlocking may be seen as significant advantages. The EMKA electronically controlled locking system (ELM) is a system which allows access to switch cabinets of any kind and comprises the functions of monitoring, control and communication. It provides, for example, the electronic control of mechanically locked cabinets, sends mes- sages and activates control functions. Several options are provided for opening and monitoring – while rod controls perform the function of mechanical locking, their operation is effected via swing handle with sole- noid or internal electro-mechanical
mechanism, coupled with a key pad, proximity card, mobile phone, or network management station. This may then be configured so that as soon as the system is active, all access attempts and actions are logged within the event memory on a 24/7 basis.
EMKA specialist swinghandles meet the vandalism challenge
Anti-vandalism solutions Anti-vandalism enclosure hardware components are also available. These include stainless steel handles with either inset or flush designs, such as the 1154 swinghandle or the large format 1091 heavy duty latch with concealed padlock facility. These are com- plemented by many internally mounted or concealed hinges such as the 1031, 1032 and 1046 variants which are available in stainless steel. Traditional 1/4 turn locks and latches or swinghandle solutions include low profile features in stainless steel, many suited to thicker doors and capable of installation with rod operated locking mechanisms if appropriate. Another solution is internal hinges. These may be fully concealed in line with the company’s philosophy of completely concealing the hardware package and removing the need for keys wherever possible.
EMKA
www.emka.co.uk
T: 024 7661 6505 Enter 224
OCTOBER 2012 Supplement: Enclosures & enclosure furniture
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68