|+251 118 650722
|+251 912 441049
|+251 912 441036
|Jacros, Mulege #1,2nd floor, Addis Ababa, Ethiopia
|Safety & Security Equipment Sales/Maintenance
ETHIOTIKURET is a new brand company registered and licensed by the Federal Democratic Republic of Ethiopian Minster of Tread on February 17th 2018. The company will provide digital and electronic security services, 24-hours monitoring and security audits to governmental and international organizations, commercial buildings, retail businesses, and special events. The business has launched in Addis Ababa and will expand to all nine regional states when successful.
Ethiotikuret is focusing on bringing new security ideas and technology to untapped market in Ethiopia and plays competitive roll in taking forward the industry.
We have already developed clients and giving services to various companies and organizations such as Mullege PLC Import Export Trade Conglomerate international company, and we are in process of negotiating with UNECA , to give comprehensive consultancy services.
Mullege PLC is also our sister company, which does businesses together with us as joint venture.
The company has acquired the right to import digital security and safety items, devices and equipment, and supply and install them accordingly. It has its account number and LCC authorization from leading commercial banks in Ethiopia.
Teshome Jarso Wottango is the CEO and founder of Ethiotikuret Digital Security Systems Equipment import PLC. He is a visionary and an experienced security expert and former United Nations Department of Safety and Security (UNDSS) Senior Officer.
Ethiotikuret digital security company is on process of partnering with UNECA through registering itself in UN UMOJA system and having code in order to participate in any procurement UN agencies bids.
We are also in an early stage of negotiation to partnership with Hikvision Africa, Security Group 4 East Africa, CP Plus Intelligent Security Systems Indian, and Benson Security System LTD Arusha Tanzania .in order to integrate and expand the security and safety business network in East African Region and beyond.
Teshome Jarso Wottango is chief Executive Officer of the Company. He currently Owens 50 % of the business and the remaining 50% of shares are owned by his partner and co-founder Tiruaynet Petros lodamo, COO. The business is incorporated as a private limited company and its statutory incorporation enables additional investment for its launch and future expansion.
The company has robust structure consisting a team of administration and finance, budget and human resource, technical and operational, sales and marketing and IT and communication sections .
The company will provide digital and electronic security services, 24-hours monitoring and security audits to Governmental and international organizations, commercial buildings, retail businesses, and special events. The business has launched in Addis Ababa and will expand to all nine regional states when successful.
The IP surveillance camera systems are the updated forms of CCTVs. They are in fact, the networked and digitized versions of the close-circuit television. This means that the system includes an IP camera, that records footage and then shares it on the internet protocol network. The system was first introduced by the Axis communication in 1996.
Centralized IP cameras include a central Network Video Recorder (NVR) that is responsible for recording and taking on-time decisions regarding video and alarm management.
Decentralized IP cameras are used in places where on time surveillance is not required. These cameras do not require a central NVR as they capture and record, and save it in the allocated storage media like SD cards.
The reason why IP technology has taken over in present times is the multiple benefits that it brings along including user-friendliness, advanced search capabilities, better compression and storage. Some of the best benefits of IP cameras are briefly explained below:
The main reason to choose IP cameras over CCTV is the accessibility of the images. Since the cameras will be connected to a network, the user can see the images or recordings without any extra hardware or software requirements. All you need is the access to the internet to connect securely to your surveillance system from anywhere in the world. Even though the access is easy and user-friendly, it doesn’t allow any unauthorized persons to view the surveillance images as you can protect the access passwords by using the Virtual Private Network or the company intranet.
There is no limit to the amount of images or recordings that you can store, other than the capacity of the storage media. Using the different types of IP cameras, you can view recordings of any location, or save them to view later.
This is one of the most helpful parts of IP cameras. Whenever there is an alarming image or recording, the video server can send an email to the saved email addresses. This is extremely important where immediate actions are to be taken.
Even though the initial cost of installing the IP cameras can be a bit high, there are no further costs of hardware or software, or the maintenance of the system. Also, since the system performance and the outcomes get better, the total cost of ownership can greatly decrease.
Another helpful feature of IP cameras is that they can be easily moved around, as they do not need any wires or other hardware resources. Since they’re connected to the network, they can be moved and accessed from anywhere in the network.
IP cameras allow users to add video analytics in them that allows the system to take analytics solutions. This is extremely helpful in alarming situations where timely actions must be taken.
While surveillance through IP cameras is easy and has numerous advantages, there are some limitations, or say, the factors that need to be looked into to attain the desired output.
Network Bandwidth: It is important if the images taken by the camera are sent by PSTN. For good and helpful results, at least 30 frames per second are required, which needs a minimum bandwidth of 120 KB per second.
Hard disk space: As discussed above, the storage is one main factor when opting for IP surveillance. The storage requirements mainly depend on the frame rate of the video that you want to store.
Access control is a way of limiting access to a system or to physical or virtual resources. In computing, access control is a process by which users are granted access and certain privileges to systems, resources or information.
In access control systems, users must present credentials before they can be granted access. In physical systems, these credentials may come in many forms, but credentials that can’t be transferred provide the most security.
FREE WEBINAR – March 12, 2019 11:00am EST | Managing Multiple Database Roles: How Many Hats Do You Wear? REGISTER TODAY
For example, a key card may act as an access control and grant the bearer access to a classified area. Because this credential can be transferred or even stolen, it is not a secure way of handling access control.
A more secure method for access control involves two-factor authentication. The person who desires access must show credentials and a second factor to corroborate identity. The second factor could be an access code, a PIN or even a biometric reading.
For computer security, access control includes the authorization, authentication and audit of the entity trying to gain access. Access control models have a subject and an object. The subject – the human user – is the one trying to gain access to the object – usually the software. In computer systems, an access control list contains a list of permissions and the users to whom these permissions apply. Such data can be viewed by certain people and not by other people and is controlled by access control. This allows an administrator to secure information and set privileges as to what information can be accessed, who can access it and at what time it can be accessed.
An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. While anomaly detection and reporting is the primary function, some intrusion detection systems are capable of taking actions when malicious acitivity or anomalous traffic is detected, including blocking traffic sent from suspicious IP addresses.
Although intrusion detection systems monitor networks for potentially malicious activity, they are also prone to false alarms (false positives). Consequently, organizations need to fine-tune their IDS products when they first install them. That means properly configuring their intrusion detection systems to recognize what normal traffic on their network looks like compared to potentially malicious activity.
An intrusion prevention system (IPS) also monitors network packets for potentially damaging network traffic. But where an intrusion detection system responds to potentially malicious traffic by logging the traffic and issuing warning notifications, intrusion prevention systems respond to such traffic by rejecting the potentially malicious packets.
Intrusion detection systems come in different flavors and detect suspicious activities using different methods, including the following:
A network intrusion detection system (NIDS) is deployed at a strategic point or points within the network, where it can monitor inbound and outbound traffic to and from all the devices on the network.
Host intrusion detection systems (HIDS) run on all computers or devices in the network with direct access to both the internet and the enterprise internal network. HIDS have an advantage over NIDS in that they may be able to detect anomalous network packets that originate from inside the organization or malicious traffic that a NIDS has failed to detect. HIDS may also be able to identify malicious traffic that originates from the host itself, as when the host has been infected with malware and is attempting to spread to other systems.
Signature-based intrusion detection systems monitor all the packets traversing the network and compares them against a database of signatures or attributes of known malicious threats, much like antivirus software.
Anomaly-based intrusion detection systems monitor network traffic and compare it against an established baseline, to determine what is considered normal for the network with respect to bandwidth, protocols, ports and other devices. This type of IDS alerts administrators to potentially malicious activity.
Historically, intrusion detection systems were categorized as passive or active; a passive IDS that detected malicious activity would generate alert or log entries, but would take no actions. An active IDS, sometimes called an intrusion detection and prevention system, would generate alerts and log entries, but could also be configured to take actions, like blocking IP addresses or shutting down access to restricted resources.
Snort, one of the most widely used intrusion detection systems is an open source, freely available and lightweight NIDS that is used to detect emerging threats. Snort can be compiled on most Unix or Linux operating systems, and a version is available for Windows as well.
Intrusion detection systems monitor network traffic in order to detect when an intrusion is being carried out by unauthorized entities.
IDSes do this by providing some or all of these functions to security professionals:
monitoring the operation of routers, firewalls, key management servers and files that are needed by other security controls aimed at detecting, preventing or recovering from cyberattacks;
providing administrators a way to tune, organize and understand relevant operating system audit trails and other logs that are often otherwise difficult to track or parse;
providing a user-friendly interface so non-expert staff members can assist with managing system security;
including an extensive attack signature database against which information from the system can be matched;
recognizing and reporting when the IDS detects that data files have been altered;
generating an alarm and notifying that security has been breached; and
reacting to intruders by blocking them or blocking the server.
An intrusion detection system may be implemented as a software application running on customer hardware, or as a network security appliance; cloud-based intrusion detection systems are also available to protect data and systems in cloud deployments.
Intrusion detection systems offer organizations a number of benefits, starting with the ability to identify security incidents. An IDS can be used to help analyze the quantity and types of attacks, and organizations can use this information to change their security systems or implement more effective controls. An intrusion detection system can also help companies identify bugs or problems with their network device configurations. These metrics can then be used to assess future risks.
Intrusion detection systems can also help the enterprise attain regulatory compliance. An IDS gives companies greater visibility across their networks, making it easier to meet security regulations. Additionally, businesses can use their IDS logs as part of the documentation to show they are meeting certain compliance requirements.
Intrusion detection systems can also improve security response. Since IDS sensors can detect network hosts and devices, they can also be used to inspect data within the network packets, as well as identify the operating systems of services being used. Using an IDS to collect this information can be much more efficient that manual censuses of connected systems.
An intrusion prevention system (IPS) is similar to an intrusion detection system, but differs in that an IPS can be configured to block potential threats. Like intrusion detection systems, an IPS can be used to monitor, log and report activities, but it can also be configured to stop threats without the involvement of a system administrator. However, organizations should be careful with IPSes because they can also deny legitimate traffic if not tuned accurately.
An IDS is aimed at analyzing whole packets — header and payload — looking for known events. When it detects a known event, the system generates a log message detailing that event. The IDS compares the inbound traffic against the database of known attack signatures and reports any attacks it detects. An IDS warns of suspicious activity taking place, but it doesn’t prevent them as does an IPS. The major flaw of an IDS is that it can produce false positives.
An intrusion prevention system is typically located between a company’s firewall and the rest of its network and may have the ability to stop any suspected traffic from getting to the rest of the network.
Intrusion prevention systems execute responses to active attacks in real time. Because system administrators structure rules within the IPS that address the needs of the business, the system can monitor and evaluate threats, as well as take action in real time to stop immediate threats. An IPS actively catches intruders that firewalls or antivirus software may miss
A smoke detector is a device that senses smoke, typically as an indicator of fire. Commercial security devices issue a signal to a fire alarm control panel as part of a fire alarm system, while household smoke detectors, also known as smoke alarms, generally issue a local audible or visual alarm from the detector itself.
Smoke detectors are housed in plastic enclosures, typically shaped like a disk about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick, but shape and size vary. Smoke can be detected either optically (photoelectric) or by physical process (ionization); detectors may use either, or both, methods. Sensitive alarms can be used to detect, and thus deter, smoking in areas where it is banned. Smoke detectors in large commercial, industrial, and residential buildings are usually powered by a central fire alarm system, which is powered by the building power with a battery backup. Domestic smoke detectors range from individual battery-powered units, to several interlinked mains-powered units with battery backup; with these interlinked units, if any unit detects smoke, all trigger even if household power has gone out.
The risk of dying in a home fire is cut in half in homes with working smoke alarms. The US National Fire Protection Association reports 0.53 deaths per 100 fires in homes with working smoke alarms compared to 1.18 deaths in homes without (2009–2013). Some homes do not have any smoke alarms, some alarms do not have working batteries; sometimes the alarm fails to detect the fire.
A heat detector is a fire alarm device designed to respond when the convected thermal energy of a fire increases the temperature of a heat sensitive element. The thermal mass and conductivity of the element regulate the rate flow of heat into the element. All heat detectors have this thermal lag. Heat detectors have two main classifications of operation, “rate-of-rise” and “fixed temperature”. The heat detector is used to help in the reduction of damaged property. It is triggered when temperature increase
A fire alarm system has a number of devices working together to detect and warn people through visual and audio appliances when smoke, fire, carbon monoxide or other emergencies are present. These alarms may be activated automatically from smoke detectors, and heat detectors or may also be activated via manual fire alarm activation devices such as manual call points or pull stations. Alarms can be either motorized bells or wall mountable sounders or horns. They can also be speaker strobes which sound an alarm, followed by a voice evacuation message which warns people inside the building not to use the elevators. Fire alarm sounders can be set to certain frequencies and different tones including low, medium and high, depending on the country and manufacturer of the device. Most fire alarm systems in Europe sound like a siren with alternating frequencies. Fire alarm electronic devices are known as horns in the United States and Canada, and can be either continuous or set to different codes. Fire alarm warning devices can also be set to different volume levels.
A flame detector is a sensor designed to detect and respond to the presence of a flame or fire, allowing flame detection. Responses to a detected flame depend on the installation, but can include sounding an alarm, deactivating a fuel line (such as a propane or a natural gas line), and activating a fire suppression system. When used in applications such as industrial furnaces, their role is to provide confirmation that the furnace is working properly; in these cases they take no direct action beyond notifying the operator or control system. A flame detector can often respond faster and more accurately than a smoke or heat detector due to the mechanisms it uses to detect the flame.
Time and Attendance Systems use biometric data to record staff shifts; allowing for accurate payroll calculations, aiding in the reduction of costs and improving overall staff efficiency. These systems eliminate ‘ghost workers’ and provide flexible shifts/working locations.
An under-vehicle inspection (UVI) system generally consists of imaging systems mounted on a roadway and used at facility access points, particularly at secure facilities. An under-vehicle inspection system is used to detect threats—such as bombs—that are hidden underneath vehicles. Cameras capture images of the undercarriage of the vehicle for manual or automated visual inspection by security personnel or systems.
The first under-vehicle inspection system was developed in the late 1980s as part of a joint program between the UK Home Office and Morfax (now a part of the Chemring Group). The system used black and white images from area scan cameras. The systems have since developed encompassing more advanced technologies such as database capabilities in 1994, ANPR vehicle recognition in 1997, automatic change detection in 1999, colour imagery in 2005, and integrated chemical detection in 2012.
Under-vehicle inspection systems can be permanent (embedded in the road), fixed (attached to the road’s surface) or portable (mobile). Under vehicle inspection systems are known by the acronyms UVI (under-vehicle inspection), UVIS (under-vehicle inspection systems), AUVIS (automated under-vehicle inspection systems), MUVIS (mobile under-vehicle inspection systems), and UVSS (under vehicle surveillance system). The terms UVSS and CUVSS (colour under vehicle surveillance system) were trademarks of the Chemring Group until the rebranding of the Home Office project in 2011.
As the vehicle arrives at the checkpoint and drives over the imaging unit, the cameras capture images of the undercarriage and transmit them to the control unit which displays them on a monitor. The control unit and monitor can be located outside in proximity to the checkpoint or within the guardhouse.
Depending on the UVIS system, images of the vehicle’s undercarriage can be stored for later viewing or can be manipulated for closer inspection while the vehicle is detained.
Recently, UVIS systems have also integrated license plate recognition (LPR) software that can identify stolen or suspect vehicles, and help security personnel monitor suspected changes to the undercarriage of a returning vehicle. UVIS providers have also developed a variety of security add-ons such as external scene cameras to help personnel better detect, deter and communicate potential threats. Many systems also feature network integration, allowing the facility to access and use data from perimeter choke points for broader applications such as resource planning.
Before the UVIS system, handheld mirrors were in use. While handheld mirrors are among the least expensive and oldest technologies, they have limited applications and place security personnel in close proximity to potential danger. Additionally, performing a thorough inspection of the vehicle’s undercarriage using handheld mirrors is both time-consuming and labor-intensive, taking up to several minutes per vehicle. More importantly, most mirrors provide a limited view of the undercarriage, failing to show screeners key areas toward the middle of the vehicle.
For applications such as border crossings, where the goal is to identify possible contraband movement, mirrors can often be used without compromising safety. However, depending on the vehicle and the type of mirror being used, contraband attached to certain areas of the undercarriage may easily escape detection.
Digital Color UVSS is an effective and reliable surveillance system for inspecting the undercarriage of vehicles, by presenting a clear and clean image of the underside of vehicles when it is driven over the screening unit. It exposes the undercarriage from all makes and models for explosive devices, suspicious objects, contraband which includes drug and personnel.
Digital Colour UVSS Screening Unit consists of high-resolution camera, halogen illumination units and protective housing. It is designed for surface mounted or flushed deployment.
Focus Technologies Digital Video UVSS (Under Vehicle Screening System) is a simplified surveillance system to perform the vehicle undercarriage inspection. The system is designed to monitor and record real time video. Playback of captured video for future reference is possible. High resolution video provides clear live video of the vehicle’s underside in detecting attached packages, explosives and other objects..
Digital Video UVSS Screening Unit consists of 2 to 4 high resolution video cameras, with infra-red illumination units protected inside an inspection ramp.
Electric fencing is effective for both protecting a property from intruders, and containing wildlife within a designated area. Serving as a physical and psychological deterrent against intruders, and a barrier for animals trying to roam beyond a certain point. Offering a non-lethal barrier for households, businesses and conservation areas.
Electric Fences are durable and easy to maintain, allowing for easy integration of existing alarm systems. Sensor switches can be added to automatically adjust sensitivity and zoning provides information on attempted point of entry.
Automatic Gates and Barriers are used to improve security at residences/commercial areas. Using remotes to open/close gates and barriers adds to the convenience of not having to wait for guards. Automatic Barriers are also used for parking systems with automated ticket and payment stations to add security and improve revenue collection. The current parking system at the Kilimanjaro International Airport is a landmark installation of automated parking systems conducted by Benson Security Systems.
Security Scanners such as walk-through x-rays, baggage x-rays, and hand-held scanners, detect metal/inorganic substances. Under-vehicle surveillance scanners aide in monitoring the complete under-carriage of vehicles for the detection of any suspicious objects. Records of images captured are maintained for future investigations.
Ethiotikuret Digital Security Equipment import
Jakros mulege no 1, 2nd floor P.o.box:- 26-1075,
Tel office: – 251(0) 118 650 722,
Cell: – +251(0)912 441049 or +251(0)912 441036
Email: – firstname.lastname@example.org