
SSG Technologies
Phils. Corp.
Technologies for a Safe, Sound and Green tomorrow!
About Us
SSG TECHNOLOGIES PHILS. CORP. was established in 2014, specializing design, distribution, installation and maintenance of CCTV, Biometric Access Control and Timekeeping and Structured Cabling. An advocate in saving the environment, SSG TECHNOLOGIES PHILS. CORP. will continue to offer only the highest quality and most reliable products, designs and industry practices for a safe, sound and green tomorrow for Filipinos.
Closed Circuit Television (CCTV)
SSG TECHNOLOGIES PHILS. CORP. understands the outcomes and consequences of the dramatic security and safety events the world have witnessed during the last decade, and are bound to shape our near future, which in turn have increased the level of awareness and needs for security & protection solutions within countries, communities and businesses, which consequently triggered strict and more regulated security requirements by governments.
Security Access Control
The term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap. Within these environments, physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or access to certain small assets.
Structured Cabling
In our modern world today, information technology is very critical in any business enterprise including SMME (Small, Medium and Micro Enterprise). SSG TECHNOLOGIES PHILS. CORP. can help enterprises with their data integrity and efficiency with structured cabling. There are a lot of technical definitions but to define it in Plain language according to Cableexpress.com…
CONTACT US
Viber:
+639174612021Email:
[email protected]Facebook Page:
https://web.facebook.com/SsgTechnologiesPhilsCorp
Closed Circuit Television (CCTV)

SSG TECHNOLOGIES PHILS. CORP. works closely with our customers, especially in the design phase, to ensure that the customer receives a system that will perform the functionality that the customer requires. For example, the process starts with understanding what the customer wants to achieve and from there the following are calculated: correct camera placement or location, camera functionality, choice of camera lenses, which is done with the aid of tools which determine the cameras Field of View and distant object sizes etc., Camera illumination requirements for viewing in darkness or low light conditions, DVR/NVR functionality – including recording and playback speeds, Hard Disk Sizing, CCTV functionality and specialized analytics if required, video transmission media etc., integration with other systems, CMS(Centralized Monitoring System), control room functionality, remote viewing including mobile viewing, lightning and surge protection, UPS or Solar array systems, etc. Although SSG TECHNOLOGIES PHILS. CORP. can perform most of these functions alone, we do also make use of our supplier’s experts as and when required. A Security System is in reality a system that is supposed to protect ones assets and people, and when it comes down to this, we will not purposefully supply inferior equipment to our customers just to win an order or to make more profit. SSG TECHNOLOGIES PHILS. CORP. only supplies quality equipment suited for purpose, which at a first glance may appear a bit more expensive than that of others, but when one takes the performance and reliability of this equipment into account, the end result often proves differently.CONTACT US
Viber:
+639174612021Email:
[email protected]Facebook Page:
https://web.facebook.com/SsgTechnologiesPhilsCorp
Security Access Control

Physical access control is a matter of who, where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.Biometrics is a technological and biological authentication method based on body measurements and calculations. It refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics.CONTACT US
Viber:
+639174612021Email:
[email protected]Facebook Page:
https://web.facebook.com/SsgTechnologiesPhilsCorp
Structured Cabling

Structured Cabling is defined as building or campus telecommunications cabling infrastructure that consists of a number of standardized smaller elements (structured).A properly designed and installed structure cabling system provides a cabling infrastructure that delivers predictable performance as well as has the flexibility to accommodate moves, additions, and changes; maximizes system availability; provides redundancy; and future proofs the usability of the cabling system.This definition gives you a better sense of what structured cabling is and its purpose.What Are the Benefits of Structured Cabling?
Once again, organization is the key word here. With an organized, top quality structured cabling system the benefits are:
• Moves, adds, and changes are much easier due to the fact that they are done in the MDA versus running long patch cords from equipment racks.
• Potential for downtime is reduced as the potential for human error is drastically reduced due to this organization.
• Time savings; cable and port tracing becomes a much easier job with a structured cabling system. This logical, organized approach not only makes changes easier, but it saves you time.
• Aesthetics; Never underestimate the looks! A structured cabling system will look much cleaner than a point-to-point method. Since the changes are done in the MDA versus at the hardware, the hardware can be cabled up and not touched in most instances. This allows the cabling in front of the switch to remain aesthetically pleasing.What Are the Risks Of Not Switching to a Structured Cabling System?
• Downtime: With an unorganized messy cabling infrastructure, mistakes are common like incorrect ports are unplugged or even worse is the messy cabling that gets in the way. Trying to remove a single cable from a large tangled mess can cause stress on the other cables. This stress can lead to network and channel errors in the hardware that are very difficult to trace.
• Airflow: If a point-to-point method is used, the front and potentially the sides of the switch are congested with cabling bulk. This impedes the airflow that the switch needs to operate. This also translates to underfloor cooling; cabling congestion in this space hinders the airflow of the computer room air conditioning (CRAC) unit and can cause cooling issues.CONTACT US
Viber:
+639174612021Email:
[email protected]Facebook Page:
https://web.facebook.com/SsgTechnologiesPhilsCorp