Tecom Series ChallengerPlus Control Panel
Get the most out of your security solution.
Designed and built with the latest technology for superior access control and integrated networking, ChallengerPlus is the result of significant research and development. It is the latest in Tecom’s Challenger series, and is built on the successful foundations of Challenger10, Challenger V8, and all of their peripherals. It is also backwards compatible to these peripherals, making upgrading a quick, easy, and beneficial choice.
The ChallengerPlus panel uses advanced communication path technology and provides the perfect solution and flexibility for your security needs. Multiple communication paths operate various reporting formats and give you the ability to communicate to multiple control rooms and software packages simultaneously. The communication paths can filter by areas, events and time.
Multi-tenanted sites can report alarms to their preferred security monitoring provider on a single panel and multiple paths over one Ethernet port, simultaneously.
Users can be assigned a start and end date that is stored in the panel, meaning a permanent connection to management software is no longer required to activate or remove a person’s access.
ChallengerPlus Communication System Diagram
Existing Challenger sites can benefit from significantly reduced installation times when upgrading from a V8 to the feature-rich ChallengerPlus panel, saving you time and money. Selected RAS models provide enhanced keypad navigation to make programming and managing your security system easier with ChallengerPlus. Firmware updates to the panel and certain peripherals can now be completed remotely using CTPlus software giving you peace-of-mind and a lower total cost of ownership.
For those sites that require safety checks prior to opening, the panel can automate an area search process which reports a message to your monitoring service if the search has failed to complete on time. Add to this an extended range of input testing and reporting features, where individual inputs can be automatically tested with normal operation within a specified number of days, and you have one of the most feature-rich intrusion detection systems available.