Security Monitoring & Security Service provider Ireland
Top Security, Physical and Virtual - Securing Monitoring Protecting - Nationwide 24hrs x 365 days a year

Subscribe to our security newsletter

Alarm Companies


Please find below information on the range of products available from Top Security. 

For more information on any of the products call our Dublin Office on  (01) 490 0333,   the Cork Office on (021) 4968967  or email us at




Radio Transceivers provide businesses or private individuals with extra security and a 2nd line of defence.

Most security systems are only as secure as the telephone lines that connect them to the central station.

With long range wireless radio monitoring, you can create a redundant link to the central station and eliminate the 'weak link' in conventional alarm systems.

Top security was the first Central Station in Ireland to be authorised for long range radio alarm monitoring.

In 1989 Top Security pioneered the use of radio for monitoring alarms and sought approval from the then Dept. of Communications to make UHF frequencies available for the first time for alarm monitoring purposes.

We now offer this service virtually nationwide through a network of high site repeaters.


Wireless long range radio provides the highest level of protection available, which makes it a valuable addition to any existing or planned security system where security is critical.  There are two main types of radio transceiver:

1. Uni - Directional Radio Transceivers

One way transmission enables the Central Station to receive signals from the alarm system even if the landlines have been cut.  This second line of defence can be invaluable in high security situations where the criminal has intentionally cut the telephone wires to the premises.

2. Bi-Directional Radio Transceivers

In addition to insuring a second form of communication for alarm monitoring purposes two way transmission will allow the Central Station, for example, to remotely set your alarm system for you or to carry out specified access control functions on your behalf.

E.g. giving access to cleaners or setting the alarm system after they have left.


Until recently the use of Automated Number Plate Recognition (ANPR) systems was confined to the areas of law enforcement and anti-terrorism through matching number plates against intelligence databases.  However with improvements in technology the applications for such systems have grown to include all aspects of business, commerce and government.

We live in a rapidly changing and demanding world where using CCTV images for 'after the event' viewing is not good enough.  ANPR is interactive and operates in real time.  ANPR systems can read number plates, open barriers, activate alarms and output messages via, LCD screens, SMS, pagers and email.

Aside form law enforcement number plate recognition systems are in use in the the areas of transport and logistics, industrial/retail parks for security and parking control, controlling waste sites, town centre CCTV, bus lane control, congestion charging and road tolling.  ANPR systems can be used in any application where the number plate is the key.


Challenging times require new security imperatives to ensure that the right level of security exists in all the right places.  Biometrics as a means of identification is fast becoming the standard due to its high security integrity and its raised profile as a result of its recent use by various governments.

LG Electronics of New Jersey, USA are recognized as the premium supplier of this technology.  They work with companies in over 100 countries in both the public and private sectors, including several US Government Departments, providing them with biometric identification technology.  In May of 2003 LG chose Top Security as their agents for their Biometric Recognition Systems in the UK and Ireland.



Iris recognition is the best of the biometric authentication processes available today.  While many mistake it for retinal scanning, iris recognition simply involves taking a picture of the iris, with the picture being solely used for authentication.  But what makes iris recognition the authentication system of choice?

STABLE - The unique pattern in the human iris is formed by 10 months of age, and remains unchanged throughout ones lifetime.

UNIQUE - The probability of two irises producing the same code is nearly impossible.

FLEXIBLE - Iris recognition technology easily integrates into existing security systems or operates as a standalone.

RELIABLE - A distinctive iris pattern is not susceptible to theft, loss or compromise.

NON-INVASIVE - Unlike retinal screening, iris recognition is non-contact and quick, offering unmatched accuracy when compared to any other security alternative.


The LG Iris Access 3000 employs IRT to provide accurate identity authentication without PIN numbers, passwords or cards.  Enrollment takes less than 2 minutes.  Authentication takes less than two seconds.

Video-based technology makes it easy to enroll, producing a template that in most cases is good for the life of the subject.

Although the term 'iris scanning' is often used when referring to IRT, there is no scanning at all.  Iris technology is based on pattern recognition and uses video camera technology similar to that found in camcorders.

  • With a device activated by a proximity sensor, a subject positioned beside the Enrollment Unit is guided by a mirror and an audio-assisted interface to allow an auto-focus camera to take a digital video of the iris.

  • Individual images from the live video are then processed and stored, recording the pattern of the iris (the area between the pupil and the sclera or white of the eye).

  • When a subject approaches a portal protected by Iris Access, proximity sensors activate the unit and the same audio interface used at enrollment helps the user ensure proper positioning and speedy recognition.  A picture is taken and compared to the image stored.  If a match is found access is granted.

  • The system can be tailored to allow access at varying times to varying users.


Access control is currently the principal focus of the iris recognition platform.  It is widely deployed around the world providing state of the art access control to organizations valuing human and physical assets.  It may be used as a control point for an entire facility or for a particularly sensitive area of operations.  Although security is clearly a prime concern, iris recognition is also being adapted for productivity enhancing operations like time and attendance.

The perception of products and services that were traditionally thought of as merely 'security related', which one could do with or without, are changing.  Many of these systems, especially iris recognition, are finding their way into areas of business where they are being used as management tools to monitor activities such as inventory control and supply chain management.


An evening with
Joanne O'Riordan

Hosted by
Top Security
Customer Testimonials
Read customers' experience with our service

Read More »
Change of Details Form
This form enables our customers to request changes to account details.

Read More »
Security Shop
Our recommended security products

Browse Shop »
Personal Security Monitoring

Read More »
Press Archive
Top Security press archive

Read More »
The Fr. Frank Maher
Classical Music Awards

Sponsored by
Top Security

Copyright © 2013 Top Security - Top Security, diverse and cutting edge in our security offerings

TopMail   BlockMail   TopLocate