What is a Building Management System (BMS)?
The number of connected devices in the world is growing exponentially,
with estimates in excess of 30 billion by the year 2020. It seems whatever we buy these days has 'an App for that'.
Then there's all the TVs, HiFi's, heating, security, garage doors and other equipment already in our homes
that each require some form of remote handset, keypad, keyfob or control panel.
Wouldn't it be nice if it all just worked together, with one,
simple menu screen that allowed you to control everything in your home from wherever you were?
Something you could access from an in-wall touchscreen, mobile device, computer, or even on your TV?
We can make all of this possible and much more besides.
Why not get in touch and find out how we could make your home smarter today?
a building management system (BMS)
is a computer-based control system installed in buildings that control
and monitors the building's mechanical and electrical equipment.
♦ Lighting control
♦ Cooling and heating control
♦ Curtains control
♦ Control of swimming pool and Jacuzzi pumps
♦ Receiver and TV control
♦ Control open and close gates
♦ Control alarms
♦ Control Cameras
INTEGRATED SECURITY SOLUTIONS

IP CCTV System
ISTC Co. offers a complete range of IP CCTV solutions using high-quality network cameras and recording solutions in compliance with the Syrian Ministry of Interior regulation and specification.

Access Control System
ISTC Co. designs and installs IP based Access Control Systems that integrate with other building systems such as CCTV, Smart Building Technology Services, and Building Automation Systems.

Intrusion Alarm System
ISTC Co. designs and installs intrusion alarm systems for premises of different sizes and nature.
Our Services

Access Control
Access control systems are the electronic systems that are designed to control through a network and they should have access to a network. Access Control System recognizes authenticates and authorizes entry of a person to enter into the premise thereby giving complete protection ensuring security with the system.

Sound System
A bare-bones sound system consists of only a few main parts. You have a bunch of sound sources (microphones, CD players, etc.) fed into a mixing board (a device that combines a bunch of inputs into a couple of outputs). The “mixer” is fed into one or more amplifiers, which take the sound and gives it enough power to drive the speakers. We'll start by looking at the speakers, which I feel should be your first consideration.

Fire alarm system
Fire alarms are found in Offices, Factories, and public buildings, they are a part of our everyday routine but are often overlooked until there is an emergency at which point, they might just save our lives.

ip pbx system
An IP PBX is a Private Branch Exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines. The typical IP PBX can also switch calls between a VoIP user and a traditional telephone user, or between two traditional telephone users in the same way that a conventional PBX does.

matrix tv system
FWith a matrix installed, there are no set-top boxes obscuring your viewing areas or, for wall-mounted TVs, ugly cables that dangle down the walls and connect to a set-top box. Also, an HDMI matrix negates the need for you to buy multiples of the same device e.g. a beIN SPORTS for every TV that you want to be able to watch beIN on. With a matrix, you just need one beIN sports and you could watch it on as many TVs as you desire. This can help reduce your monthly subscription fees or save you unplugging your favorite entertainment device and carting around.

intrusion detection system
An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alert when such activity is discovered. While anomaly detection and reporting is the primary function, some intrusion detection systems are capable of taking actions when the malicious activity or anomalous traffic is detected, including blocking traffic sent from suspicious IP addresses.
SOME OF OUR PARTNERS








