Skip to main content Skip to page footer

Description

A burglar alarm is used for timely detection of violations on the territory under protection. The purpose of the security system is to:

  1. Guaranteed detection of intrusion into the protected area.
  2. Immediately notify the security service or the owner of the threat.

These tasks are solved by installing security devices and competent equipment correctly. The choice of the type of alarm for the protection of the premises depends on several factors, important: the features of the protected space, the kind of object, the need to connect the alarm to the central console of the security company or the transmission of an alarm signal to the local security service of the object, the stage of repair or construction of the premises. A complete security alarm system includes a set of software and hardware devices. The security system usually consists of a control panel, sensors (intrusion, opening, movement, etc.), panic buttons. Data about incidents and the current situation at the guarded facility are automatically received from sensors or panic buttons when the alarm is manually activated. Security systems use IR motion sensors, reed door sensors, contact or ultrasonic glass break sensors, vibration and other types of detectors. Additionally, when used in complex fire and security alarm systems, temperature sensors, smoke detectors, and in some cases, gas and water leakage sensors in office or residential premises are connected. Stationary alarm buttons or radio key fobs are used as panic buttons. The primary device of the security alarm system is the control panel of the security system, which receives information about all events in the territory under protection. Depending on the settings and type of the control panel, it can perform several functions when an emergency detection signal is received. Typically, for continuous operation of the central alarm systems are equipped with spare communication channels and backup power supplies. When the panel receives an alarm signal, it will activate sound or light warning systems. Alarm systems are of various types and purposes. A siren or other audio-visual detectors may sound when the burglar alarm is activated. The signal can be sent to a control system or a centralized security console using a radio channel, GSM, or a telephone line. Depending on the settings, it is possible to inform users about events by SMS messages, push notifications or calls. Alarm control panels are designed to collect information from various sensors connected to them, give an alarm signal, and control multiple automation devices through built-in relays. Various types of fire and security sensors, as well as sirens, light and sound alarm detectors, critical electronic readers, control keyboards and light sources, are connected to the security system central. In addition, control panels can collect information from wireless sensors and cameras, depending on the model. In most cases, the control panel housing is made of plastic or metal, and the printed circuit board has terminal blocks for connecting wires. In some types of control panels, there is a place for the battery, and there is a power supply. A GSM module for sending messages and transmitting information can be located on the alarm control panel board or separately in the housing. Alarm control panels are programmed using utility programs using a laptop. Programming means configuring the security device to the user's needs individually.

Capacity

Ajax devices
up to 100

  • Wired and wireless devices in any proportion.
  • 5 range extenders max.
  • 10 sirens or keypads with a built-in siren max.

Cameras or DVRs
up to 25

  • RTSP support.
  • Seamless integration with the Dahua, Hikvision,
  • Safire, EZVIZ, Uniview IP cameras and DVRs.

Users
up to 50

  • Any number of admin users within the limit.
  • PRO accounts for installers and monitoring companies.
  • Access management for regular users.

Automation scenarios
up to 32

  • Alarm reactions.
  • Scheduled actions.
  • Security mode changing reactions.
  • Temperature changing reactions.
  • Humidity changing reactions.
  • Reactions to changes in CO₂ concentration.
  • Reactions to pressing the Button.

Security groups
up to 9

Rooms
up to 50

Event log
up to 1000 events
Events are saved on the non-volatile onboard flash memory.

Wired communication

Fibra communication technology
Proprietary wired communication technology. Fibra combines the reliability of wires with the freedom of radio connection.
It features:

  • Two-way communication.
  • Advanced anti-sabotage.
  • Instant notifications.
  • Remote configuration via the Ajax apps.

Compatible wire
4–core cable
Bus connection.

Input
8 bus lines
Compatible with Fibra devices only.

Bus line length
up to 2.000 m
When using the U/UTP cat.5 twisted pair.

Power supply of devices
up to 14.4 W
For all connected wired devices.

Output voltage range
23–25.1 V⎓

Topologies

  • Star
  • Ring

In the line breakage event, the ring splits into two working segments, the devices continue to operate, and the system notifies a security company and users about the incident.

Devices polling interval
from 12 to 300 s
Adjusted by PRO or user with admin rights in the Ajax app.

Encrypted communication

Wireless communication

Jeweller communication technology
Proprietary wireless communication technology to transmit alarms and events.
It features:

  • Two-way communication.
  • Advanced anti-sabotage.
  • Block encryption featuring a dynamic key.
  • Instant notifications.
  • Remote configuration via the Ajax apps.

Frequency bands
866.0 – 866.5 MHz
868.0 – 868.6 MHz
868.7 – 869.2 MHz
905.0 – 926.5 MHz
915.85 – 926.5 MHz
921.0 – 922.0 MHz
Depends on the region of sales.

Maximum effective radiated power (ERP)
up to 20 mW
Featured automatic power control to reduce power consumption and noise interference.

Radio signal modulation
GFSK

Radio signal range
up to 2.000 m
Between the hub and connected devices (in an open space). Maximum range depends on the connected device.

Polling interval
from 12 to 300 s
Adjusted by PRO or user with admin rights in the Ajax app.

Encrypted communication
All the data stored and transmitted are protected by block encryption with a dynamic key.

Radio frequency hopping

Wings communication technology
Proprietary wireless communication technology to transmit photo verifications.
It features:

  • Two-way communication.
  • Block encryption featuring a dynamic key.
  • Advanced anti-sabotage.
  • Package re-uploading in case of transmission errors.
  • Photo delivery check.

Frequency bands
866.0 – 866.5 MHz
868.0 – 868.6 MHz
868.7 – 869.2 MHz
905.0 – 926.5 MHz
915.85 – 926.5 MHz
921.0 – 922.0 MHz
Depends on the region of sales.

Radio signal range
up to 1.700 m
Between the hub and connected devices (in an open space). Maximum range depends on the connected device.

Radio frequency hopping
Radio communication uses frequency hopping to prevent interception and jamming.

Recommendations 110–240 V~ power supply. For indoor use only.
Communication channels

Ethernet
1 × 8P8C socket
Up to 100 Mbps.

Cellular
2 × micro–SIM slot

Cellular bands
2G
(GSM900/DCS1800 (B3/B8))

3G
(WCDMA 850/900/2100 (B1/B5/B8))

4G/LTE
(FDD B1/B3/B5/B7/B8/B20)

Automatic switching between communication channels

  • Switching between SIMs — up to 4 minutes.
  • Switching between 4G, 3G, and 2G networks of one SIM — instantly.
  • Switching between Ethernet and SIM — instantly.

Communication channels prioritization

  1. Ethernet
  2. Cellular connection

Communication channels work in parallel to increase system reliability. Most of the data is transmitted via Ethernet.

Alarm Transmission System Categories
SP2, SP5, DP3

Control panel operation method
Pass-through

Signaling security
S2
Substitution security.

Information security
I2

Encryption algorithm
AES 128

Notifications

Supported notification types

  • Push
  • SMS
  • Calls

Event types

  • Alarms
  • Malfunctions
  • Events
  • Security mode changing

The notification types are configured individually for each user. Notifications could be customized for A–D schemes according to EN 50131 requirements.

Photo verification

Photo verification types

  • Photo by alarm
  • Photo by scenario
  • Photo on demand
  • Photo by schedule

The Photo by Schedule feature is available for hubs with firmware version OS Malevich 2.19 or higher.

Photo delivery time
up to 9 s
by default.

Photo resolution
up to 640 × 480 pixels
Depends on the detector.

Number of photos in a series:
from 1 to 5 pictures

Monitoring

Supported protocols

  • SurGard (Contact ID)
  • SIA (DC-09)
  • Other proprietary protocols

Event types

  • System alarms and events
  • Photo verifications
  • Panic button coordinates
Power supply

Main power supply type
Type A

Device operating AC voltage range
110–240 V~, 50/60 Hz
From the main power supply. Up to 10 W of mains power consumption.

Device operating DC voltage range
10.5–15 V⎓
From the backup battery (not included). Hub has space in the enclosure and rails for installing batteries with a capacity of 4, 7, or 9 Ah.

Autonomous operation
up to 60 hours
Hub Hybrid with a 7 Ah backup battery can power a system of 30 wired devices for 60 hours. Wireless devices operate on batteries and do not require additional power supply.

Low battery voltage
11.7 V⎓

Low battery recovery voltage
12.6 V⎓

End of life battery voltage
10.5 V⎓
Hub Hybrid is switched off.

Maximum output peak-to-peak ripple battery voltage
220 mV⎓

Minimum backup battery energy level in the charged state
100 %

Current consumption

Maximum rated output
0.53 A

Maximum at nominal voltage
200 mA

Quiescent at nominal voltage
130 mA

Average*
up to 93 mA
When GSM and Ethernet are enabled.

up to 72 mA
When Ethernet is disabled.
* From the backup battery after the loss of the main power supply.

Casing

Dimensions
192 × 238 × 100 mm

Weight
852 g

Operating temperature range
from −10°C to +40°C

Operating humidity
up to 75%

Protection class
IP30

Colours Black and White
Complete set
Hub Hybrid (4G)
Power cable
Screw terminal block Adapter (only for INCERT compliance)
Battery connection cable
Ethernet cable
Casing
Installation kit
Eight 120 Ω termination resistors
Quick start guide

The synergy of wired and wireless technologies

Hub Hybrid is a game-changer among professional security systems. It is the first Ajax control panel supporting Jeweller and Fibra devices altogether. Wired and wireless technologies are combined to build complex protection regardless of facility size, steel, or concrete obstructions. Informative notifications, alarm photo verification, real-time system control from the app, and automation scenarios — all to enhance security. 

Hardware

Maximum without expansion modules

Tampers

to alert of case opening and de-mounting.

8 lines

supporting the Ring connection topology.

Jeweller antennas

for robust transmission of commands and events

Wings antennas

for stable reception of photo verification.

Communication through steel and concrete

Fibra

Fibra communication technology allows you to wire lines up to 2 km long. Eight lines in one system run by Hub Hybrid minimise potential damage. Even a completely broken line leaves the security system at 87% operational. And with wireless detectors, this percentage will be even higher.

Jeweller

Jeweller radio protocol provides two-way communication between the hub and wireless devices at a distance of up to 2,000 meters, allowing remote system control and alarm transmission in 0.15 seconds.

Jeweller applies time frames to synchronize devices communication, authentication to prevent forgery, and encryption to protect the data. An energy-efficient protocol provides wireless devices with from 2 to 7 years of battery life.

Up to 5 range extenders with a communication range of up to 1,800 meters can be connected to Hub Hybrid by radio or cable via Ethernet.

More than two days on a backup battery

Hub Hybrid with a backup battery can power a system of 30 wired devices for up to 60 hours1. To check the system project and estimate the power consumption of devices, use the Fibra power supply calculator. Wireless devices do not require additional power supply, as they are battery-operated.

Events delivery in 0.15 seconds

Authentication against forgery

Always online via Ethernet and cellular networks

Hub Hybrid can be connected to three Internet providers at a time via Ethernet cable and 2G, 3G, and LTE SIM cards. Automatic switching between channels takes seconds.

Physical protection of the line against break

Hub Hybrid features 8 lines and supports Ring connection topology — up to 4 rings in a hybrid security system. In the event of a line breakage, the ring splits into two working segments, devices continue to operate, and the system notifies a security company and users about the incident. 

Jamming alert in 30 seconds

More Ajax

Control Panel with Fibra, Jeweller and Wings support (2 x SIM 2G/3G/LTE, Ethernet)

Learn More >

Wired module to integrate wired third-party

Learn more >

Wired IR motion detector with an additional K-band microwave sensor

Learn more >

Wired combined opening, shock, and tilt detector with two reed switches and accelerometer

Learn more >

Control Panel with Jeweller and Wings support (2 x SIM 2G/3G/LTE, Wi-Fi, Ethernet)

Learn More >