Hub 2 manages all the Ajax devices in the system to alert users about open doors, broken windows, threats of fire and flooding. If burglars break into your facility, Hub 2 will notify the monitoring station 1and send photos from the MotionCam detectors. You won’t need to live under the constant supervision of the security cameras to know what’s going on
Hub 2 works with MotionCam and MotionCam Outdoor motion detectors. When detectors are triggered, they take a series of photos. It helps to evaluate the situation at the facility. Visual verification helps you instantly assess the situation, relieving users of unnecessary anxiety, and security companies — from false calls of patrols
Communication with the outside world is critical for the security system control panel. Its reliability and stability guarantee timely alarm transmission to the security company and users
Hub 2 can be simultaneously connected to three Internet service providers — via Ethernet cable and 2G, 3G, and LTE 2 cellular networks. The automatic switching between channels takes seconds
To ensure reliable communications, Ajax has equipped Hub 2 with four antennas and support of two proprietary radio protocols: Jeweller and Wings. Jeweller is responsible for the transmission of commands, events, and alarms, while Wings provides batch transmission of images. Ajax two-way radio communication uses frames to synchronize device communication sessions, authentication to prevent fraud, and encryption to protect against data theft
The Hub 2 radio network covers several floors and separate buildings — thanks to the communication range of 2,000 meters and the ability to connect five range extenders. To manage access and security zoning of the facility, the hub allows connecting 50 users and creating 9 security groups. Hub 2 is a perfect choice for home and business security
Ajax refrained from control buttons on the control panel body and archaic interfaces — apps are more convenient and reliable. They connect to a hub via a secure channel through the Ajax Cloud server located in several AWS data centres. Server availability in 2021 was 99.995%
Apps allow system users with administrator rights to manage the security of the facility, change settings of the hub and the devices connected to it, create scenarios, and monitor events. From a smartphone or a PC. On the site and remotely
Hub 2 allows creating 32 scenarios and minimizing the impact of human factor on security. The hub can arm and disarm a facility or a group by schedule. Instantly activate a smoke machine if someone enters the premises. Blackout the premises and turn on emergency lighting in case of fire. Or shut off the water in case of a leak. Control lights, electric locks, roller shutters, and garage doors — by arming/disarming, button press, or a detector alarm
Whatever happens to Hub 2, the security company and the users will be notified. No one can disconnect the hub unnoticed when the facility is disarmed. If an intruder attempts to dismount the device, this will trigger the tamper immediately. The Ajax Cloud server can notify about the loss of connection with the hub in 60 seconds due to frequent polling. Even if the building is de-energized, the hub will protect the object for up to 16 hours with a built-in backup battery
Hub 2 runs OS Malevich — a real-time operating system developed by Ajax Systems. OS Malevich is extremely stable, immune to viruses, and protected from cyberattacks. Modular architecture simplifies the constant upgrading of OS Malevich
Hub receives new features several times a year with over-the-air updates. The update process is automatic and takes minutes when the security system is disarmed. The hardware configuration will allow Hub 2 to evolve and remain relevant for years to come
Communication protocols : Encrypted two-way radio protocols:
Jeweller : for transmitting events and alarms
Wings : for transmitting photos
Radio communication range :Up to 2000 m without obstacles
Radio frequency band : 866.0 – 866.5 MHz(depending on the sales region)
Radio signal modulation : GFSK
Maximum effective radiated power : (ERP) ≤ 25 mW
Polling interval :12–300 s (set by administrator in the app)
Time for alarm delivery from detector to hub : 0.15 s
Time for photo delivery from detector to hub : up to 9 s at default settings
Number of connected devices : up to 100 including range extenders and sirens
Number of connected ReX : up to 5
Number of connected sirens : up to 10
Number of security groups : up to 9
Number of users : up to 50
Video surveillance : up to 25 cameras or DVRs
Number of rooms : up to 50
Number of scenarios : up to 32
Central Monitoring Station communication protocols : SurGard (Contact ID) / SIA(DC-09) / Other proprietary protocols
Power supply : 110–240 V with a pre-installed power supply unit / 12 V with an alternative power supply unit 12V PSU / 6 V with an alternative power supply unit 6V PSU
Backup battery Li-Ion 2 Ah : (up to 16 h of battery life with Ethernet disabled)
Energy consumption from the grid : 10 W
Anti-sabotage protection : Tamper + / Radio frequency hopping + / Fraud protection + / Lid
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.