Description
Functions up to 35 hours after a power outage.
All data is encrypted.
Transmits alarm in 0.3 seconds.
Manages the devices if the hub connection is lost
Regular range extenders can increase the risk of losing the alarm signal during transmission, and therefore become the weakest link in the security systems. This is not the case with the ReX. If the connection with the hub is interrupted for some reason, ReX will assume control. If it receives an alarm signal from the detector, it will activate the siren.
Software attacks
ReX is protected against software and hardware attacks. The OS Malevich operating system running ReX is not vulnerable to viruses or exploits, which prevents disruptions resulting from attacks on the firmware code. It is not possible to hack ReX by intercepting the signal — the information that the device receives and sends is encrypted.