Who We Are

About Us

When a group of dedicated and reliable professionals gather to provide you services, you can rest assured that you will receive the best quality of service. We focus on making and retaining customer relationships by providing them affordable mobile, desktop and network solutions that are designed for their unique needs.

CSG is a group of highly trained and skilled engineers providing full services of Information Technology and Business Infrastructure to businesses who wish to take matters of IT out of their hands.

What We Can Do

Our Services

Intercom System

CSG will get you setup with a professional intercom system, we can do anything from one entry to multiple entries, with our intercom systems you can control access into your building by communicating with the person trying to gain entry.

Cabling Copper and Fiber Installation

The proper application of data cabling and wiring (also referred to as network cabling & wiring) is imperative for successful business, government and academic network infrastructure installations.

Telephone and Computer Systems

While much of the world has changed to cell phones, there is still very much a demand for super long-range cordless phones and CSG are specialist suppliers in this area, with sleek design and the modern features you’d expect.

INTRUSION

CSG partners with leading security market manufacturers to provide state-of-the-art intrusion detection systems. We can design and install a system you can rely on, tailored to meet your budget and specific requirements. Plus, we can help maximize your security coverage by integrating intrusion detection with your new or existing access control and video surveillance.

Read More

IP Video

CSG provide access to video at any time from any network location, allowing remote monitoring, investigation, and incident response by remote physical security staff or law enforcement personnel. Designs leverage existing investment in video surveillance and physical security equipment and technology, and allow products from various vendors to interoperate in the same network An open, standards-based infrastructure is employed, enabling flexible deployment and control of new security applications.

Access Control

When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential’s number to an access control list, grants or denies the presented request, and sends a transaction.

When access is denied based on the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door.

Subscription

Keep Up To Date

To get the conversation going, fill out the inquiry form or give us a call at 405-557-7001

We look forward to hearing from you!

Visit Us
www.catanachservicegroup.com
Email Us
info@catanachservicegroup.com
Call Us
404-557-7001