What Happens if My Network Fails?

No Internet-Marcelo GraciolliDoes your security system, or part of it, rely on your company’s internet network?  Or are you considering a system that is at least partially dependent on network connectivity?  If so, what happens if that network fails or is compromised?  Fortunately nowadays the chances of your network dropping or losing connection is pretty slim, in fact the probability of most Internet Service Providers (ISPs) experiencing an outage is about 1%.  But in the rare case that it does become inactive there are methods to keep security features active, in particular network attached surveillance or IP (Internet Protocol) cameras.  Maintaining an operating surveillance system is crucial to the overall effectiveness of a comprehensive security system.  Surveillance footage can aid in police investigations and the mere presence of cameras can help deter criminals.  Fortunately there are methods of streaming and recording footage even when your local area network (LAN) is down.

Our licensed integrators at Perfect Connections, Inc. understand the importance of security system continuity and one that functions with minimal incident.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We specialize in surveillance systems, fire and burglar alarms, and access control solutions.  There is no perfect system, but by installing redundancies and planning with prevention in mind, system issues will be few and far between.

Traditionally recorded surveillance footage would be stored on an external digital video recorder (DVR), but thanks to progressing technology and the desire to streamline everything, virtual and network storage options are becoming more popular.  The cloud is becoming a popular virtual storage method that is cost effective and has seemingly limitless real estate.  To find out more about the cloud, check out our post here.  Whether you’re using the cloud or an external device like a DVR, it’s not a bad idea to have a back-up in the unlikely event your network goes down.  Two common types of redundancies are Network Attached Storage (NAS) devices and SD memory cards.

NAS devices are installed on the same network as your security cameras.  If you’re network were to suddenly go out or someone accidentally caused and outage, the NAS would continue recording.  If you were using the cloud as your main storage and the network drops, the NAS device could be setup to automatically upload recorded data to the cloud once the network is repaired.  It’s also a cost effective method as multiple network cameras can be setup to stream to the same NAS device.

SD memory cards are exactly what they sound like.  They’re storage cards within the actual camera, essentially the same as memory cards used in digital cameras and other devices.  This type of technology is also sometimes referred to as “edge storage.”  SD cards are typically programmed one of two ways.  Either they are constantly recording regardless of the network status, or they are programmed to kick-in when network connection is lost.  According to Fredrik Nilsson, General Manager of the Americas for Axis Communications, using SD cards as a redundancy works best in smaller applications where there are minimal cameras.  The main reason being they cost more per gigabyte of storage in comparison to NAS devices that can accommodate multiple cameras on a single device.

While the likelihood of your network failing or dropping out is pretty low it’s always best to plan for the worst case scenario.  There is no perfect security system, but there are measures that can be implemented to ensure coverage when you need it most.  When it comes to surveillance it’s imperative to have continuity, therefore it couldn’t hurt to have redundancies installed when using network cameras.  NAS devices and SD memory cards are two effective back-up storage methods that will help retain critical information that can later be accessed if need be.  To find out which type of backup is best for your facility always consult a licensed security system integrator.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand no two businesses are exactly the same and that they should be treated with an individualized approach that suits their specific needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Marcelo Graciolli-Flickr-Creative Commons

What is Motion Detection and How Does it Work?

Motion_detectorWhen you think motion detectors (or sensors) you might picture a heist scene from the movies where a thief has to perform acrobatics in order to avoid a web of alarm triggering laser-beams surrounding a priceless gem.  While that narrative is not necessarily complete fiction, it’s not exactly how motion detection is implemented in the real world.  In modern day applications security system integrators use motion detectors to sense unwarranted movement within or outside of a home or facility.  Motion detectors are typically implemented as an essential part of a comprehensive security system meant to help detect an intruder.  There are different types of detectors and their applications are not necessarily synonymous.

Our licensed team at Perfect Connections, Inc. has been protecting homes and businesses throughout northern and central New Jersey with comprehensive security systems for the past 23 years.  We know one of the best ways to halt an intruder is immediate detection that triggers the alarm system.  Motion detectors do just that.  When they detect motion they communicate with the central alarm panel triggering an alarm, ultimately notifying your monitoring service of a disturbance; and before you know it help is on the way.

What are the different types of detectors?  In general there are two types of motion detectors, passive and active.  Within those two categories there are different detector technologies.  Passive detectors sense energy changes within a specific boundary whereas active detectors emit energy to detect motion.

Passive infrared (PIR) is a common technology that detects heat.  If there is disparity between the temperature of the protected area and an obstructive object (intruder) the sensors will be tripped and an alarm will be triggered.  This technology is not immune to triggering false alarms especially if automatic temperature compensation is not employed.  A PIR detector should have automatic temperature compensation to help stabilize the detector in variant temperature conditions.

Microwave (MW) is an active detector that emits microwave pulses and reads the reflection of a moving object.  This type of detector can cover a larger area than a PIR but it can be susceptible to electrical interference.  MW detectors do not recognize the boundaries of walls so they can trigger false alarms set off by random exterior motion.

Then there is Dual Technology detectors which employ a combination of active and passive sensors.  This could mean the combination of PIR and MW technology.  These types of detectors are less likely to set off false alarms as both types of sensors would have to be tripped in order for an alarm to be triggered.  However, that doesn’t mean these detectors are infallible.

Prior to the creation of PIR and MW detectors, motion detectors were not held in the highest regards by system integrators and end-users alike due to their high false alarm rates.  Before PIR and MW there was ultrasonics and photoelectric beams.  Ultrasonic detectors would send out high frequency tones and then interpret the reflections for any disruptions.  Photoelectric beams would send a light beam to a receiver that if interrupted would initiate the alarm sequence (picturing that heist scenario?).  These types of detectors were particularly susceptible to unpredictable movements as they didn’t have the technology to discriminate accurately.  While these motion detectors are not as widely used today they are by no means obsolete.

As technology progresses and the notion of wired installations becomes less and less appealing, wireless systems are taking off.  It’s no different with motion detectors.  Most can be installed wirelessly making their applications less laborious and diverse.  Many security system components have been developed to include interior motion sensors as well, like surveillance equipment and access controls.  For pet owners, there are motions detectors that can be setup to ignore regular motion from pets of a certain size.  Proper installation is crucial to the effectiveness of a motion detector therefore it should be done by a licensed professional.

Comprehensive security systems are what protect your home and business from external and internal threats.  It’s important to consider motion detectors as part of a comprehensive system.  They provide a layer of security that can’t be duplicated, sensing an intruder at the first sign of a break-in.  As licensed security system integrators, our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and homes throughout northern and central New Jersey since 1992.  We help protect what is most important and give you a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by CHG (Own work)-Google-Creative Commons

Healthcare Climate and Security

Healthcare-NEC Corp of AmericaHealthcare facilities pose a unique security situation.  By nature they hold a lot of risk other organizations don’t necessarily have to deal with.  Most healthcare facilities are open to the public and provide care for a vast array of people on a daily basis.  Many facilities also house expensive and often sought after narcotics or medications.  Also, recent changes to healthcare policies are having an effect on everyday operations and their implications may not be fully realized yet.  These factors combined with the unpredictability of patient and public behavior make healthcare facilities particularly sensitive environments that require special attention when it comes to security.

As licensed security system integrators our team at Perfect Connections, Inc. understands the changing healthcare climate is producing security risks that need to be addressed.  We have been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992.  Protecting the integrity of any healthcare facility is crucial to the safety of not only its patients and the general public, but medical staff as well.

Unfortunately, healthcare facilities are no strangers to criminal activity.  The 2012 Crime and Security Trends Survey, based on responses from 208 healthcare organizations across the United States, showed that incidents of crime at healthcare facilities are on the rise.  In just two years from 2010 to 2012 these incidents rose 37% from a reported 15,000 to more than 20,500.  Keep in mind these were reported events.  The US Department of Justice estimates that at least half of the crimes committed go unreported.  A reason organizations fail to report disturbances is at least partially due to the fact that they don’t want to look bad in the public eye and potentially lose patronage.

There are many contributing factors to the rise in criminal incidents at healthcare facilities.  For one, many facilities are open to the public 24 hours a day, 7 days a week which can leave them vulnerable.  Outside disputes sometimes spill into the healthcare environment causing disturbances and putting staff and patients at risk.  Many facilities house pharmaceuticals which can attract substance abusers and drug dealers, increasing the risk of narcotic theft and violence.  Another security issue facilities face is when their real estate expands.  When healthcare organizations acquire new facilities it can be difficult to create consistency in mitigating risks and instituting security protocols, especially across sprawling campuses.

The Affordable Care Act (ACA also known as “Obamacare”) poses a not so obvious concern when it comes to healthcare security.  How can a healthcare policy affect security you ask?  According to James Barbour, Market Research Analyst on the Kratos PSS Marketing Team, the ACA will undoubtedly have implications on healthcare budgets.  He says, “Hospitals will guard their budgets cautiously, and security—traditionally viewed as a cost center—will feel the pinch.”  Experts also estimate a rise in patient volume due to more people being insured.  This has the potential to overwhelm facilities that are already stretched too thin due to budget cuts.  The repercussions of the ACA have not been fully realized in general, however security integrators and healthcare professionals should be thinking about ways to effectively and economically manage the risks associated with the healthcare environment.

Often times a healthcare facility will employ physical security guards to help ensure the safety of their staff and patients.  However, in the changing economy and in light of policy changes we know security may be faced with spending challenges.  Security guards may be on the chopping block when it comes to budget costs, so how can facilities make up for the lack of physical security?  Implement comprehensive security systems that include access controls, surveillance, monitoring and notification systems, and lockdown capabilities.

Access control systems can help limit who can gain entry to specific areas of your facility.  This would help in sensitive areas, like pharmaceutical storage and data centers.  According to Joe Liguori, president of the Board of Directors Security-Net, “healthcare facilities are finding that there is a long-term cost savings by implementing access control for storage and supply closets, for example, eliminating the need to change locks and replace lost or stolen keys.”  Access control can also help decrease or eliminate theft.  By using different methods like card readers, fobs, or sometimes biometrics credentials are harder to duplicate or steal making it easier for medical staff to focus on what is most important, their patients.

In addition to access control, surveillance plays a key role in crime prevention and overall safety.  Security cameras allow an organization to have eyes across their entire facility including areas that often go unprotected like parking lots/garages.  Having a monitored security system, especially in regards to surveillance, helps alert the proper authorities faster in an emergency.  In tandem with a monitoring service, a mass notification system can notify the right personnel in an emergency or dangerous situation as it is occurring.  Being notified of an event as it happens would allow for immediate action and hopefully prevent further damage.  This is where lockdown capabilities would be beneficial as well.  All it would take is the touch of a single button from a facility member, and part or all of a building could be shut down.  This is a particularly beneficial feature that can keep a perpetrator out of certain areas in high risk scenarios.  Fortunately, lockdown capabilities can sometimes be easily integrated with existing access control features.

While crime statistics can seem daunting, it’s important to remember that many, if not most, healthcare facilities are generally considered safe.  However, as a healthcare professional or facilities manager it behooves one to consider the risks specific to their organization and how they can be mitigated.  As security system integrators, our licensed team at Perfect Connections, Inc. has been providing comprehensive security solutions to healthcare facilities throughout northern and central New Jersey for the past 23 years.  Just like your patients, we know that no two facilities are exactly the same and that it takes an individualized approach to solve specific needs.

If you live or run a healthcare facility in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by NEC Corporation of America-Flickr-Creative Commons

What’s The Difference Between Conventional & Addressable Fire Alarms?

Fire Alarm-shlala-FlickrAs with anything in the security systems industry, prevention is vital.  Preventing catastrophic loss is a top priority and one of the most crucial security system components that helps avoid such situations is the fire alarm system.  This is a no brainer, but there is some disparity between what type of fire alarm system is best.  In the alarm industry there are basically two types of fire alarm installations, conventional and addressable (or analog addressable).  As always, every situation and application is different therefore claiming one system is superior to the other may not be the right approach.  However, it is important to understand the difference between systems and why one might be used over the other.

Regardless of the type of system installed, all have to meet the National Fire Protection Association (NFPA) codes, local regulations, and the Life Safety Code enforced by the authority having jurisdiction (AHJ).  All commercial buildings are required to have a code compliant fire alarm system, the best way to ensure proper installation is to hire a licensed integrator with knowledge and experience.  Our licensed experts at Perfect Connections, Inc. have been providing comprehensive security system solutions, including fire alarms, to facilities throughout northern and central New Jersey for the past 23 years.  We stay updated on current technologies and how they may benefit our customers, implementing solutions that fit individualized needs.  It’s also part of our mission to help our clients gain a better understanding of the systems that we install.

To understand the difference between an addressable fire alarm system and a conventional one you must first understand what a fire alarm system is.  In general a fire alarm system is a group of visual and audio devices (automatic and/or manual)-i.e. smoke detectors, heat sensors, strobes, alarm pulls, and sprinklers-linked to a main fire panel that sends a signal to local emergency responders when an alarm is activated.  Each device has to be linked to the main fire panel, but there are different methods of doing so.  This is where the big difference between addressable and conventional comes into play.

fire alarm system diagramAddressable fire alarms indicates that each installed device or module is connected to the main fire panel in a “loop” often by means of a singular wire.  Conventional alarm systems require individual wires per each device, again connecting back to the main fire panel.  The most obvious difference between the two, in terms of installation, is cabling requirements and labor costs.  Due to the fact that addressable systems require less cabling they make for less complex installations.  That’s not to say there aren’t situations where a conventional system might make more sense.  Although it seems most new construction projects implement addressable systems.

One of the many benefits of an addressable fire alarm system is that each device is given its own unique address.  In the event of a triggered alarm a single device can be pinpointed which gives responders a more concise location as to where a fire might be occurring.  This helps save precious time and improves life safety.  It’s also helpful in the event a device is malfunctioning or requires maintenance.  According to Jim Kimpel, product manager for Fire Control Instruments, Inc., being able to pinpoint specific devices lessens the hesitation an end-user might have-mostly caused by the fear of costs-when making a service call.  This helps prevent unnecessary losses due to a defunct system.

As with any alarm system, routine inspections are required for addressable fire alarm systems.  According to Brandt Phillips, Commercial Fire & Security Director of Sales for Napco Security Technologies Inc., inspections and system testing are made easier with addressable systems.  He says installing an addressable system, “…eliminates the need for expensive testers, excessive labor for testing, and gives you the ability to automatically generate the same reports directly from the software you used to program the panel…”  In comparison Phillips points out that inspections for conventional systems can cost thousands and be quite lengthy.

While conventional systems may require extensive wiring, intensive testing, a higher labor cost, and are being phased out by addressable alarms, they’re not completely disregarded when it comes to installations.  The size of a project may determine what type of system is a better fit.  It seems that for small jobs, i.e. a single story office building, conventional systems may work just fine.  They’re initial upfront costs are fairly low and if you’re not dealing with multiple floors and zones it may not be necessary to implement an addressable system.  However, the appeal of quick installs, concise reporting of fire occurrences, and the ease of inspection and system testing will continue to draw support for addressable systems; it seems to be the trend in most new construction projects.

With fire and life safety codes continually evolving, in tandem with developing technologies, there’s no telling what advancements will emerge next.  For now, streamlining processes and incorporating intelligent components will continue to help shape the fire alarm systems of today.  Our licensed experts at Perfect Connections, Inc. are committed to providing security systems that enhance life safety and help prevent disasters.  We have been installing comprehensive security system solutions, including fire alarms, to facilities throughout northern and central New Jersey since 1992.  Don’t wait for the unpredictable to happen, let us help you protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image #1 by shlala-Flickr-Creative Commons, Image #2 by fire-magazine.com

What Makes A Security System A System?

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that a security system should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing comprehensive security solutions to homes and businesses in northern and central New Jersey for the past 23 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons

What Does Wide Dynamic Range Mean in Surveillance?

When it comes to surveillance cameras, visibility is key.  Some of the obstacles surrounding a camera’s capability to retain clear images such as lighting, camera installation, and type of camera are somewhat within our control, others are not.  Uncontrollable issues of extreme brightness, like light produced from headlights and the sun, or extreme darkness are not necessarily easily overcome.  However, as with anything, technological progression helps change these harrowing limitations.  As industry professionals our team at Perfect Connections, Inc. has been providing security system solutions, including surveillance, to organizations throughout northern and central New Jersey for the past 23 years.  We’ve seen the impact changing technology has on the equipment we install and how it can be beneficial to our customers.

Surveillance systems are in the midst of a transition from using conventional analog equipment to IP (Internet Protocol).  Why? For one, image quality.  The tricky thing with IP cameras is not all are created equal.  There isn’t necessarily a defined industry standard that is accepted by all integrators and camera manufacturers when it comes to “best” image quality.  For example some might argue that the higher the megapixel count the better, but it doesn’t necessarily guarantee a better image.  At least with HD (high definition) cameras there are standards manufacturers must comply with in order to be considered HD.

Aside from pixel count, an IP camera’s display threshold in extreme conditions is critical, but limited.  This limit, specifically when referring to extreme brightness or darkness, is typically known as “dynamic range.”  Wide dynamic range (WDR), “allows cameras to capture much more detail in scenes where there are varying levels of light, much like the way the human eye ‘processes’ these types of scenes.”  You know the feeling of widening your eyes in the dark to try to see clearer because you’re eyes haven’t quite adjusted yet?  It’s sort of the same idea with WDR cameras and how they adapt in both light and dark conditions.  However, their adjustments aren’t a physical strain and transitions are typically quicker than ours.

WDR footageThe images above show the difference between a parking garage being monitored by a camera with no WDR or WDR turned off on the left, and on the right the same area monitored by a camera with WDR enabled.  The difference is clear as day.  Why do they differ so much?  The camera with the WDR enabled has two internal Charge-Coupled Devices (CCD).  The two devices, or sensors, scan an image at different speeds, one low and one high, the image processor then combines the separate images producing a clearer, more balanced picture with better contrast and lighting.  This process happens quickly enough to produce a stream of clear recorded footage.  There are many different manufacturers that produce these WDR cameras in the market today, and not all of them use the same type of sensor and image processing combinations.  The best way to ensure you are getting the best camera for your specific application is to hire a licensed security systems integrator who is educated in which camera specifications will work best in variant conditions.

WDR technology, like anything else, is not perfect.  Depending on the camera manufacturer, you could end up with a camera that takes up to 15 seconds to adjust with varying light levels.  That doesn’t sound like that long, but it could mean the difference between catching a perpetrator and them getting away.  Another issue you might run into are cameras that don’t have the ability to turn WDR settings on and off automatically.  Without the automation the transition becomes the responsibility of someone on site, which can be time consuming and ineffective in a time sensitive situation.  This is why it is vital to consult a professional security systems integrator who is educated in the differences between product specifications and their appropriate applications.

The clarity of recorded video footage is crucial to the security of any organization.  As a business owner you don’t want to be left wondering why your recordings are grainy, washed out, or so dark they become unusable.  No one can control the external factors that affect an organization, but you can be prepared for them by taking the proper precautions.  Licensed system integrators are there to help.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We recognize the importance of utilizing quality security products that not only perform well but perform to their intended specifications.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by IQinVision-Google-Creative Commons

What Is Web-Based Access Control?

Scott Lewis-smart lockThe technological climate is swiftly changing the way we connect and interact with the physical world.  Endless runs of cable and spaghetti wiring is becoming an antiquated notion with the development of wireless internet based equipment.  This is evident in the way some security system integrators are approaching system design and installation.  As industry professionals, our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey for the past 23 years.  It is our goal to not only provide innovative security equipment, but implement components that are effective and make sense within a specific organization.

Access control has always been a top security concern for any establishment.  Whether it means using a lock and key, card reader, or fingerprint, it’s a means by which your business is shielded from unauthorized personnel.  As an integral part of a comprehensive security system, access control mechanisms need to function on the same level as their system counterparts.  Meaning software and technology updates/applications should apply across the board without disrupting the system as a whole.  IP (Internet Protocol)/web-based technologies are making the advancement of security system components more attainable and desirable to both end-users and system integrators.  This is evident in the continuing migration from analog based surveillance to IP.  Web-based technology is not exclusively transforming surveillance, but security systems as a whole, including access control mechanisms.

What does web-based/IP access control really mean?  Your typical access control system is made-up of software, card/badge readers, controllers, and credentials.  In many existing systems today, the software has to be updated manually or on site, the readers and controllers have to be supplied with wired power, and credentials typically constitute a fob or swipe card.  With web-based or IP access control everything from installation to software updates changes.  Much like many IP surveillance cameras, web-based access control systems are connected to a company’s internet network.  Access control that operates over a network opens the door (pun intended) to increased scalability, installation flexibility, remote system access and management, reduction in the need for traditional power outlets, and cost efficiency.  This creates a more open platform for system management and integration.

In the not so distant past access control systems would be designed with products from a single manufacturer.  While this may seem like a good idea, think about what happens if products are discontinued or the manufacturer goes out of business and no longer supports your system.  You’re left with having to start from scratch which is not only a hassle but costly as well.  With web-based access control, components don’t necessarily have to be supplied by one manufacturer.  Being able to source readers, controllers, and credentials from different manufacturers benefits the end user and security integrator by limiting the cost of repair or replacement, as well as creating a smoother transition between software updates and system upgrades.  The technology and software behind these products are becoming more universal which leads to better overall system operation and integration.

The flexibility of web-based access control systems far surpasses physical access controls used in the past.  You have the option to secure multiple entry points at a singular site or across numerous sites nationwide, even worldwide.  Unlike traditional systems, multiple sites can be controlled, updated, and managed from a singular location either on site or remotely over a secured network.  In this sense web-based security features help with system management consolidation; streamlining operation processes making the day-to-day more convenient.

One of the most desirable features of web-based access control systems is the reduction of required cabling.  Depending on the application, readers don’t necessarily have to be wired directly to the network.  This cuts down on cabling and labor costs.  It also provides flexibility in situations where cabling may not be an option, such as installations in historical buildings.  Same is true about the energy supply to readers and locks.  In the past it may have been difficult for integrators to place access control equipment because of a lack in electrical outlets or supply.  Now, with web-based access control equipment, often times power can be supplied through a direct network connection known as PoE (Power over Ethernet).  PoE connections provide power and data to a connected device through a singular cable.

According to Bill Moran, vice president of Sales for Red Cloud Security, “Web-based access control offers features and functionality that enhance an organization’s security posture. From one consolidated screen, administrators can view and manage alarms, video surveillance, facility maps, and identities including photo and personnel details.”  He also points out that in the event of a triggered alarm or someone forcing their way through an entry point, the network can be suspended while cameras at the scene can be accessed for live streaming.  This is where the idea of a comprehensive security system comes into play, where all of the components are easily accessed and essentially working together.

Web-based security features are transforming the way end-users and industry professionals perceive security in general.  In a world that continues to become more and more connected through technological advancement and the IoT (Internet of Things), it only makes sense that the infrastructure of the physical world should follow suit.  Web-based access control is just another step in the direction to a more convenient and secured future.  At Perfect Connections, Inc. our licensed professionals are always looking for and researching technologies that better serve our customers.  Our team has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey since 1992.  We help you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Scott Lewis-Flickr-Creative Commons

How Does Home Automation Affect Home Security?

Smartphone-Phil CampbellAs the technology driven world continues to evolve, our lives are becoming more and more connected.  Virtual distances are shrinking.  This has been happening since the inception of the internet.  You no longer have to fly across the world to have a meeting, you simply login to a virtual meeting where you can talk “in-person” via video chat.  Although it may be imperfect, technology has certainly had an impact on all of our lives in one way or another.

Our lives are saturated in advanced technological gadgets, everything from our cars to our smartphones, why should our homes be any different?  It used to be enough having a home security system that would alert the authorities in an emergency, but why stop there?  Home automation, or the “connected home,” is quickly becoming an integral part of a comprehensive home security system.  It’s a driving force that is changing the way homeowners and system integrators perceive “home security.”

As a licensed security system provider, our professionals at Perfect Connections, Inc. are always looking for the best ways to protect your home.  We have been providing comprehensive security system solutions to residences throughout northern and central New Jersey for the past 23 years.  Technological advancement means we are constantly learning and adapting our solutions to best suit client needs.  That’s not to say just because something is new that it should be implemented, we do our due diligence before installation of any product including home automation devices.

Home automation products aren’t exclusively linked to home security.  In fact there is a plethora of automation devices that can be installed separate from a security system, often requiring a DIY (do it yourself) approach.  For example there are devices that can be attached to kitchen appliances that can be controlled by logging into apps on your smartphone.  However, rather than complicating our daily lives by having to download separate apps for everything in our homes, we have steadily been adopting technology in an effort to streamline and simplify.  When it comes to home security, with DIY solutions you’re likely not getting full coverage while simultaneously complicating processes.  Plus they often lack continuity and one of the most important aspects of a security system, monitoring.  Rather than separating the functions of a home security system and home automation, integrators and homeowners are combining the two creating more efficient and effective life safety and lifestyle systems.

One of the top benefits of home automation is convenience.  Capabilities include remote interaction with home devices and your security system.  Imagine being able to know the exact moment your kids walk through the front door while you’re at work or on your way home.  With home automation you’re able to set up custom notifications that will be sent to your smartphone, mobile device, or computer.  This means you can go on vacation and be notified of temperature drops in your home, package deliveries, or close the open garage doors you forgot about before you left.

Depending on your home automation application, often times you can log-in to your surveillance cameras, turn lights on and off, lock and unlock doors, control media (audio and video), arm and disarm your alarm system, all from the convenience of your mobile device.  When integrated with your home’s security system a singular control panel can be centralized to help avoid confusion that can result from having too many different operating mechanisms.

As a homeowner you might be asking yourself “how will home automation affect my security system?”  For the most part home automation is considered a promising and revolutionary approach to added home safety and efficiency, but as with anything, it isn’t perfect.  Any technology that operates over the internet inherently comes with the looming threat of hackers.  Why would someone want to hack a home automation or security system?  To state the most obvious, they’re likely interested in disabling your alarm system so they can break-in.  Other reasons could include wanting to cause general havoc by tampering with your lights or HVAC system, wasting energy for no other reason than driving up your utilities bill; for “fun.”

Fortunately there are ways to decrease the chances of being hacked, both on the user and integrator end.  In many cases home automation operates wirelessly over a home Wi-Fi network.  No matter how protected you think your network may be it should always be protected with encryptions and user authentication.  The same holds true for connected security devices and any device that transmits a signal.  There must be authentication between home automation devices, the security system, and whatever mobile device you are using to access them.  Otherwise your system is susceptible to third party hackers.

Take the case of Insteon home automation systems back in 2013.  Kashmir Hill, a Forbes Staff Writer, highlights the findings of David Bryan and Daniel Crowley, security researchers at Trustwave, and what they discovered is alarming (for lack of a better word).  They found that not only was there a lack of password protection on the consumer end, but that the Insteon products (now discontinued, for obvious reasons) themselves did not require usernames and passwords and were “crawl-able” (searchable) on the web.  This meant that anyone with a little know-how could access and mess with the connected Insteon products; unnerving to say the least.  Be sure to hire licensed professionals that fully understand the products they are installing and how they will interact with your home network.

While technology is imperfect and constantly transforming you can be sure if you hire a licensed security integrator with product knowledge and experience you’ll be setting yourself up for success.  A professional with industry knowledge will be able to ensure your system is as secure as it can be by using products that require authentication and that your network is encrypted.  As a licensed security system provider, our team at Perfect Connections, Inc. understands that securing a home and improving the lives of others doesn’t mean haphazardly throwing random products together just to get a job done.  We have been providing security solutions to homes throughout northern and central New Jersey since 1992.  Technological evolution is never-ending as is our commitment to providing the safest products and security systems available.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Phil Campbell-Flickr-Creative Commons

Should Surveillance Systems Share A Network With Office Computers?

Network-Norlando PobreWhether you are installing a new surveillance system or changing an existing one you need to consider the type of system and the operating implications associated with it.  The desire for advanced image quality, video analytics, ease of integration, and remote access has ushered in the era of IP (Internet Protocol) surveillance systems.  IP surveillance systems have opened the door to a more integrated security system and they provide increased scalability which is important to company growth and future adaptation.  This type of surveillance system typically relies on an internet network, and as they say “therein lies the rub.”

Should your surveillance system operate on the same internet network as your office computers?  The answer is not a simple yes or no.  The short answer being it certainly is a viable option, but it could depend on the size and type of business you run.  It’s also possible to set up an IP surveillance system on its own network but it may not be cost effective or necessary.  For these reasons it is imperative to consult a licensed security system professional when altering or adding a surveillance system.

When it comes to a company’s network there seems to be some trepidation about how and what devices can and should be allowed on it.  It’s understandable, a company’s network is often a basis for its everyday functions, but where does the worry come from?  A lot of it usually has to do with a communication gap between security integrators and IT professionals or end users.  At Perfect Connections, Inc. our licensed experts are able to provide clear and understandable information about the surveillance equipment we implement and how it will affect your company’s network.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  Our team has witnessed and been a part of the migration from mainly analog surveillance to IP.

Let’s discover the common concerns about network devices and how they can be dissolved, but first we’ll review some quick terminology when talking about networks.  LAN, MAN, and WAN are three basic types of networks you’ll likely hear about from integrators and IT professionals.  Local area networks (LANs) are typically found at most small to medium sized businesses as they cover a smaller more specific area.  In all likelihood your company operates on a LAN network.  Metropolitan area networks (MANs) cover a larger area and are usually present in cities and across large campuses.  Wide Area Networks (WANs) provide the most coverage, anything from expansive distances to the whole world.  According to Fredrik Nilsson, general manager for Axis Communications in North America, WANs are often comprised of multiple smaller networks including LANs and MANs.

All networks are comprised of some sort of cabling and equipment such as switches, servers, and hubs.  The most popular type of network configuration used with LANs is called star.  A star configuration allows all network devices to be connected to a central point where if one device crashes the rest will remain in operation.  However, redundancies are typically incorporated to account for the possibility of a central station crash.

Now that terminology is out of the way, what are some of the major concerns one might have when adding surveillance equipment to a company network?  One of the most common is bandwidth consumption.  This often stems from companies that have had to deal with employees streaming or downloading videos via company networks which eats into the available bandwidth.  According to James Marcella, director of technical services for Axis Communications, IP surveillance equipment is wrongly accused when it comes to bandwidth consumption.  He says most IP cameras today can be customized to fit a company’s network and storage guidelines.  To help limit their consumption surveillance can be setup on a Virtual LANs (VLANs) which Marcella says, “prevents video traffic from grabbing the lion’s share of bandwidth.”

Then there’s the ever-present question, “what about hacking?”  In our world where virtually everything is connected through the IoT (Internet of Things), it’s hard not to worry about who can access private information and how that information is being protected.  Having surveillance equipment on the same network as your company computers may seem scary, but in reality, more oft than not, there are procedures in place to prevent hacker access.

When it comes to adding network devices and keeping the network safe authentication protocol and data encryption are key.  According to Marcella authentication protocol protects the network at the physical port level.  If someone were to unplug a network camera and try to plug in their own device, all “traffic” to that port’s switch would automatically be shut down as the foreign device wouldn’t have the proper authorization.  Data encryption is essentially creating a password to your network whether it’s wired or wireless.  This prevents someone from getting into your network or freeloading on your company’s internet.  Encryptions can be highly effective as long as they are not something obvious or easily guessed.

Lastly, network storage is a top concern.  This is often directly linked to bandwidth consumption concerns.  Due to high image quality of IP camera recordings it’s not uncommon for businesses to store video footage for longer periods of time.  Fortunately, with IP surveillance systems you don’t necessarily have to store recordings directly on the network.  For smaller installations there is the option to utilize in-camera storage through internal SD cards (Secure Digital Cards).  Network Attached Storage (NAS) devices and cloud-based systems are other viable options.  In order to determine which method is best for your company an evaluation of camera quantity and storage needs should be conducted.

Whether you are adding a new surveillance system or updating an existing one it’s imperative to consider the impact it will have on your company’s network, if any at all.  Always consult a licensed security system professional as they can help guide you or your IT department through the process from initial assessment to final installation.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We can help break down the communication barrier that sometimes creates apprehension when installing network devices.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Norlando Pobre-Flickr-Creative Commons

What You Need to Know About Fire Alarm Maintenance

Fire Strobe-Alfonso PierantonioFire is an unpredictable force that can wreak havoc on any business.  It is imperative as a business owner, facility manager, or building owner that the proper precautions are in place to help prevent catastrophe.  The NFPA (National Fire Protection Association) is a leading advocate in fire prevention and safety.  They’ve written numerous codes and standards that have been implemented nationwide.  These standards are designed to help reduce the risk and effects of fire.  In combination with local regulations, NFPA codes and regulations are what system integrators and contractors have to follow in order to pass inspection from local authorities.

While you no doubt have some sort of fire detection and/or suppression system in operation it’s important to maintain it in accordance with national and local requirements.  As a security systems integrator, our team at Perfect Connections, Inc. has been installing fire alarm systems in business facilities throughout northern and central New Jersey for that past 23 years.  We specialize in comprehensive security systems that include fire alarms as a major component to a fully functioning system.  We do offer maintenance and service contracts helping you preserve a system that will continue to pass annual inspections and work efficiently in the event of a fire.

What goes into fire alarm maintenance?  First off, unless you or your staff is trained and licensed, you must hire a licensed technician.  This will help avoid accidentally setting off any false alarms which can result in substantial fines.  A common starting point, whether the system is fairly new or if you moved into a space with an existing system, is to find out the systems age and maintenance history.  The age of a fire alarm system will help determine whether or not components need to be replaced and what type of maintenance might be required.

According to Mike Lohr, director of service marketing for SimplexGrinnell LP, “Systems between five and ten years old may experience component breakdown caused by harsh, but normal, environmental factors. Voltage fluctuations, temperature, and humidity may cause system failure or nuisance alarm problems.”  He notes that systems between 5-10 and 10-15 years can provide adequate “life-safety” responses, but those within the 10-15 year marks should be watched carefully.  This is even more important if you have a shoddy record of maintenance history as it could have been poorly taken care of in the past.

Aside from knowing the age of your system you have to take any specific regulations the local authority having jurisdiction (AHJ) might have into consideration.  While the NFPA provides codes and standards for the nation, the AHJ will likely have their own set of rules that are specific to the area they preside.  This means that even if your system meets NFPA standards it may not pass local inspection because of AHJ specifications.  For this reason it is imperative to hire experts that are licensed and educated not only in maintenance specific to your system, but national and local requirements as well.

In most cases fire alarm systems must be inspected at least once a year some may require a more frequent assessment.  It really all depends on the type of business.  During an inspection all components of the system will be tested so if something is not functioning properly, it will likely be taken care of at that time.  Before an inspection you should notify the building occupants as the alarms will be tested and it gets noisy.  Your alarm system company is the one who should contact the alarm monitoring station and local authorities in advance to avoid false emergencies.

Maintaining a functional fire alarm system is key to preventing potential catastrophe.  It helps protect not only the physicality of your business, but everything that goes into running your business, i.e. you, your employees, company records, and equipment.  If you ever consider cutting corners when it comes to fire alarm maintenance carefully consider the extent of what it might cost you if you do.

While as a business owner you may not need to know all the fine details of what goes into fire alarm maintenance, it is important to have a basic understanding of what you can expect when the time comes.  For further information on fire alarm maintenance and inspections check out our related blog post HERE.  If you run a business in northern or central New Jersey do not hesitate to call on our licensed technicians at Perfect Connections, Inc..  We have been providing comprehensive security system solutions including fire alarm installation and maintenance since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alfonso Pierantonio-Flickr-Creative Commons