What Does Wide Dynamic Range Mean in Surveillance?

When it comes to surveillance cameras, visibility is key.  Some of the obstacles surrounding a camera’s capability to retain clear images such as lighting, camera installation, and type of camera are somewhat within our control, others are not.  Uncontrollable issues of extreme brightness, like light produced from headlights and the sun, or extreme darkness are not necessarily easily overcome.  However, as with anything, technological progression helps change these harrowing limitations.  As industry professionals our team at Perfect Connections, Inc. has been providing security system solutions, including surveillance, to organizations throughout northern and central New Jersey for the past 23 years.  We’ve seen the impact changing technology has on the equipment we install and how it can be beneficial to our customers.

Surveillance systems are in the midst of a transition from using conventional analog equipment to IP (Internet Protocol).  Why? For one, image quality.  The tricky thing with IP cameras is not all are created equal.  There isn’t necessarily a defined industry standard that is accepted by all integrators and camera manufacturers when it comes to “best” image quality.  For example some might argue that the higher the megapixel count the better, but it doesn’t necessarily guarantee a better image.  At least with HD (high definition) cameras there are standards manufacturers must comply with in order to be considered HD.

Aside from pixel count, an IP camera’s display threshold in extreme conditions is critical, but limited.  This limit, specifically when referring to extreme brightness or darkness, is typically known as “dynamic range.”  Wide dynamic range (WDR), “allows cameras to capture much more detail in scenes where there are varying levels of light, much like the way the human eye ‘processes’ these types of scenes.”  You know the feeling of widening your eyes in the dark to try to see clearer because you’re eyes haven’t quite adjusted yet?  It’s sort of the same idea with WDR cameras and how they adapt in both light and dark conditions.  However, their adjustments aren’t a physical strain and transitions are typically quicker than ours.

WDR footageThe images above show the difference between a parking garage being monitored by a camera with no WDR or WDR turned off on the left, and on the right the same area monitored by a camera with WDR enabled.  The difference is clear as day.  Why do they differ so much?  The camera with the WDR enabled has two internal Charge-Coupled Devices (CCD).  The two devices, or sensors, scan an image at different speeds, one low and one high, the image processor then combines the separate images producing a clearer, more balanced picture with better contrast and lighting.  This process happens quickly enough to produce a stream of clear recorded footage.  There are many different manufacturers that produce these WDR cameras in the market today, and not all of them use the same type of sensor and image processing combinations.  The best way to ensure you are getting the best camera for your specific application is to hire a licensed security systems integrator who is educated in which camera specifications will work best in variant conditions.

WDR technology, like anything else, is not perfect.  Depending on the camera manufacturer, you could end up with a camera that takes up to 15 seconds to adjust with varying light levels.  That doesn’t sound like that long, but it could mean the difference between catching a perpetrator and them getting away.  Another issue you might run into are cameras that don’t have the ability to turn WDR settings on and off automatically.  Without the automation the transition becomes the responsibility of someone on site, which can be time consuming and ineffective in a time sensitive situation.  This is why it is vital to consult a professional security systems integrator who is educated in the differences between product specifications and their appropriate applications.

The clarity of recorded video footage is crucial to the security of any organization.  As a business owner you don’t want to be left wondering why your recordings are grainy, washed out, or so dark they become unusable.  No one can control the external factors that affect an organization, but you can be prepared for them by taking the proper precautions.  Licensed system integrators are there to help.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We recognize the importance of utilizing quality security products that not only perform well but perform to their intended specifications.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by IQinVision-Google-Creative Commons

What Is Web-Based Access Control?

Scott Lewis-smart lockThe technological climate is swiftly changing the way we connect and interact with the physical world.  Endless runs of cable and spaghetti wiring is becoming an antiquated notion with the development of wireless internet based equipment.  This is evident in the way some security system integrators are approaching system design and installation.  As industry professionals, our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey for the past 23 years.  It is our goal to not only provide innovative security equipment, but implement components that are effective and make sense within a specific organization.

Access control has always been a top security concern for any establishment.  Whether it means using a lock and key, card reader, or fingerprint, it’s a means by which your business is shielded from unauthorized personnel.  As an integral part of a comprehensive security system, access control mechanisms need to function on the same level as their system counterparts.  Meaning software and technology updates/applications should apply across the board without disrupting the system as a whole.  IP (Internet Protocol)/web-based technologies are making the advancement of security system components more attainable and desirable to both end-users and system integrators.  This is evident in the continuing migration from analog based surveillance to IP.  Web-based technology is not exclusively transforming surveillance, but security systems as a whole, including access control mechanisms.

What does web-based/IP access control really mean?  Your typical access control system is made-up of software, card/badge readers, controllers, and credentials.  In many existing systems today, the software has to be updated manually or on site, the readers and controllers have to be supplied with wired power, and credentials typically constitute a fob or swipe card.  With web-based or IP access control everything from installation to software updates changes.  Much like many IP surveillance cameras, web-based access control systems are connected to a company’s internet network.  Access control that operates over a network opens the door (pun intended) to increased scalability, installation flexibility, remote system access and management, reduction in the need for traditional power outlets, and cost efficiency.  This creates a more open platform for system management and integration.

In the not so distant past access control systems would be designed with products from a single manufacturer.  While this may seem like a good idea, think about what happens if products are discontinued or the manufacturer goes out of business and no longer supports your system.  You’re left with having to start from scratch which is not only a hassle but costly as well.  With web-based access control, components don’t necessarily have to be supplied by one manufacturer.  Being able to source readers, controllers, and credentials from different manufacturers benefits the end user and security integrator by limiting the cost of repair or replacement, as well as creating a smoother transition between software updates and system upgrades.  The technology and software behind these products are becoming more universal which leads to better overall system operation and integration.

The flexibility of web-based access control systems far surpasses physical access controls used in the past.  You have the option to secure multiple entry points at a singular site or across numerous sites nationwide, even worldwide.  Unlike traditional systems, multiple sites can be controlled, updated, and managed from a singular location either on site or remotely over a secured network.  In this sense web-based security features help with system management consolidation; streamlining operation processes making the day-to-day more convenient.

One of the most desirable features of web-based access control systems is the reduction of required cabling.  Depending on the application, readers don’t necessarily have to be wired directly to the network.  This cuts down on cabling and labor costs.  It also provides flexibility in situations where cabling may not be an option, such as installations in historical buildings.  Same is true about the energy supply to readers and locks.  In the past it may have been difficult for integrators to place access control equipment because of a lack in electrical outlets or supply.  Now, with web-based access control equipment, often times power can be supplied through a direct network connection known as PoE (Power over Ethernet).  PoE connections provide power and data to a connected device through a singular cable.

According to Bill Moran, vice president of Sales for Red Cloud Security, “Web-based access control offers features and functionality that enhance an organization’s security posture. From one consolidated screen, administrators can view and manage alarms, video surveillance, facility maps, and identities including photo and personnel details.”  He also points out that in the event of a triggered alarm or someone forcing their way through an entry point, the network can be suspended while cameras at the scene can be accessed for live streaming.  This is where the idea of a comprehensive security system comes into play, where all of the components are easily accessed and essentially working together.

Web-based security features are transforming the way end-users and industry professionals perceive security in general.  In a world that continues to become more and more connected through technological advancement and the IoT (Internet of Things), it only makes sense that the infrastructure of the physical world should follow suit.  Web-based access control is just another step in the direction to a more convenient and secured future.  At Perfect Connections, Inc. our licensed professionals are always looking for and researching technologies that better serve our customers.  Our team has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey since 1992.  We help you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Scott Lewis-Flickr-Creative Commons

How Does Home Automation Affect Home Security?

Smartphone-Phil CampbellAs the technology driven world continues to evolve, our lives are becoming more and more connected.  Virtual distances are shrinking.  This has been happening since the inception of the internet.  You no longer have to fly across the world to have a meeting, you simply login to a virtual meeting where you can talk “in-person” via video chat.  Although it may be imperfect, technology has certainly had an impact on all of our lives in one way or another.

Our lives are saturated in advanced technological gadgets, everything from our cars to our smartphones, why should our homes be any different?  It used to be enough having a home security system that would alert the authorities in an emergency, but why stop there?  Home automation, or the “connected home,” is quickly becoming an integral part of a comprehensive home security system.  It’s a driving force that is changing the way homeowners and system integrators perceive “home security.”

As a licensed security system provider, our professionals at Perfect Connections, Inc. are always looking for the best ways to protect your home.  We have been providing comprehensive security system solutions to residences throughout northern and central New Jersey for the past 23 years.  Technological advancement means we are constantly learning and adapting our solutions to best suit client needs.  That’s not to say just because something is new that it should be implemented, we do our due diligence before installation of any product including home automation devices.

Home automation products aren’t exclusively linked to home security.  In fact there is a plethora of automation devices that can be installed separate from a security system, often requiring a DIY (do it yourself) approach.  For example there are devices that can be attached to kitchen appliances that can be controlled by logging into apps on your smartphone.  However, rather than complicating our daily lives by having to download separate apps for everything in our homes, we have steadily been adopting technology in an effort to streamline and simplify.  When it comes to home security, with DIY solutions you’re likely not getting full coverage while simultaneously complicating processes.  Plus they often lack continuity and one of the most important aspects of a security system, monitoring.  Rather than separating the functions of a home security system and home automation, integrators and homeowners are combining the two creating more efficient and effective life safety and lifestyle systems.

One of the top benefits of home automation is convenience.  Capabilities include remote interaction with home devices and your security system.  Imagine being able to know the exact moment your kids walk through the front door while you’re at work or on your way home.  With home automation you’re able to set up custom notifications that will be sent to your smartphone, mobile device, or computer.  This means you can go on vacation and be notified of temperature drops in your home, package deliveries, or close the open garage doors you forgot about before you left.

Depending on your home automation application, often times you can log-in to your surveillance cameras, turn lights on and off, lock and unlock doors, control media (audio and video), arm and disarm your alarm system, all from the convenience of your mobile device.  When integrated with your home’s security system a singular control panel can be centralized to help avoid confusion that can result from having too many different operating mechanisms.

As a homeowner you might be asking yourself “how will home automation affect my security system?”  For the most part home automation is considered a promising and revolutionary approach to added home safety and efficiency, but as with anything, it isn’t perfect.  Any technology that operates over the internet inherently comes with the looming threat of hackers.  Why would someone want to hack a home automation or security system?  To state the most obvious, they’re likely interested in disabling your alarm system so they can break-in.  Other reasons could include wanting to cause general havoc by tampering with your lights or HVAC system, wasting energy for no other reason than driving up your utilities bill; for “fun.”

Fortunately there are ways to decrease the chances of being hacked, both on the user and integrator end.  In many cases home automation operates wirelessly over a home Wi-Fi network.  No matter how protected you think your network may be it should always be protected with encryptions and user authentication.  The same holds true for connected security devices and any device that transmits a signal.  There must be authentication between home automation devices, the security system, and whatever mobile device you are using to access them.  Otherwise your system is susceptible to third party hackers.

Take the case of Insteon home automation systems back in 2013.  Kashmir Hill, a Forbes Staff Writer, highlights the findings of David Bryan and Daniel Crowley, security researchers at Trustwave, and what they discovered is alarming (for lack of a better word).  They found that not only was there a lack of password protection on the consumer end, but that the Insteon products (now discontinued, for obvious reasons) themselves did not require usernames and passwords and were “crawl-able” (searchable) on the web.  This meant that anyone with a little know-how could access and mess with the connected Insteon products; unnerving to say the least.  Be sure to hire licensed professionals that fully understand the products they are installing and how they will interact with your home network.

While technology is imperfect and constantly transforming you can be sure if you hire a licensed security integrator with product knowledge and experience you’ll be setting yourself up for success.  A professional with industry knowledge will be able to ensure your system is as secure as it can be by using products that require authentication and that your network is encrypted.  As a licensed security system provider, our team at Perfect Connections, Inc. understands that securing a home and improving the lives of others doesn’t mean haphazardly throwing random products together just to get a job done.  We have been providing security solutions to homes throughout northern and central New Jersey since 1992.  Technological evolution is never-ending as is our commitment to providing the safest products and security systems available.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Phil Campbell-Flickr-Creative Commons

Should Surveillance Systems Share A Network With Office Computers?

Network-Norlando PobreWhether you are installing a new surveillance system or changing an existing one you need to consider the type of system and the operating implications associated with it.  The desire for advanced image quality, video analytics, ease of integration, and remote access has ushered in the era of IP (Internet Protocol) surveillance systems.  IP surveillance systems have opened the door to a more integrated security system and they provide increased scalability which is important to company growth and future adaptation.  This type of surveillance system typically relies on an internet network, and as they say “therein lies the rub.”

Should your surveillance system operate on the same internet network as your office computers?  The answer is not a simple yes or no.  The short answer being it certainly is a viable option, but it could depend on the size and type of business you run.  It’s also possible to set up an IP surveillance system on its own network but it may not be cost effective or necessary.  For these reasons it is imperative to consult a licensed security system professional when altering or adding a surveillance system.

When it comes to a company’s network there seems to be some trepidation about how and what devices can and should be allowed on it.  It’s understandable, a company’s network is often a basis for its everyday functions, but where does the worry come from?  A lot of it usually has to do with a communication gap between security integrators and IT professionals or end users.  At Perfect Connections, Inc. our licensed experts are able to provide clear and understandable information about the surveillance equipment we implement and how it will affect your company’s network.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  Our team has witnessed and been a part of the migration from mainly analog surveillance to IP.

Let’s discover the common concerns about network devices and how they can be dissolved, but first we’ll review some quick terminology when talking about networks.  LAN, MAN, and WAN are three basic types of networks you’ll likely hear about from integrators and IT professionals.  Local area networks (LANs) are typically found at most small to medium sized businesses as they cover a smaller more specific area.  In all likelihood your company operates on a LAN network.  Metropolitan area networks (MANs) cover a larger area and are usually present in cities and across large campuses.  Wide Area Networks (WANs) provide the most coverage, anything from expansive distances to the whole world.  According to Fredrik Nilsson, general manager for Axis Communications in North America, WANs are often comprised of multiple smaller networks including LANs and MANs.

All networks are comprised of some sort of cabling and equipment such as switches, servers, and hubs.  The most popular type of network configuration used with LANs is called star.  A star configuration allows all network devices to be connected to a central point where if one device crashes the rest will remain in operation.  However, redundancies are typically incorporated to account for the possibility of a central station crash.

Now that terminology is out of the way, what are some of the major concerns one might have when adding surveillance equipment to a company network?  One of the most common is bandwidth consumption.  This often stems from companies that have had to deal with employees streaming or downloading videos via company networks which eats into the available bandwidth.  According to James Marcella, director of technical services for Axis Communications, IP surveillance equipment is wrongly accused when it comes to bandwidth consumption.  He says most IP cameras today can be customized to fit a company’s network and storage guidelines.  To help limit their consumption surveillance can be setup on a Virtual LANs (VLANs) which Marcella says, “prevents video traffic from grabbing the lion’s share of bandwidth.”

Then there’s the ever-present question, “what about hacking?”  In our world where virtually everything is connected through the IoT (Internet of Things), it’s hard not to worry about who can access private information and how that information is being protected.  Having surveillance equipment on the same network as your company computers may seem scary, but in reality, more oft than not, there are procedures in place to prevent hacker access.

When it comes to adding network devices and keeping the network safe authentication protocol and data encryption are key.  According to Marcella authentication protocol protects the network at the physical port level.  If someone were to unplug a network camera and try to plug in their own device, all “traffic” to that port’s switch would automatically be shut down as the foreign device wouldn’t have the proper authorization.  Data encryption is essentially creating a password to your network whether it’s wired or wireless.  This prevents someone from getting into your network or freeloading on your company’s internet.  Encryptions can be highly effective as long as they are not something obvious or easily guessed.

Lastly, network storage is a top concern.  This is often directly linked to bandwidth consumption concerns.  Due to high image quality of IP camera recordings it’s not uncommon for businesses to store video footage for longer periods of time.  Fortunately, with IP surveillance systems you don’t necessarily have to store recordings directly on the network.  For smaller installations there is the option to utilize in-camera storage through internal SD cards (Secure Digital Cards).  Network Attached Storage (NAS) devices and cloud-based systems are other viable options.  In order to determine which method is best for your company an evaluation of camera quantity and storage needs should be conducted.

Whether you are adding a new surveillance system or updating an existing one it’s imperative to consider the impact it will have on your company’s network, if any at all.  Always consult a licensed security system professional as they can help guide you or your IT department through the process from initial assessment to final installation.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We can help break down the communication barrier that sometimes creates apprehension when installing network devices.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Norlando Pobre-Flickr-Creative Commons

What You Need to Know About Fire Alarm Maintenance

Fire Strobe-Alfonso PierantonioFire is an unpredictable force that can wreak havoc on any business.  It is imperative as a business owner, facility manager, or building owner that the proper precautions are in place to help prevent catastrophe.  The NFPA (National Fire Protection Association) is a leading advocate in fire prevention and safety.  They’ve written numerous codes and standards that have been implemented nationwide.  These standards are designed to help reduce the risk and effects of fire.  In combination with local regulations, NFPA codes and regulations are what system integrators and contractors have to follow in order to pass inspection from local authorities.

While you no doubt have some sort of fire detection and/or suppression system in operation it’s important to maintain it in accordance with national and local requirements.  As a security systems integrator, our team at Perfect Connections, Inc. has been installing fire alarm systems in business facilities throughout northern and central New Jersey for that past 23 years.  We specialize in comprehensive security systems that include fire alarms as a major component to a fully functioning system.  We do offer maintenance and service contracts helping you preserve a system that will continue to pass annual inspections and work efficiently in the event of a fire.

What goes into fire alarm maintenance?  First off, unless you or your staff is trained and licensed, you must hire a licensed technician.  This will help avoid accidentally setting off any false alarms which can result in substantial fines.  A common starting point, whether the system is fairly new or if you moved into a space with an existing system, is to find out the systems age and maintenance history.  The age of a fire alarm system will help determine whether or not components need to be replaced and what type of maintenance might be required.

According to Mike Lohr, director of service marketing for SimplexGrinnell LP, “Systems between five and ten years old may experience component breakdown caused by harsh, but normal, environmental factors. Voltage fluctuations, temperature, and humidity may cause system failure or nuisance alarm problems.”  He notes that systems between 5-10 and 10-15 years can provide adequate “life-safety” responses, but those within the 10-15 year marks should be watched carefully.  This is even more important if you have a shoddy record of maintenance history as it could have been poorly taken care of in the past.

Aside from knowing the age of your system you have to take any specific regulations the local authority having jurisdiction (AHJ) might have into consideration.  While the NFPA provides codes and standards for the nation, the AHJ will likely have their own set of rules that are specific to the area they preside.  This means that even if your system meets NFPA standards it may not pass local inspection because of AHJ specifications.  For this reason it is imperative to hire experts that are licensed and educated not only in maintenance specific to your system, but national and local requirements as well.

In most cases fire alarm systems must be inspected at least once a year some may require a more frequent assessment.  It really all depends on the type of business.  During an inspection all components of the system will be tested so if something is not functioning properly, it will likely be taken care of at that time.  Before an inspection you should notify the building occupants as the alarms will be tested and it gets noisy.  Your alarm system company is the one who should contact the alarm monitoring station and local authorities in advance to avoid false emergencies.

Maintaining a functional fire alarm system is key to preventing potential catastrophe.  It helps protect not only the physicality of your business, but everything that goes into running your business, i.e. you, your employees, company records, and equipment.  If you ever consider cutting corners when it comes to fire alarm maintenance carefully consider the extent of what it might cost you if you do.

While as a business owner you may not need to know all the fine details of what goes into fire alarm maintenance, it is important to have a basic understanding of what you can expect when the time comes.  For further information on fire alarm maintenance and inspections check out our related blog post HERE.  If you run a business in northern or central New Jersey do not hesitate to call on our licensed technicians at Perfect Connections, Inc..  We have been providing comprehensive security system solutions including fire alarm installation and maintenance since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alfonso Pierantonio-Flickr-Creative Commons

What Is Remote Monitoring?

laptop monitor-Intel Free PressWhen you picture a surveillance monitoring station what do you see?  Is it a half awake guard staring blankly at multiple monitors?  If that’s the case you can scratch that image from your mind.  The future of monitoring services is quickly shifting and adapting to our society’s need for streamlined and efficient processes.  As surveillance systems migrate from analog to IP with megapixel network cameras, and our world becomes more and more connected through the IoT (Internet of Things), the desire to access and monitor footage from anywhere increases.  This is where the idea of remote monitoring comes into play.

Being able to remotely monitor surveillance footage from virtually anywhere is a convenience that, up until recently, hasn’t been a pervasive security feature.  It differs from alarm monitoring in the sense that a service representative isn’t necessarily waiting around for an alarm to go off, instead they are actively watching live recordings to catch potential disasters before they happen.  In the past a company would typically hire people to monitor cameras on site, which isn’t always the most economical or effective method.  Today, companies are using off-site monitoring services that have the ability to keep watch over multiple facilities 24/7.  In conjunction with that, business owners have the ability to download apps that allow them to access their surveillance footage at their convenience via a mobile device.

At Perfect Connections, Inc. our experts typically recommend a monitoring service as part of a comprehensive security system to help ensure its effectiveness.  Our team of licensed technicians have been providing security solutions to businesses throughout northern and central New Jersey for that past 23 years.  The technological climate is ever changing and we always do our best to stay on top of relevant trends that will benefit our customers.

Remote monitoring allows an individual or group of users to access surveillance footage through a secured network from virtually anywhere via a smartphone, tablet, computer, or mobile device.  Why is this beneficial?  It can help cut down, or eliminate entirely, the need to have an on-site staff staring at monitors, how effective can that be anyway?  According to Doug Marman, CTO of VideoIQ Inc. and founder of Remote Guarding Alliance, “…humans monitoring video screens grow fatigued to the point of ineffectiveness after only 20 minutes…”  Marman argues that the traditional method of monitoring surveillance is at best a practice in “hindsight” strategy.  Meaning by the time a reaction is made the damage is done or the perpetrator has already escaped.

Marman’s system of remote monitoring using a combination of video analytics and audio over IP, or voice over IP (VOIP), decreases response time and increases the ability to monitor a large quantity of cameras at once.  And in contrast to human attention span, video analytics are “100 percent vigilant.”  Marman illustrates the ability to interact with intruders instantly via audio over IP, citing how quick they are to abandon their criminal attempt when someone is calling them out over a speaker on site.  While audio interaction is an intriguing feature that allows for a virtual presence at all times, it may not be necessary depending on your type of business and your security needs.  What matters most is the ability to react instantly, reduce any lag time in response, and prevent false alarms as they typically result in fines and wasted essential resources.

With response time being one of the top benefits of remote monitoring it can also reduce overall monitoring costs, increase scalability options, and send notifications via e-mail or other media.  While the benefits of a remote monitoring system may eliminate the need to hire on-site staff, it doesn’t necessarily mean you should rely solely on self-monitoring.  If you were to take on the task of monitoring everything yourself, your business could be at risk.  Imagine you’re monitoring from a smartphone, it runs out of battery and you don’t have your charger handy.  What if you misplace your smartphone and miss an important notification?  Think about logistics too, as a business owner even you need to get sleep, you can’t be vigilant 24/7.

Having the ability to self-monitor should be looked at as an added layer of security, not your only means of protection.  According to Jerry Cordasco, vice president of operations for G4S Video Monitoring Support and Data Center, “A better choice for remote video surveillance is the use of a professional monitoring facility.”  Having a remote monitoring service provides a virtual presence 24/7 that can access real time footage and initiate the appropriate response immediately.

Security systems can be an effective crime fighters, but what good are they if an alarms goes off and no one is notified or made aware?  What good is a surveillance system that no one is monitoring?  You might get lucky and capture a license plate number that could eventually lead you to the perpetrator after the fact, but by that point the damage has been done.  The goal of a remote monitoring service is to provide timely and accurate responses to disturbances on site.

As a security systems provider, our team at Perfect Connections, Inc. understands the importance of immediate action.  Mere seconds can be the difference between prevention and disaster.  We have been providing comprehensive security system solutions, which include monitoring services, to facilities throughout northern and central New Jersey since 1992.  Every business has different security risks that is why we tailor our solutions to fit your specific needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Intel Free Press-Flickr-Creative Commons

How to Secure a Parking Garage

Parking Garage-David HilowitzThere are many architectural components to a business facility sometimes that includes a parking lot or garage.  Whether it is attached or detached, near or far from the main building it can be a convenient asset to any business.  It’s likely the place where you and your employees park in the morning and leave in the evening.  At some point in your life, whether you were at work or another establishment, you’ve probably had an uneasy feeling walking to your car.  But why?  Perhaps it had something to do with a perceived lack of security.

A parking lot or garage can often go overlooked when it comes to the security of an organization as it is not necessarily looked at as an actual part of the main building.  Often times organizations focus on protecting the areas people spend most of their time in, their office or interior work destination.  Sometimes a parking lot or garage isn’t even owned by the business it serves but rather an outside property manager.  However, parking destinations can often be high risk areas especially at night.  As a licensed security systems company our experts at Perfect Connections, Inc. assess the security risks of an organization as a whole.  We have been offering comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We understand not every business or location is the same, and with different locations comes different security risks.  Our team helps minimize risk by offering tailored security system solutions.

The risks associated with an unprotected parking lot or garage can be mitigated once brought to light.  Speaking of light, it is one of the most important safety factors in parking lots and garages.  As you’ve probably experienced at one point or another not all parking areas have adequate lighting, thus creating dark corners and easy hiding spots for potential criminals.  According to James Marcella, Director of Technical Services for Axis Communications, “The most effective deterrent to criminal activity is a well-lit area, because not only does it increase the ability for natural surveillance, it also improves the quality of recorded images from security cameras.”

Not only is it imperative for patrons to be able to see, but if something were to happen it’s crucial that security cameras record useable footage.  Lighting and surveillance tend to go hand-in-hand.  This means installing light fixtures that will provide ample illumination and an adequate CRI (Color Rendition Index) rating.  CRI ratings quantify the precision a light source has when it comes to reproducing color.  One of the best and overall cost effective options is LED (Light Emitting Diode) lighting.

While lighting is paramount, surveillance is key when it comes to catching criminal behavior, especially in parking lots and garages.  In our current technological environment surveillance cameras and equipment are becoming more efficient and advanced.  For instance, garage and parking lot environments are not exactly the cleanest or protected areas, therefore surveillance equipment has to be able to withstand harsher elements.

Fortunately there are cameras built specifically for such vulnerable settings.  Vandal-resistant cameras happen to be a surveillance solution in volatile areas, providing protection from both human and environmental elements.  They typically come sealed from dust and moisture right out of the box making them durable and increasing their longevity.  This helps cut down on long term costs of repairs or replacements.

Aside from being durable, ease of integration is becoming a pervasive quality in cameras and security equipment.  Today, end-users are starting to migrate from analog camera systems to IP (Internet Protocol) for their image quality, coverage, and scalability.  This opens the door to whole system integration where a garage surveillance system can be on the same network as the business it services, or at least that’s the idea.  With IP and cloud-based surveillance systems becoming more ubiquitous, clearer images and video analytics are sure to play an important role in the security of any infrastructure, including parking lots and garages.  It would help cut down on the need for physical monitoring services as well provide a platform for remote access via a mobile device or computer.

When enhancing the safety of your parking lot or garage it’s important to consider landscaping, signage, cashier booths and pay stations, and alert systems for the patrons.  Landscaping around a garage or lot should be well kept and vegetation should be trimmed low to maintain a clear line of sight.  There should be clear signage that improves way-finding and some that indicates the area is under surveillance.  Sometimes seeing signage is enough to deter criminal activity.  Cashier booths and pay stations are crime targets for obvious reasons, therefore they should be well-lit and have adequate surveillance coverage.  Alert systems can be a helpful added security feature that would notify patrons by text message of any issues or disturbances while they are away.

Whether you are the owner of a parking lot/garage or a patron it is critical to ensure its security.  It’s not just about being vigilant of your property, it’s about protecting you, your employees, and your patrons.  As every location has different risks you should always call on a licensed security systems professional to perform an in-person security assessment.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992.  Our team is skilled at providing custom solutions tailored specifically to your needs.  We appreciate the complexities involved in protecting an organization as a whole.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by David Hilowitz-Flickr-Creative Commons

Changing Residential Access

Alan Cleaver-Key in doorThe days of struggling to carry 50 pounds of groceries while simultaneously trying to dig your house keys out of your pocket or purse, might be coming to an end.  As a homeowner your door locks have always been an essential line of defense when it comes to protecting your home.  While our everyday lives are saturated with technological advancement, it only makes sense that our physical structures should follow suit.  That being said, using a key to unlock your doors may be a thing of the past with wireless access control on the rise.

What is wireless access control?  Essentially, wireless access control in a residential setting means replacing the standard lock and key with a keypad, remote control, biometric reader, card reader, or Wi-Fi access.  Keys are no longer the only method for unlocking your doors, in fact, they become the back-up.  At Perfect Connections, Inc. our team of licensed experts have been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992.  We stay in touch with current technologies and how they might benefit our customers.  Protecting entrances is key (no pun intended) to the safety and security of any home, and we aim to provide the best solutions to each individual residence.

How does a wireless lock work?  Most traditional locks operate on some form of a “pin and tumbler” method.  This is when the serrated edge of an inserted key moves pins on the interior of the lock a certain distance allowing you turn the lock cylinder and open the door.  With a wireless lock (which typically operates on electricity or battery power) has “actuators,” which connect the cylinder or bolt to a motor within the door or frame.  The motor is electrically activated by a keypad, card reader, or wireless remote controller.  On top of that there are locks that work on Wi-Fi signals used in conjunction with your smartphone or mobile device, sometimes referred to as smart or automated locks.  Lastly, biometrics are sometimes used to control home access.  Typically a fingerprint or hand print is the credential required for such a system.

There are many advantages to a wireless locking system.  For one, you never have to worry about losing or forgetting your keys.  This eliminates having to leave spare keys outside or giving them to people who need access to your home.  Instead of using a key you can, depending on the type of wireless lock, give your visitor the access code or with an automated system you can unlock the door from your smartphone.  With a wireless lock there are no wires.  Typically this means an easier and seamless installation.  It’s a technology that would allow for a more ubiquitous integration that includes old and new construction homes.  Wireless locks offer a convenience and extra layer of security you can’t get from a standard door lock.

While there are multiple benefits to a wireless locking system, none of them are perfect.  With a regular lock you might lose your keys, with a wireless keypad lock you could forget your access code or the code could be hacked by a savvy burglar.  Fortunately, if you forget your code many keypad locks come with a physical key as a backup.  As for code hacking, it’s usually best practice to pick a random code, so don’t use a birthday or something easily guessed.  It’s also prudent- and some systems may require it anyway-to change the code every few months or after you’ve let an outsider use it.

The main drawback with a remote controlled lock is, just as with keys, you could lose the remote.  Unlike keys, a remote is usually programed by a computer.  Therefore, in the event that you lose the remote you can deactivate it from the convenience of a computer.  With a smart or automated lock you run into the issue of not always having a reliable Wi-Fi signal.  Then there’s the dreaded question of what happens when the power goes out?  As some of the wireless locks run on electricity, a power outage could be an issue.  However, many of these locks tend to have multiple redundancies in place including backup battery power.  The main deterrent when it comes to biometric locks is the price as they tend to be a fairly complex system that isn’t as pervasive in the residential market as the other technologies.

Whether you are building a new home or want to enhance the security of your current residence, wireless locks can reinforce your first line of defense and provide a convenience you can’t obtain with conventional locks.  As with any security device or installation you should always consult a licensed security systems professional, especially if you’re looking for full system integration.  At Perfect Connections, Inc. our team has been providing comprehensive security system solutions to homes throughout northern and central New Jersey for the past 23 years.  We help you connect and protect what matters most, offering a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alan Cleaver-Flickr-Creative Commons

Should I Move To The Cloud?

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds.  These natural wonders are not the clouds we’ll be investigating here.  Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it.  Think about your everyday, do you use an internet based e-mail account, like Gmail?  If so, then you use a cloud based service.  So what is the “cloud”?  Basically, the cloud takes recorded information and stores it on internet servers.  Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet.  In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that.  While it is an exciting technology with seemingly endless applications, it is not without flaw.  That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry?  In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions.  As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some.  As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network setup and what are the benefits?  In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service.  Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced.  According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.”  Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers.  If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device.  Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency.  As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com).  It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department.  This could help cut down on unnecessary manpower costs.  And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology.  Systems that rely solely on the cloud for recording and storage face some obvious risks.  For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud.  However, these outages are estimated to be no more than 4 hours per year.  Fortunately there are inexpensive solutions to such an issue.  To avoid losing any data a local recording device can be set up to operate for more than 4 hours.  Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users.  However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems.  Business size is also a factor in the cost.  Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required.  So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations.  Cloud access is another major concern for end-users.  The question remains, what is stopping someone from hacking into my network?  Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future.  The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking.  Once the dialogue becomes clearer the cloud has potential to become standard protocol.  If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional.  Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons

Can My Cameras See In The Dark?

West Midlands Police-Infrared FootageNot all surveillance cameras are created equally.  It may seem as simple as selecting a surveillance camera and popping it into place, but what about the external factors that affect the quality of recorded images?  One of the top concerns for industry professionals and end-users alike is a cameras ability to function in the dark or varied light conditions.  Whether you’re using interior or external cameras, their ability to function under varied light conditions is paramount.  Our experts at Perfect Connections, Inc. understand the importance of a surveillance system that doesn’t quit when the sun goes down.  We are a licensed security systems company that has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

What challenges do different lighting conditions pose to surveillance cameras?  The most obvious is the absence or lack of light.  Unless your cameras are True Day Night it is likely that they will not be able to pick up fine details in the lack of light.  Another common issue is the effect of light glare.  Problematic glare can come from car headlights to poorly placed exterior lighting fixtures.  Glare will disrupt the sensors in the video camera and the recorded footage can be rendered useless.  It is important to take lighting conditions into consideration when choosing and installing cameras as it will impact the overall effectiveness of your system.  What good is a camera that captures grainy unclear images or blanks out for seconds at a time?

Fortunately there have been vast improvements in the surveillance industry that are changing the game when it comes to light adaptation capabilities.  According to Greg Peratt, Senior Director of the Panasonic Video Solutions Integration Team, there are IP (Internet Protocol) cameras that can capture detailed footage in lighting less than .01 lux illumination.  Lux illumination is the metric measurement for how much light falls on an object.  A measurement of 1 lux, “equals the amount of light that falls on a one-square-meter surface that is one meter away from a single candle.”  Therefore a camera that can capture detailed images in less than .01 lux illumination is not only impressive, it’s advantageous.

Another helpful advancement in the case of low or varied light is the Infrared Cut-Filter Mechanism (IRCF).  This filter is automatically lifted or lowered in front of the camera’s sensor depending on the light levels.  The IRCF helps block out disruptive infrared light that can come from sunlight or certain lighting fixtures and it ultimately improves the camera’s low-light performance.  When light levels are low-typically at night-is when the filter is automatically lifted from in front of the sensor.  Cameras that have this feature are considered to have True Day Night capabilities.

The only hitch with this technology is color is often distorted or lost completely.  However, the camera is still able to capture a clear black and white image and according to Steve Carney it captures an image, “…that is not only vastly more usable but also cleaner without chroma noise.”  Carney points out another differentiator between True Day Night cameras and the impersonators is what happens when the IRCF is lifted or removed.  In a True Day Night camera a piece of “dummy” glass will take the place of the IRCF in order to maintain focus and, “minimize the spectral offset between visible and IR light.”  In other cameras the ability to remove such a filter doesn’t exist, therefore the full spectrum of visible and infrared light cannot be taken advantage of.

Other features to look for when considering Day Night cameras are the shutter speeds and any tinting on the camera housing.  Varying shutter speeds affect the amount of the light that is able to be captured.  The slower the shutter, the more light is captured which isn’t always better.  Often times a camera will come with a domed or “bubble” exterior housing.  These “bubbles” can sometimes be tinted.  Depending on your application you may or may not need tinting; sometimes the tint can have an adverse effect by decreasing visibility and obstructing image clarity.

Whether you are replacing older interior/exterior cameras or installing new, your best solution is to call on the experts.  Every business and facility is different which means each will have different requirements when it comes to day/nighttime surveillance.  Having a licensed security professional do an in person assessment of your facility will help determine what type of camera should be implemented and where.  Our team of licensed professionals at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and facilities throughout northern and central New Jersey since 1992.  We believe in personalized service that tailors solutions to your individualized needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by West Midlands Police-Flickr-Creative Commons