How To Properly Store Surveillance Footage

Surveillance playSAN-Dennis van Zuijlekoms a vital role in any comprehensive security system. It helps authorities catch criminals and provides helpful insight into your business operations by collecting and analyzing data on a daily basis. Where and how is all of this visual and analytical data being “collected?” That is the ever pressing question for system integrators and end-users alike. Storing surveillance data can be as important to the efficiency of your security system as having the surveillance equipment itself. We are catapulting ourselves into the future with the constant evolution of technology in all aspects of life including security system components, and surveillance storage solutions are no exception, but not all are created equal.

At Perfect Connections, Inc. our licensed integrators are dedicated to providing comprehensive security system solutions that protect people and property. We have been installing security systems at business facilities throughout northern and central New Jersey for the past 23 years. Our team designs system solutions that meet the needs specific to your organization. Surveillance storage is a security system component that will vary project to project and should be treated with an individualized approach.

In the not so distant past, video recordings weren’t as advanced as they are today in terms of image resolution, clarity, and noise distortion. Recordings would often be deemed unusable due to their lack of clarity and they would typically be discarded freeing up storage space for new recordings. Today, with the advent of IP cameras (internet protocol) and more advanced camera technology the recordings have become critical data sources that are considered valuable. This means more and more end-users are interested in keeping recorded data for longer periods of time. The obvious consequence is the need for more storage space.

There are many factors that affect what kind of surveillance storage solutions can and should be implemented at a facility. The size of the project, existing infrastructure, and client budget are all critical determinants as to what type of storage should be implemented. The camera type, camera quantity, compression standards, frame rates, motion detection, desired length of storage, and overall estimate of desired resolution all should be taken into account as well.

When it comes to storing surveillance data it is paramount that the integrity of the footage is not lost. Traditionally surveillance footage would be stored on a DVR (digital video recorder), but it’s limitations within a networked system make it less than ideal. With so much of the surveillance world developing around IP and network solutions it’s only natural that network storage solutions should arise. NAS (network attached storage), SAN (storage area network), and DAS (direct attached storage) are all potential methods for storing surveillance data. All have different installation requirements. Some may call for extensive cabling and a large closet to store servers, but it all depends on the size and type of project. According to Justin Schorn, vice president of product management for Aimetis, “The critical decision is choosing between a storage area networks (SAN) and network attached storage (NAS).”

The different storage devices vary in how they present information to the user and how data is accessed. The NAS devices present data in a “file system” same with DAS, whereas SAN is presented in what is referred to as “block storage.” DAS and NAS either attach directly to an existing network or the NVR (network video recorder). SAN is essentially an extension of a DAS, but provides a higher storage capacity.

DAS is typically implemented in situations when expansion is not an option, the system performance requisites are static, and shared access is not necessary. The reason being is DAS devices are limited to singular DVR or NVR applications. SAN solutions are typically used in larger camera applications that may later require scalable options. According to Lee Caswell, founder and chief marketing officer at Pivot3, “Many archivers can share the storage and the SAN platform introduces more reliability over NVR/DVR systems because there is no single point of failure.” Common applications for SAN storage include airports, casinos, and prisons.

NAS devices are typically used in smaller surveillance applications as its performance isn’t as robust as SAN. One of the advantages to NAS solutions is data can be easily accessed by anyone on the same protected network. Lee says, “The advantage of the file system on the NAS platform is that it is easier to support a hybrid storage case as some storage occurs locally on self-contained NVRs/DVRs and extended storage is sent to a specific file on the NAS.”

Keeping high quality recorded data for longer periods of time can help local authorities with investigations and it can provide insight into your business that you otherwise wouldn’t observe. While storing recorded footage from your surveillance system is critical to your overall security, it’s important to remember that the type of storage necessary will vary depending on the project parameters. It is imperative to work with a licensed security system integrator to help evaluate security risks, the quantity of cameras needed, and how a surveillance storage system can be implemented to meet your requirements. At Perfect Connections, Inc. we are committed to providing security systems that suit your specific needs. We have been designing and installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Dennis van Zuijlekom-Flickr-Creative Commons

DIY Security

Experts-Mai LeIn a world where you can find virtually anything on the internet, there are endless “Do It Yourself”-commonly referred to as DIY-solutions for pretty much everything. This holds true for home security systems. However, that doesn’t mean you should rush to your computer/mobile device and buy a 4 star rated surveillance camera off Amazon, and start poking holes in your walls. As with anything on the internet, you end up wading through a sea of options, resources, and opinions; you might start to feel like you’re drowning in information. Don’t worry you’re not alone. You’ll likely have a ton of questions like how do you know if you’re making the right choice? Are the reviews accurate, or paid for by a company? Am I getting the best deal? How do I know one product will be compatible with another? Is this an honest company? The list goes on and on.

At Perfect Connections, Inc. we’d like to help you avoid the drowning in information effect. Our team has been providing residential security systems solutions to Northern and Central New Jersey since 1992. While we believe our customers are capable individuals, we also believe in providing a customized, comprehensive, and clear cut solution to your home security needs that you can’t get through purchasing products piecemeal on the internet. You know that old adage, “you get what you pay for”? It’s true, and in some cases you end up getting less. You can’t expect a few $50 cameras you bought online, and a monitoring app on your phone, to fully safeguard your home and family. Surveillance cameras and mobile monitoring are only a couple components in an effective home security system. Think about the other issues you need to be cognizant of like access control, fire and carbon monoxide detection, burglar alarms, and alarm monitoring. What good is an alarm if the local authorities aren’t contacted when it goes off? Our team of professionals are informed and informative on the products we install, and they understand the importance of a solution tailored specifically to your home.

Hiring A Professional

If you’ve never had experience installing or operating security systems equipment, doesn’t it make sense that you’d want an industry expert to do it? Hiring a professional alleviates the pressure on you, wasting less of your precious time and money. An expert will be able to assess potential weak spots in and around your home that you might not pick up on. The sophistication of your home security system is dependent on professional products and how they are installed.

There are so many pros of having a security company customize and install an alarm system for your home. For one, they know how and which products will work together, everything from the cameras to the central control panel. They can hook you up with an alarm monitoring service. Having a 24/7 monitoring service as part of your system automatically contacts the authorities in case of emergency. According to Erin Raub for SafeSoundFamily, “This does not happen with a DIY system, which notifies you (and others you put on the notification list), making it your responsibility to decide on the next course of action.” It’s chaotic enough in the event of an emergency, you don’t want to have to figure out who to contact, or struggle to find your phone. The convenience of having a fire, burglar, and carbon monoxide alarm/detector that communicates directly with a monitoring service is priceless; it provides a quicker response time which could ultimately save lives and property.

Home automation is a security feature that connects various aspects of your home to the central control panel in your home. Lighting, temperature control, locks, garage doors, and sometimes appliances can all be controlled either from your control panel or even a mobile device through and app provided by Alarm.com. You can’t get this type of connection to your home through a DIY system. Even if you could, you shouldn’t be installing it yourself. According to Anne Reagan for Advice Porch “To ensure that all sequences are correct, a professional should always complete home automation.”

Think about the future of your home when it comes to security systems. If you plan on ever putting your house back on the market, having a customized professionally installed security system can actually increase the value of your home. Like Anne Reagan points out, “…every prospective homeowner wants to live in a safe and secure home.” That being said, potential buyers aren’t going to want a house with system they have to remove or update themselves, especially if it’s installed improperly or in adequately.

People might think a DIY security system is cheaper because you’re not paying for labor, but in reality you could end up paying more. If your system fails or becomes completely defunct, it is up to you to replace it out of pocket. With a professional service you would likely be covered for certain damages and/or malfunctioning equipment under your service contract. Adding parts or features to your DIY system after the fact will add up, whereas an initial assessment from a professional will provide a more complete result from the get-go. Any required maintenance, repairs, and updates are your responsibility which will further drain your wallet.

Before jumping online and buying a bunch of equipment, or punching holes in your walls, check out a professional service for your home security needs. They can guide you through the process from initial assessment to final installation. If you reside in Northern or Central New Jersey find out what Perfect Connections, Inc. can do for you. Our team understands the value in a comprehensive home security system catered to your specific needs.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Mai Le-Flickr-Creative Commons

Alarm System Maintenance

So you bought an alarm system, what kind of maintenance and service should you do?

Really, not much. It should work flawlessly for quite some time. The first thing to go will be batteries. All systems will have to have their system battery replaced after 3 to 5 years. When the battery is low, the keypad will notify you as will the central station. The batteries for most alarm systems in service today are 12 volt and 4 to 7 amp hour. Newer graphic self-contained systems have different smaller batteries, the 2Gig GO! Control has a 7.2 volt back up battery. All batteries should give you 24 hour back up. It is not a bad idea to schedule replacement of your battery every 3 years to preempt any possible issues.

If you have a wireless alarm system, you will also need to replace the batteries in the various devices such as door and window transmitters, wireless motion detectors, wireless glass break detectors, wireless carbon monoxide detectors, wireless smoke detectors, key fobs, panic buttons, and other wireless devices. Most of the new devices use lithium batteries, from CR123 3 Volt lithium batteries to lithium watch sized batteries. The smaller the device, the smaller the battery. Typically the bigger batteries last longer, 3 years plus, while the watch type batteries last 2 years plus. Devices that are used most often, like entry doors, drain quicker. On the newer systems, the keypad tells you which transmitter has a low battery, making replacement easy.

Make sure your alarm company shows you how to change the batteries during the installation. You should also get a list of the batteries required for all the various devices you have so you don’t have to scramble to find out when they are low. If you choose not to replace your own batteries, the alarm company should be happy to replace them for you.

Older systems use typical alkaline batteries, 9 volt, AAA and AA are common. These need to be replaced more often. Many older systems don’t tell you when the batteries are low so regular replacement is necessary.

Other than changing batteries, not much else is necessary. Make sure devices such as motion detectors and smoke detectors are clear of spider webs and that’s about it.

If installed and programmed correctly, your alarm system should monitor all parts and devices on the system, as well as services it is connected to, like power, telephone, and cellular. If any of these systems go down, your alarm system should alert you to that fact. The first reaction is to think that there is something wrong with your alarm system, when in reality it is working correctly. It is supposed to tell you when it is compromised when a service it relies on is not working properly.

Even though the system monitors itself, testing the alarm system is something that you should regularly do. You depend on your alarm system and you should make sure that it is working properly all the time. The best way to test the system is as follows: Call the central station and put the system on test. Arm the system and then trip a zone. Reset the alarm and then call the central station to make sure they received the right signal. Next week put it back on test and trip the next zone. Go clockwise around your house and you will eventually check all your devices and then start again. It is worth the effort to protect your home and family.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, or if you would like us to perform a Home Safety and Security Audit, absolutely free, please call 800-369-3962 or simply click the link below.

Understanding False Alarms

False alarm may cost a life-Shannon ClarkIf you have a security system you might already understand the consequences of a false alarm. It is not something to be taken lightly and can have serious implications. False alarms can happen for any number of reasons and it’s important to understand why and how best to avoid them. No security system is perfect, and false alarms are bound to happen, but as end users and integrators it is our duty to try to minimize them. At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. They are knowledgeable about the products they install and can provide useful information on system function and upkeep to help avoid any mishaps.

As technology progresses and advancements in security manufacturing lead to better products it’s likely the instance of a false alarm or dispatch will be lessened. According to Ron Walters, director with the Security Industry Alarm Coalition (SIAC), prior to the 90’s false alarms were typically attributed to faulty security products. Since then manufacturers have been and continue to produce quality products, however that doesn’t guarantee proper application and use. Accurate installation and usage lies the hands of the security integrator and the end user. That is why it is critical to hire a licensed security expert for system installation and user specifications. It is also important that the end user has an understanding of what is expected of them in order to avoid false dispatches. Unfortunately, approximately 15% of false alarms are considered to be caused by user error.

In a world where there are an estimated 35-36 million alarms in use, according to Stan Martin who is the executive director of the SIAC, false alarms are an unavoidable evil. False alarms and dispatches are an annoyance for end users, but their ramifications don’t end there. They take valuable time and resources away from emergency responders that might otherwise be needed at an actual crisis. If you have too many false alarms it can create a “boy cried wolf” situation where authorities might be more hesitant to respond. On top of all that you could end up paying substantial fines for repeat offenses. Recurring false alarms that go unchecked can create tension between local authorities, end users, and security integrators. But negative impacts aside, the SIAC reports that 90% of law enforcement still consider alarm industry professionals valuable allies.

Sometimes it’s difficult to pinpoint the cause of a false alarm as it could have been a situation where an intruder was attempting a break-in and escaped before authorities arrived making it appear like a false alarm. This is where video surveillance, alarm monitoring, and remote system access come in handy. Being able to tap into your facility’s surveillance system and visually verify whether or not an intruder is or was present, is a critical time and resources saver. With remote access via an app on your smartphone or mobile device you can do just that. The beauty of remote access is you don’t have to physically be on site to see what is going on at your facility. Having a monitoring service will also help determine whether or not there is an actual emergency and whether or not authorities should be dispatched. An added benefit to having video surveillance is even if the perpetrator escapes before authorities arrive, the recorded footage can be used to aid an investigation and hopefully identify the intruder.

Aside from having proper security equipment installed there are some helpful tips for end users to keep in mind that will help avoid pesky false alarms. One, always know your alarm code and be sure all windows and doors are secured before arming your system. Two, be sure you get your system tested regularly, it’s typical to have an annual inspection but some situations might require quarterly or more frequent tests. Be sure critical sensors and smoke detectors are adequately covered during any construction or building modification to avoid disruptions caused by debris. Lastly, always consult a licensed security system provider with any maintenance or care questions.

While false alarms aren’t completely avoidable, you can lessen the chances of them happening to you. Hiring a licensed security system integrator who is knowledgeable and has extensive installation experience is key. Installing a comprehensive security system that includes video surveillance, fire and burglar alarms, access control, and a monitoring service will provide complete coverage and reduce the risk of false dispatches and alarms. At Perfect Connections, Inc. our licensed professionals have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years. Our technicians have the experience and expertise to install security devices and can help educate you on proper usage.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Shannon Clark-Flickr-Creative Commons

Property Management and Security

Commercial BuildingAs a property manager you have a lot of people that depend on the safety and security of the real estate you oversee. Whether or not you own the properties you rent, or work with a landlord in managing their properties, a bulk of the responsibility lies on your shoulders. Your main goal is to attract responsible patrons, keep them, and build your brand. How can you do that if the property you oversee is publicly perceived to be too risky or unsafe? That’s the problem, if there has been an incident at a property that you own the public tends to remember and will likely steer clear of that address.

This negative reaction can be limited by implementing preventative security measures that meet the needs of your tenants and the risks associated with the surrounding area. One of the best preventative measures you can take as a property manager is to incorporate a comprehensive security system in combination with defined property protocols. At Perfect Connections, Inc. our licensed integrators provide comprehensive security system solutions that suit your specific needs. We have been installing security systems in facilities and residences throughout northern and central New Jersey for the past 23 years. Our team recognizes the challenges property managers face dealing with multiple properties both commercial and residential. We specialize in comprehensive security systems that include fire and burglar alarms, access control solutions, video surveillance, and system monitoring.

Trying to determine what type of security system is necessary for a specific property can be difficult that’s why it is important to involve a security professional from the start. This is especially true for new construction projects. Involving a security integrator from the start will ensure you are getting the coverage you need and create a seamless installation process.

One of the first and most important procedures to tackle is a risk assessment. A risk assessment should include a licensed security systems integrator and it should be performed as early on as possible. This will help determine where your greatest security threats are and how best to tackle them. The next step would be to design a custom security system that helps combat those threats.

While every security system application will be different dependent on the location there are some key components that will benefit most buildings. Video surveillance is a major security feature that is essential to any comprehensive system. The mere presence of a camera system is sometimes enough to deter potential criminals. It helps keep an eye on your property even when you can’t be there, it also gives your tenants a peace of mind knowing their public spaces are being looked after.

Access control is another important piece of the security system pie. It helps limit who and how people can gain entry and sometimes exit. Access control can be implemented in a number of ways. Often times a credential is issued to the approved users and they typically come in the form of a swipe card, a fob, or a proximity card. These credentials are used in conjunction with an electronic reader installed by the desired entry point. Using access control credentials instead of traditional keys helps prevent lost or stolen items from being duplicated. A similar type of idea can be used with parking lots and garages as well.

Fire and burglar alarms in combination with access control, video surveillance, and an alarm monitoring service make for a comprehensive security system. A security systems integrator helps ensure your fire alarm is installed and operates according to national and local codes. Having an alarm monitoring service will help alert you and the proper authorities at the first sign of a disturbance. With today’s technology there’s the potential to remotely monitor what is going on at your facilities through an app on your smartphone. Mobile apps typically have the capability to send you notifications if an alarm is triggered, or you can customize the type of notifications you want to receive. This could be particularly beneficial if you own multiple properties in different areas. A security system is meant to be a purveyor of safety and convenience. It helps protect your property investments and your patrons.

There is no “one-stop” security solution for any facility or residence. That is why it is imperative to involve a security systems integrator, they will assess the risks associated with your particular facility and design a system that suits your specific needs. As a property manager you have people that depend on you to maintain the facilities they utilize, and security should be a factor in that maintenance. Even if installing a security system isn’t your decision to make, it’s worth bringing up to whomever would make that choice. Having a comprehensive security system can be a good selling point to your clients and a way to keep them. Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992. We understand the value a security system can add to a facility and the sense of safety it instills in those it is meant to protect.

If you live, run a business, or manage properties in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ines Hegedus-Garcia-Flickr-Creative Commons

Protect Your Alarm System As Well

For those who own alarm systems, whether they are video surveillance, access control, burglary, or fire protection, our systems watch over us and protect us around the clock.

But in today’s day and age, just about everything is connected to the internet. In many cases, this includes our alarm system. And like any device that is connected to the internet, if not taken care of properly, it can be at risk of attack from hackers.

“Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks” said a recent news piece by the Wall Street Journal. Many times, these cameras were infected by pre-compromised routers that already existed.

Here are some tips about how to protect your alarm system as well

Router security:
We recommend using WPA2 security for your router. Most routers, unless they are fairly old, are capable of this type of security. For more information on this, check out your router’s brand’s website – Belkin, Linksys, and Netgear are common brands.

Firmware updates: It is very important that any device that connects to the internet, from thermostats to alarm systems to routers to televisions to computers, always has the most up to date firmware. Each device’s manual or website will have instructions on how to do those, and if there is a phone application that interfaces with the device, you can often do it through the application.

Password protection: Many devices come with generic user names and passwords. These are easy targets for hackers. Make sure you change any default passwords, and try not to use the same password on multiple devices. It is most important that this is done on the router.

New hardware:
According to Kenneth White, a security researcher and director of the Open Crypto Audit Project, “If the company that made your [device] isn’t selling that model anymore or offering security updates, that’s a good sign for you to throw it in the trash.”

Why Monitoring Is Important

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response. This system still exists today and is considered an effective means for preventing disaster and catching criminals. However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device. One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We have seen how technology can affect not only individual security devices but the system as a whole. There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it. This is where the idea of self-monitoring comes into play. If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device. This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act. The same is true of a tripped alarm. This all sounds great, right? However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response. This could happen for a number of reasons. One being your mobile device is turned off or not on your person. Another could be a missed notification. As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times. It’s a feat not likely met by any independent business owner, you have to sleep at some point. Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day. The constant interruption would be enough to drive anyone mad. It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one. In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage. Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring. There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors. According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.” It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location. However, this doesn’t mean someone will be vigilant 24/7. This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it. Lastly, there’s professional remote video monitoring. This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios. These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities. Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage. As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it. These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility. An operator may notice things like loose wires or a piece of equipment that looks out of place. Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them. Many industry professionals agree that having a professional monitoring service is still the preferable method of watching over your facility. There’s simply too many holes in trying to self-monitor your own business. According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.” Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.” With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years. We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs. If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t. The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

Video Surveillance For Your Business

Video surveillance systems can be beneficial for a number of reasons. They are often installed to prevent burglaries and vandalism, but can also be used to promote neighborhood or office safety, in addition to increasing peace of mind if used in a home environment. When installing a video surveillance system, whether it is for your home, your office, or for any other setting, there are a number of things to consider. First, you need to think about the area that you want to keep any eye on, as well as the type of surveillance system and cameras you want. All of these factors will help you to decide what kind of system is best for your situation.

The first question you want to consider is how many cameras do you think that you will need? Think about the size of the property you are looking to protect, and the perspective that a camera will you give you in various locations. Additionally, you need to consider what the areas are that you want to cover. If there are outdoor areas, you need cameras that can stand up to weather, whereas for an indoor setting you would not need to look for weatherproof options, which can often be more expensive. You also need to consider the time of day that you will be using your system: daytime, nighttime, or both. All of these factors play will play into your decision about what kind of camera you will need.

Security Camera

After deciding what types of cameras you need for your space, you will want to think about the specific places that you want to have your cameras to be that will give you the best and widest ranges of visibility. These places will likely be at entrances and exits to the building, near garage doors, and by exterior or unattached buildings. If the video surveillance system is for a place of business, you will likely want to consider what areas typically have high traffic, and target these areas for camera installation.

Something else to consider when thinking about a video surveillance system is how you want to set up your data storage system. There are many options where you can save video footage onto a hard drive, and other options that save to this data into a cloud for storage. Along with this you will want to consider how much storage you think you will need. This will depend on two factors that affect the amount of data your system will use: both the quality of videos, and how long you plan to save video footage for. One final thing to consider is whether you will want to have access to a camera’s live feed, or if you will only want to be able to go back and look at footage when necessary. This will also contribute to the amount of storage space you’ll need, as well as help you to determine if your system will need the capability to connect to the Internet. This will also help you to determine if you want to have an analog camera, or an IP camera.

Once you have thought through this criteria and made decisions about what you think will work best for you and your space, you will be ready to look for a video surveillance system!

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image credit: Ricco Security

VoIP And Your Business

Telephone-Billy BrownWe live in an exciting time where it seems every day a new technology is being born. Everything from our computers to our phones to our everyday accessories are advancing at a rapid pace. The implications of a technology may not be fully realized until after the fact, and it may not always be an issue with the technology itself, but how it interacts with existing components of our already complex systems. This is especially true of security system components.

In a comprehensive security system there are access controls, burglar and fire alarms, video surveillance, a monitoring service, and sometimes motion/glass break detectors. With all of these moving parts security integrators have to understand the functions of each component and how they will affect one another. As licensed security systems integrators our professionals at Perfect Connections, Inc. we deal with the changing technological environment by being educated and thoroughly evaluating what technologies will actually benefit our clients. Our integrators have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey for the past 23 years.

Many, if not most, security systems are migrating to a network based solution where system components are tied to an internet network. This is where VoIP technology may come into play. What is VoIP? It stands for Voice over Internet Protocol. Essentially VoIP technology allows voice signals to be transferred over a network versus the traditional POTS (plain old telephone service). How does this tie into security systems? In the not so distant past security system components were hardwired and heavily relied on traditional phone lines for communication capabilities. Even with the surge of wireless components available there are still many hardwired systems that rely on the dependability of a phone line connection. VoIP technology essentially replaces the traditional phone line and can be used to bundle all communications, like cable and internet, into one service.

Sounds convenient, but like any technology there are bound to be issues, particularly with how it can potentially interfere with security systems. Where you might run into trouble is when an alarm is triggered. Typically, when an alarm is triggered a signal is sent to the monitoring station prompting them to alert the proper authorities. Depending on the installation and the service, it could cause unpredictable or failed communication of alarm signals to the central monitoring station. Some VoIP services can’t connect directly to 911 and on the dispatchers end they might not be able to see your phone number or address when you call, which is problematic when a response is needed.

The reasons why VoIP can cause unreliability are not always obvious especially to the end user. According to Kenneth L. Gentile, a senior consulting engineer for Rolf Jensen & Associates Inc., “Digital alarm communication transmitters (DACTs) and other alarm transmitters initiate tones designed for transmission over POTS.” Sometimes these tones meant for the monitoring station do not translate properly over VoIP lines due to signal distortion.

Installation error can be a factor in the reliability, or lack thereof, in VoIP services as well. If the initial alarm wiring was installed on the existing telephone service it could prevent the alarm from transmitting properly and it’s up to your security systems integrator to recognize that. Alarm system tests can typically be run to ensure its operability, but according to Gentile, an on-site test with a VoIP service can’t always determine proper function or what the problem may be. Instead he suggests VoIP service providers and the alarm monitoring service should be asked to conjointly demonstrate transmission of alarm signals under normal circumstances, when there is a power failure, and when VoIP is in use. Doing so should help point out any potential issues with alarm signal transmission. Gentile says, “VoIP service must be engineered so as not to jeopardize the essential emergency communications upon which public safety depends.”

Issues aside, VoIP service promises to be a beneficial technology. Apparently it comes with great cost savings. According to Eduard L. Telders, director of enterprise information security at T-Mobile, “VoIP can eliminate the entire expense stream of establishing and maintaining a circuit-switched network for telephone connections.” Being able to bundle all communications into one service is appealing to end users and vendors alike. It makes maintenance and service calls more convenient, having to call only one provider versus one for each service. Facilities that employ VoIP technologies in conjunction with their security systems have the advantage of real-time response to criminal activity. With VoIP, central monitoring stations can actually speak directly to an intruder caught on camera, transmitting a voice message through speakers installed at the subscribers on site location.

While it may have yet to be perfected VoIP technology seems to be a leading change in communication capabilities. The implications it may have on security system transmissions and emergency responses are critical issues that need to be addressed by VoIP providers, security system integrators, monitoring services, emergency responders, and industry professionals. Keep in mind that just because something is available, doesn’t make it the best option for your specific needs. At Perfect Connections, Inc. our licensed integrators believe in providing comprehensive security solutions that will enhance the safety and security of your facility, not hinder it. We have been installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992, we have the experience and knowledge to design a system that will work best for you.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Billy Brown-Flickr-Creative Commons

Investing in Access Control

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons