What’s Missing From Your Security System

Missing puzzle pieceWhile businesses have a lot to offer, many are lacking the protection they need.  No I don’t mean stowing an arsenal below your cash-wrap, but rather an effective security system and security features.  At Perfect Connections, Inc. we can help you protect what you’ve worked so hard for.  If you run a business in central or northern New Jersey, let us assess your security risks and provide a custom solution to fit your needs.  Many don’t know what they are lacking and how it can be rectified – our licensed professionals can help in that arena.  Don’t fall victim to preventable disasters – find out what a comprehensive security system can do for you and the health of your business.

What’s lacking?

An incomplete security system is a bit like working on a puzzle with missing pieces.  There are essential features that should be included in a comprehensive security system.  Maybe you already have a security system installed at your business, but is it monitored?  What good is a security system if no one, except those in the area, is alerted when the alarm goes off?  Having a 24/7 monitoring service as part of your security system is crucial for the quickest response times.  Surveillance equipment can also help deter employee theft which is, “the fastest growing crime in America,” according to the FBI.  Employee theft costs businesses up to $200 billion each year.  Installing surveillance equipment not only in the main customer space, but in offices, storage, and inventory spaces can help decrease chances of employee theft and misconduct.

Other areas that tend to be overlooked or under-protected are doors and safes.  While a door typically locks, if it’s not sturdy and linked to an alarm, what’s preventing someone from kicking it in?  To protect your entries, exits, and interior spaces be sure that your doors are not only sturdy and alarmed but protected by some sort of access control.  Whether it’s a swipe card, key fob, passcode, or some form of biometrics, access control will help prevent unwanted entrants.  Safes that are out in the open and easy to grab or crack open provide minimal protection for whatever is in it.  If you’re going to store valuables or cash in a safe at your business be sure it’s secure either bolted to the ground or in a fortified room.

Inadequate protection from fire and carbon monoxide can be a killer for any business.  Having detectors and alarms may not be enough if they don’t communicate with emergency services.  It’s the same idea as the unmonitored burglar alarm, if no one is around to hear the detectors go off a fire could easily escalate to the point of no return.  For the quickest response time, fire alarms and detectors should be linked to a monitoring service that communicates with emergency services.  Proper fire alarms, smoke and carbon monoxide detectors should be an integral part of a comprehensive security system.  Your business is likely your livelihood, protect it.

There are few certainties in life, but taking initiative to protect what you’ve built by installing a comprehensive security system is guaranteed to help.  No two businesses are the same, therefore no two security systems will be the same.  At Perfect Connections, Inc. we believe in customizing security solutions for each individual business based on their specific needs.  As security systems experts we have been providing security solutions to northern and central New Jersey businesses since 1992.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Protecting Your Employees After Hours

When running an office, it is important to make sure that you are keeping your staff both happy and safe, but feeling confident that you are keeping them safe can become difficult when they stay late at night. If keeping your staff who go want to stay late is something of concern for you, there are a couple of things you can do to ensure that they will not be at risk if they stay late, and especially if they are staying alone.

One thing that can be done to ensure your employees’ safety after hours is to make sure that there is a clear plan for those who are last in the office. It can be helpful to create a system in which the last few people in the office make sure to notify each other that they are the last ones, and also that they notify others of when they are leaving. Along with this, it can be helpful to make sure that either all doors are locked, or that only one is left unlocked when there are fewer people left. This helps to make everyone aware when they are alone and when there are less people in the office later at night.

Another thing that can be done to ensure office safety for those who work late is to install a security camera system at the entrances to the office. This provides two layers of security because it is a deterrent for any unwanted visitors who may attempt to come into the office, and it also records anyone who is entering and exiting the office.

Key Card System

Image from Safe Tech

An additional layer of security that can be applied is a key card system. In this case, employees can be given key cards that will unlock doors to the office. In this case, the doors to the office can remain locked from the outside at all times, or just during certain hours of the day. This would not only provide security after hours, but would also have the potential to provide security during the day if this was something that you chose to apply to the office around the clock. This is also something that can be coupled with a security camera system for additional security.

Both the combination and individual use of all of these systems can help to secure your workplace, especially for employees that stay after hours and are sometimes left at the office alone, and can give you the peace of mind that your workplace is always a safe place.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

How Using Edge Technology Can Secure Your Business

Todd Huffman-SurveillanceWhen it comes to security systems you may have heard the term “edge technology,” “edge analytics,” or “edge devices.”  What exactly do these terms mean and why are they important?  When talking about security systems “the edge” is typically used when referring to video surveillance components.  Every security system integrator and industry professional will likely have their own definition of what it means, but in summary “edge technology” refers to surveillance devices that operate, analyze, and record at their source versus transmitting all that information over a network to the system’s core.  In traditional surveillance systems there is a central server where recorded data from peripheral devices is stored and analyzed.  In an edge-based system cameras perform these functions locally.

Why is this pertinent information?  Depending on your specific situation, using edge-based technology can provide more efficient surveillance processes and enhance the overall effectiveness of your security system.  As every situation is subjective, a licensed security systems integrator should always be consulted when determining what type of components will serve your business best.  At Perfect Connections, Inc. our licensed security system integrators are committed to providing comprehensive security systems that exceed your expectations.  We have been installing comprehensive security systems at businesses throughout northern and central New Jersey for over 25 years.  We know how to assess your security needs and implement relevant technologies that will help keep business running as usual.

Surveillance components that can be considered on “the edge” are IP cameras, video encoders, and network attached storage (NAS) devices.  These devices have recently become more advanced and their capabilities that were once unique to the central server of the security system continue to improve.  According to Steve Gorski, general manager at Mobotix, “Edge-based surveillance solves the bottleneck problem by using the camera to decentralize intelligence and video data.”  This means the cameras themselves are more intelligent and effective.

Edge-based technologies allow for higher image resolutions and the ability to compress them without the loss of image quality.  Even with the use of high resolution IP cameras becoming more commonplace, in a traditional system, the images still have to travel to the central server to be stored and typically compressed; this is where image quality can be lost.   Edge technology helps reduce the need for exorbitant storage space on the central server as many edge devices are capable of storing data locally on SD memory cards or NAS devices.  Traditionally these types of storage options were primarily used as backups for the system, but they can now be implemented as the main recording devices in smaller applications.  Cutting down on the need for centralized storage will reduce the need for high bandwidth consumption, ultimately cutting costs.

According to Fredrik Nilsson, general manager for Axis Communications, “It’s estimated today that a staggering 99 percent of all recorded surveillance video is deleted before it’s ever seen.”  How does that make surveillance useful?  It really doesn’t except for use in forensic investigations or after the fact viewing, but with edge-technologies providing intelligence and analytics at the source, detection capabilities increase which creates a more effective system.  With smarter edge devices that can detect patterns, motion, facial recognition, license plates, camera tampering, and people count, you can avoid potential catastrophe that could be caused by deleting recordings to free up space.  These types of analytics provide a platform for real-time viewing that can even be streamed to mobile devices, which are also often considered part of “the edge” realm – the ultimate goal always being prevention and proactive approaches rather than delayed after the fact reactions.

With any technology, “the edge” is a work in progress and will continue to evolve.  It seems edge devices are primarily implemented in smaller applications where the camera need is less than 20.  One of the reasons being a server-based surveillance system can run more analytics per camera because of the CPU power, so the more cameras you have the more processing power you’ll likely need.  For smaller facilities and businesses with remote locations that need surveillance, edge devices are a viable option as they provide real-time analytics, can store footage locally, and don’t require a ton of bandwidth consumption.

At Perfect Connections, Inc. we are committed to providing security system solutions that fit your specific needs.  Our team of licensed integrators has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We realize that just because a new technology is available that doesn’t mean it is the appropriate solution to every problem.  Our integrators work with you to learn your needs and will design a custom system that addresses your subjective security risks.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Todd Huffman-Flickr-Creative Commons

How The IoT Can Protect Your Home or Business

Jonathan Briggs-Network CableOur world is constantly changing and evolving. Progression is an inevitable force that influences the way we live our daily lives. This is especially true of advancements made in the techy devices we interact with on a daily basis. Everything from our smartphones to our security systems. It’s the manner in how we interact with all of these devices that is driving innovation and product design. The internet and networking of devices is creating a connected environment that offers ultimate convenience and changes how we perceive the potential of security systems.

At Perfect Connections, Inc. our licensed integrators provide comprehensive security systems to businesses and homes throughout northern and central New Jersey. We believe in installing quality systems that are in line with the best technological advancements the market has to offer. This doesn’t mean we use the trendiest devices for the sake of being “trendy,” it means evaluating current products that will add value and provide a platform for future adaptation. With the Internet of Things (IoT) it’s imperative to implement devices that are not only relevant but can stand the test of time, within reason.

The definition of the IoT can be summed up as, “the interconnection of uniquely identifiable embedded computing devices within the existing internet infrastructure without requiring human-to-human or human-to-computer interaction.” This means devices that are able to “talk” to one another via an internet connection without third part interference. An example would be a motion detector that automatically uploads a video clip to an authorized smartphone when it senses movement. The IoT is influencing changes in security system components like video cameras, access controls, recording equipment, fire and burglar alarms, locks, and monitoring services. The devices themselves are evolving but so is the manner in which end users and system operators interact with them.

A higher level of remote connectivity to security systems and their components is a result of the IoT. End-users can now login to security systems and their devices via an app on their mobile device. This would allow the business owner who is away on vacation to periodically check-in on the day-to-day by logging into their surveillance system on their smartphone. The homeowner who forgot to lock their doors and arm their system can now do so remotely via a mobile device or computer. Automated notifications can be setup to send an alert when an alarm is triggered, someone tries to gain entry without proper access credentials, when a camera or motion detector capture movement within their range; the possibilities are extensive and continue to be developed.

According to Steve Hausman, president of Hausman Technology Keynotes, we are still at the beginning of the “IoT revolution.” Some research suggest by next year there will be over 30 billion wirelessly connected devices in operation. With everything becoming more and more connected one has to wonder, what are the risks? In this highly connected world, there is a plethora of data being recorded, stored, and shared but who has access and rights to this data? Therein lies the problem.

As with anything connected to the internet, the risk of being hacked or stolen is inherent. In the security world this would be a problem for IP cameras, cloud storage and recording solutions, networked access controls, and basically anything running on or connected to an internet network. With that in mind, industry professionals and developers are continuously working on solutions to prevent and minimize vulnerability.

Hausman says, “Security standards need to be established and enforced at the design and manufacturing levels. As the IoT evolves, we can also expect that society will not only adapt to its usefulness but come to expect that appropriate safeguards be implemented to ensure both privacy and security.” Today, those “safeguards” are being provided by licensed security integrators who understand the risks associated with system automation and the IoT. Often times this means strong encryptions for not only the network, but the connected devices as well.

The IoT isn’t something that’s going to disappear. Its presence in the security industry will continue to shape the way manufacturers develop products and how they are implemented by security integrators. As licensed professionals our integrators at Perfect Connections, Inc. provide comprehensive security system solutions to businesses and homes throughout northern and central New Jersey, and have been doing so for over 25 years. Our team has witnessed decades of advancements in the industry. We realize it is our duty to continue our own education as well as offer knowledge to our customers when implementing new technologies and component counterparts.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Jonathan Briggs-Flickr-Creative Commons

Can Your Camera See In The Dark?

West Midlands Police-Infrared FootageNot all surveillance cameras are created equally.  It may seem as simple as selecting a surveillance camera and popping it into place, but what about the external factors that affect the quality of recorded images?  One of the top concerns for industry professionals and end-users alike is a cameras ability to see in the dark or varied light conditions.  Whether you’re using interior or external cameras, their ability to function under varied light conditions is paramount.  Our experts at Perfect Connections, Inc. understand the importance of a surveillance system that doesn’t quit when the sun goes down.  We are a licensed security systems company that has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for over 25 years.

What challenges do different lighting conditions pose to surveillance cameras?  The most obvious is the absence or lack of light.  Unless your cameras are True Day Night it is likely that they will not be able to pick up fine details in the lack of light.  Another common issue is the effect of light glare.  Problematic glare can come from car headlights to poorly placed exterior lighting fixtures.  Glare will disrupt the sensors in the video camera and the recorded footage can be rendered useless.  It is important to take lighting conditions into consideration when choosing and installing cameras as it will impact the overall effectiveness of your system.  What good is a camera that captures grainy unclear images or blanks out for seconds at a time?

Fortunately there have been vast improvements in the surveillance industry that are changing the game when it comes to light adaptation capabilities.  According to Greg Peratt, Senior Director of the Panasonic Video Solutions Integration Team, there are IP (Internet Protocol) cameras that can capture detailed footage in lighting less than .01 lux illumination.  Lux illumination is the metric measurement for how much light falls on an object.  A measurement of 1 lux, “equals the amount of light that falls on a one-square-meter surface that is one meter away from a single candle.”  Therefore a camera that can capture detailed images in less than .01 lux illumination is not only impressive, it’s advantageous.

Another helpful advancement in the case of low or varied light is the Infrared Cut-Filter Mechanism (IRCF).  This filter is automatically lifted or lowered in front of the camera’s sensor depending on the light levels.  The IRCF helps block out disruptive infrared light that can come from sunlight or certain lighting fixtures and it ultimately improves the camera’s low-light performance.  When light levels are low-typically at night-is when the filter is automatically lifted from in front of the sensor.  Cameras that have this feature are considered to have True Day Night capabilities.

The only hitch with this technology is color is often distorted or lost completely.  However, the camera is still able to capture a clear black and white image and according to Steve Carney it captures an image, “…that is not only vastly more usable but also cleaner without chroma noise.”  Carney points out another differentiator between True Day Night cameras and the impersonators is what happens when the IRCF is lifted or removed.  In a True Day Night camera a piece of “dummy” glass will take the place of the IRCF in order to maintain focus and, “minimize the spectral offset between visible and IR light.”  In other cameras the ability to remove such a filter doesn’t exist, therefore the full spectrum of visible and infrared light cannot be taken advantage of.

Other features to look for when considering Day Night cameras are the shutter speeds and any tinting on the camera housing.  Varying shutter speeds affect the amount of the light that is able to be captured.  The slower the shutter, the more light is captured which isn’t always better.  Often times a camera will come with a domed or “bubble” exterior housing.  These “bubbles” can sometimes be tinted.  Depending on your application you may or may not need tinting; sometimes the tint can have an adverse effect by decreasing visibility and obstructing image clarity.

Whether you are replacing older interior/exterior cameras or installing new, your best solution is to call on the experts.  Every business and facility is different which means each will have different requirements when it comes to day/nighttime surveillance.  Having a licensed security professional do an in person assessment of your facility will help determine what type of camera should be implemented and where.  Our team of licensed professionals at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and facilities throughout northern and central New Jersey since 1992.  We believe in personalized service that tailors solutions to your individualized needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by West Midlands Police-Flickr-Creative Commons

Why You Need A Monitoring Station

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response. This system still exists today and is considered an effective means for preventing disaster and catching criminals. However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device. One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We have seen how technology can affect not only individual security devices but the system as a whole. There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it. This is where the idea of self-monitoring comes into play. If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device. This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act. The same is true of a tripped alarm. This all sounds great, right? However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response. This could happen for a number of reasons. One being your mobile device is turned off or not on your person. Another could be a missed notification. As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times. It’s a feat not likely met by any independent business owner, you have to sleep at some point. Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day. The constant interruption would be enough to drive anyone mad. It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one. In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage. Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring. There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors. According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.” It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location. However, this doesn’t mean someone will be vigilant 24/7. This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it. Lastly, there’s professional remote video monitoring. This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios. These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities. Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage. As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it. These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility. An operator may notice things like loose wires or a piece of equipment that looks out of place. Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them. Many industry professionals agree that having a professional monitoring station is still the preferable method of watching over your facility. There’s simply too many holes in trying to self-monitor your own business. According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.” Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.” With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for over 25 years. We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs. If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t. The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

If Your Security System Is Missing One Of These, It’s Not Complete

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a complete security system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that complete security systems should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing complete and comprehensive security solutions to homes and businesses in northern and central New Jersey for over 25 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons

Want Better Surveillance Video Quality? Go With Megapixel.

If you’re in the market for a security system a major component you’re probably considering is video surveillance.  While doing a little research you’ve likely come across a plethora of surveillance options with various technological features.  It may seem like a daunting task to choose the cameras that suit your needs, which is why you should always consult a licensed security systems professional.  They’ll be able to assess the security risks associated with your facility and provide optimal solutions.  Our team at Perfect Connections, Inc. has been providing comprehensive security systems to businesses throughout northern and central New Jersey for the over 25 years.  We understand the process and can help you protect what matters most.  Our experts are knowledgeable in all aspects of security system integration including surveillance.  Whether or not you’ve done your own research it’s likely you’ve heard or come across the term megapixel.  What does that mean in regards to surveillance systems, and what are the advantages/disadvantages?

640px-Definitions_of_TV_standards To understand the relationship between megapixels and video surveillance let’s first figure out what megapixel means.  A pixel is a “picture element residing on the image sensor (in a camera).”  The quantity of pixels helps determine the resolution of an image.  All megapixel cameras have a minimum of 1,000,000 pixels which means the image is comprised horizontally and vertically 1,000 x 1,000 pixels.  In recent years there has been an increased demand for megapixel surveillance cameras over the standard definition cameras widely used in the past.  Standard resolution cameras typically have a resolution of approximately 400,000 pixels.

To get an idea of the difference between image resolutions the picture above shows three variations.  The front image shows a standard resolution of 576 pixels, the middle shows an HD (High Definition) resolution of 720 pixels, and the last image shows an HD 1080 pixel resolution.  While most consider all HD cameras to fall under the megapixel category Raul Calderon, senior vice president of marketing for Arecont Vision, says that HD cameras with a 720 pixel resolution are not technically a megapixel camera as the resolution only adds up to 921,600 pixels.  A major difference between HD and megapixel cameras is HD cameras have to comply with set standards whereas megapixel cameras simply refer to the number of pixels.

A major advantage to investing in megapixel camera technology is the ability to use less cameras to cover larger areas.  With standard definition IP (Internet Protocol) or network cameras coverage is significantly limited and typically requires more cameras and cabling.  Megapixel cameras require less cabling and therefore the cost of labor and cabling is typically less than installing standard resolution cameras.  The ability to digitally zoom-in on an image without losing clarity is another benefit of utilizing megapixel cameras.  Megapixel recordings are clearer than standard resolution cameras therefore more consumers are storing footage for longer periods of time, which can be helpful in solving crimes.  They decrease the need for constant live monitoring as the footage can be revisited with ease.  Other benefits include a long lifespan, they conserve energy, and they are low maintenance.

Megapixel cameras not only benefit the owner but different industries as well.  With more quality recorded footage being stored the more the recording and storage industries will grow.  As megapixel cameras become more ubiquitous, technologies used in conjunction with them will grow and change.  For example the types of video displays and lenses will likely become more developed.  While there are many benefits to megapixel cameras the potential drawbacks include initial cost of installation and the challenge of keeping up with the fast paced technological changes.  Fortunately, as these types of cameras become more widely used their pricing will be driven down.  As far as technological advancements are concerned there will always be changes and improvements it’s a matter of security system experts providing ease of integration and updates.

While you now have a little background on megapixel cameras and their advantages/disadvantages, it’s still imperative to contact a licensed professional for your security needs.  They’ll be able to assess the specific security risks associated with your facility and which products will work best.  Our team of experts at Perfect Connections, Inc. have been providing professional service to businesses and facilities throughout northern and central New Jersey since 1992.  We understand the complexities involved in creating a comprehensive security system that is tailored to your needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Raskoolish at ru.wikipedia-Google-Creative Commons “Definitions of TV standards” by Raskoolish at ru.wikipedia. Licensed under CC BY-SA 3.0 via Wikimedia Commons http://commons.wikimedia.org/wiki/File:Definitions_of_TV_standards.jpg#/media/File:Definitions_of_TV_standards.jpg

How To Spot A Scam

Scam-Widjaya IvanImagine you’re at home and the doorbell rings. You go to answer the door. Who’s there? It’s a salesman claiming to be a representative from a security system company. They tell you they’re at your home to offer you a free security system. Sounds too good to be true, right? That’s because it probably is. Unfortunately, this type of scam is not uncommon in the residential security system industry.

At Perfect Connections, Inc. we believe in helping our customers, not ripping them off. Our licensed experts install customized and comprehensive residential security systems throughout Northern and Central New Jersey. We know each home is unique, which means each system should be tailored individually. False promises, aggressive sales tactics, lengthy and overpriced contracts are NOT what we are about. Unfortunately, there are many door-to-door “sales” people that are only looking to make a quick buck. In doing so, they typically pressure you to sign high priced contracts or make a purchase on the spot. They talk fast to avoid any questions you might have, and to meet their end goal which is you writing a check or giving them your credit card information.

These so called “sales” representatives aren’t even associated with an actual security company in many instances. In some cases, like one reported by CBS Miami, these sales associates may falsely represent themselves as part of an already established company. The case in Miami involved a man named Yassiel Cabre who reportedly worked for a company called Alarm Digital Telecommunication. Instead of representing himself that way, he would tell homeowners he worked for ADT, which is a well-known security systems company. He even gave out folders and business cards that clearly displayed the ADT logo. He conned one victim into signing a 5 year contract (industry standard is typically 36months) with a company called Monitronics (ADT competitor), promising them they would be saving money because ADT supposedly purchased Monitronics. Of course this was 100% false.

Con artists or aggressive door-to-door sales people will sometimes use scare tactics to get you to sign contracts, buy what they are trying to sell, or simply let them into your home-only to steal from you. They might feed you forged crime statistics about your neighborhood to persuade you into buying what they’re offering. They do this hoping fear will get the better of you. If they’re not scaring you into buying an inadequate or fake system, they might offer freebies. A common tactic is to offer a free “system” in exchange for allowing them to put a sign on your lawn (consumerreports.org). While this may sound like an awesome deal, it’s not. As you’re caught up in the word “free,” long term contracts will be sneaked in as a formality of the deal, and you’ll sign because it seems fair. Next thing you know, you’re locked into an expensive agreement that costs an arm and a leg to cancel.

Don’t let yourself be a victim of these forceful sales strategies. There are some telltale signs that you might be getting scammed or ripped off. Check out the list below:

  • Aggressive sales tactics
  • Skipping right to the contract instead of taking the time to discuss and review the vulnerabilities of your home
  • Limited time offers
  • Companies that sell your contract to a bigger company after the initial agreement is made
  • Using fear as a selling point
  • Offering everything for “free”
  • Claiming to be a representative from your current security systems company
  • They will not produce proper identification or licensing
  • Fast talking and speedy contract review
  • Immediate installation without an assessment

Lesson number one: do your research before signing anything. If you suspect someone of false representation or not having the proper licensing, report it to your local authorities. Be sure you find a security systems company that is not only reputable but knowledgeable. The sophistication and effectiveness of your system is only as good as the experts who provide and install it. For over 25 years Perfect Connections, Inc. has been providing custom residential security systems to Northern and Central New Jersey. Our specialists are licensed and understand the complexities of a comprehensive system. We know how to guide you through the process from an initial on site assessment to final installation. Let us help you protect what matters most.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE. Beware of scammers and make sure you’re relying on a trusted and proven security company by calling us today.

Image Credit: Image by Widjaya Ivan-Flickr-Creative Commons

Securing Multi-Tenant Offices

Office SpaceWe have all seen an office building, whether it’s the 104 floor World Trade Center in New York City or the 5 floor office you work in.  Many of these buildings house a multitude of different businesses.  This begs the question, how do you protect your business when you share a space with multiple tenants?  You don’t know their clientele or who is coming and going on a regular basis, just as they don’t know yours.

The security challenges that face business owners in a multi-tenant office space are diverse as each tenant is providing a different service with individualized needs.  At Perfect Connections, Inc. we have been providing security system solutions to businesses throughout northern and central New Jersey for over 25 years.  Our experts understand the security complexities business owners and facility managers encounter on a daily basis, and we can provide an individualized plan specific to your company’s needs.

What security challenges do companies face in a multi-tenant space, and how can they be overcome?

A major challenge for tenants and facilities managers is communication.  As each business within a shared space operates differently, they’re likely going to have different security needs.  These needs should be clearly communicated with the building owner, facilities manager, and security systems provider.  If you’re a business that requires a higher level of secured access into the main building, and your office space, that should be discussed up front.

Often times in a shared building there are already security features in the entrance or lobby.  These areas serve as an initial means of access control, but different business owners may have different desired security restrictions.  For example, the company next door to you might not require a sign-in or check-in with security upon arrival, but maybe your company does.  Why does this matter?  It may affect how you secure your individual office space within the building.  You may not want another company’s client or employee accidentally wandering into your space.  A building owner or manager may have their own set of restrictions for each tenant as well, so having that conversation up front is imperative.  By having your own security in place you lessen the chances of workplace violence and employee theft from unauthorized entrants as well as within your own business.

Providing your employees with an emergency plan or protocol is important.  The buildings facilities manager will likely already have a plan for the entire building that includes alarm testing, drills, and escape routes.  You may be the type of company that wants to run your own emergency drills.  Running emergency drills is a great way to ensure your employees are prepared.  However, when running preparatory drills be sure to inform your neighbors and the facilities personnel to avoid confusion and unneeded chaos.  It might be beneficial to hold a meeting about emergency procedures with the building manager and neighboring company owners to come up with a cohesive plan.  That way you reduce the risk of complete panic if everyone is on the same page.

Construction and renovation within multi-tenant office buildings is not uncommon.  Redistributing space or accumulating office space can pose a security challenge for tenants.  During a renovation your building becomes a host to a multitude of people that you aren’t used to seeing on a daily basis.  This includes construction workers, architects, inspectors etc.  While these people are likely respectable individuals, you don’t know them, and you may not want them accidentally entering your space.

While most would agree a comprehensive security system is better to install during the initial stages of building construction, it doesn’t always happen that way.  In some buildings you may have tenants that opt for an individualized security system after moving in.  When acquiring space, you may run into old or inefficient security systems that do not align with what you might have in your current space.  To ensure your security system is cohesive and efficient you should involve your security systems provider during the initial design phase for the new space.  This will help make sure your current space is protected during the construction phase, and that all components will work seamlessly once completed.  According to Sean Ahrens, a senior security consultant with Schirmer Engineering (in regards to access control and alarm monitoring), “The only way to address those issues is with communication during the design process.”  He’s right, and this concept applies to all security issues a tenant may have.

While securing your business within a multi-tenant space can be complex, the technical side would be covered by your security systems provider.  It’s up to you as the owner to communicate your desired outcome, get the right professionals involved from the start, and to have a vision for how you want your company protected.  Here at Perfect Connections, Inc. we’ve been providing comprehensive security system solutions to companies throughout central and northern New Jersey since 1992.  We provide everything from access controls to video surveillance and so much more.  Our team can assess the risks specific to your business and provide a customized system to help you protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.