What Sets Us Apart

logoWhen you’re starting any kind of project, what’s one of the first things you do?  In all likelihood you go to your computer, smartphone, or mobile device and open up a search engine.  You run search after search to find what you’re looking for.  In our connected world of the IoT (Internet of Thing) we are, at least partially, reliant on what we can find online.  You can find information on virtually anything.  This includes anything from how to properly stain a deck to how to choose which security system integrator is the best.

Entering almost any search will draw up a slew of options, so how do you choose?  Any company can toot their own horn and sound good on paper, or online for that matter.  That’s where customer reviews, testimonials, a personal reference, and researching the business comes in handy.  When it comes to installing a security system at your home or business you want to feel confident that who you hire is experienced, licensed, knowledgeable, and trustworthy.  At Perfect Connections, Inc. our team of licensed integrators design and install comprehensive security systems in homes and businesses throughout northern and central New Jersey.  We’ve been providing detailed and professional service for the past 23 years.  We specialize in custom designed security systems that typically include fire and burglar alarms, video surveillance, access control, alarm monitoring, and interactive services.

As a commercial and residential security system company, our team at Perfect Connections prides itself in providing systems and service that exceed your expectations.  Unlike other security system providers we’re confident we can create solutions to almost any issue you may have.  This includes thinking outside the box, literally, when it comes to designing a comprehensive security system.  Many integrators will limit themselves to the specifications of a security component and won’t get creative to manufacture a solution.  The same is true about structural obstacles, some companies will not even attempt to solve an installation challenge if they perceive it to be too difficult.  At Perfect Connections we’re problem solvers.  We exhaust all options before accepting defeat, and more often than not come up with a creative solution.

With Perfect Connections you know what you’re getting.  When we quote a job for specified work the price you’re quoted is the price you will pay, no added fees or upcharges.  Typically the only time you would end up paying more is if additional work is requested after the fact, but that doesn’t mean you’ll be charged more because of an unanticipated structural or component issue.

While we can’t necessarily prove the authenticity of an internet comment, we can present the facts about our company.  As a commercial and residential security systems provider in northern and central New Jersey, our team at Perfect Connections has the expertise and customer loyalty to prove our professional status.  Aside from offering quality products and installation, we truly value our customers and their needs.  Our typical customer base covers a wide range including homeowners, hospital and healthcare facilities, assisted living facilities, recycling and salvage yards, office buildings, and manufacturing facilities.  Nobody, and nothing, is perfect, but we are constantly working our hardest to ensure our clients’ needs are being met.  What sets us apart from the competition is what we offer, our commitment to quality service, and our ability to problem solve designing customized systems.

Available ONLY at Perfect Connections

  • We offer a 30-day money back guarantee if you are at all dissatisfied, no questions asked
  • There is a one year warranty of EVERYTHING we offer
  • We have a 98% customer loyalty rating
  • Perfect Connections has been in business since 1992 with more than 1,200 customers in Central and Northern New Jersey

What Else Do We Offer?

Perfect Connections The Other Guys
Live 24/7/365 support available Most expect you to call during business hours
Technicians on call 24/7 There is no standard
Immediate response in case of emergency (typical response is 45 seconds) Typically respond within minutes
Service & maintenance contracts available Only available at large security companies
Leasing & financing available Standard for most
Customers save 10-20% on L & P insurance Standard for most

 

With the level of service and products we provide, our team of licensed professionals will ensure the security of your home or business.  Our specialty is comprehensive customized security systems that include fire and burglar alarms, access control, video surveillance, alarm monitoring and interactive services.  If you live or run a business in Northern or Central New Jersey, don’t hesitate to give us a call at 800-369-3962 and visit our website for more information HERE.  Let us help you connect and protect what matters most.

Security’s Role in Property Management

Commercial BuildingAs a property manager you have a lot of people that depend on the safety and security of the real estate you oversee.  Whether or not you own the properties you rent, or work with a landlord in managing their properties, a bulk of the responsibility lies on your shoulders.  Your main goal is to attract responsible patrons, keep them, and build your brand.  How can you do that if the property you oversee is publicly perceived to be too risky or unsafe?  That’s the problem, if there has been an incident at a property that you own the public tends to remember and will likely steer clear of that address.

This negative reaction can be limited by implementing preventative security measures that meet the needs of your tenants and the risks associated with the surrounding area.  One of the best preventative measures you can take as a property manager is to incorporate a comprehensive security system in combination with defined property protocols.  At Perfect Connections, Inc. our licensed integrators provide comprehensive security system solutions that suit your specific needs.  We have been installing security systems in facilities and residences throughout northern and central New Jersey for the past 23 years.  Our team recognizes the challenges property managers face dealing with multiple properties both commercial and residential.  We specialize in comprehensive security systems that include fire and burglar alarms, access control solutions, video surveillance, and system monitoring.

Trying to determine what type of security system is necessary for a specific property can be difficult that’s why it is important to involve a security professional from the start.  This is especially true for new construction projects.  Involving a security integrator from the start will ensure you are getting the coverage you need and create a seamless installation process.

One of the first and most important procedures to tackle is a risk assessment.  A risk assessment should include a licensed security systems integrator and it should be performed as early on as possible.  This will help determine where your greatest security threats are and how best to tackle them.  The next step would be to design a custom security system that helps combat those threats.

While every security system application will be different dependent on the location there are some key components that will benefit most buildings.  Video surveillance is a major security feature that is essential to any comprehensive system.  The mere presence of a camera system is sometimes enough to deter potential criminals.  It helps keep an eye on your property even when you can’t be there, it also gives your tenants a peace of mind knowing their public spaces are being looked after.

Access control is another important piece of the security system pie.  It helps limit who and how people can gain entry and sometimes exit.  Access control can be implemented in a number of ways.  Often times a credential is issued to the approved users and they typically come in the form of a swipe card, a fob, or a proximity card.  These credentials are used in conjunction with an electronic reader installed by the desired entry point.  Using access control credentials instead of traditional keys helps prevent lost or stolen items from being duplicated.  A similar type of idea can be used with parking lots and garages as well.

Fire and burglar alarms in combination with access control, video surveillance, and an alarm monitoring service make for a comprehensive security system.  A security systems integrator helps ensure your fire alarm is installed and operates according to national and local codes.  Having an alarm monitoring service will help alert you and the proper authorities at the first sign of a disturbance.  With today’s technology there’s the potential to remotely monitor what is going on at your facilities through an app on your smartphone.  Mobile apps typically have the capability to send you notifications if an alarm is triggered, or you can customize the type of notifications you want to receive.  This could be particularly beneficial if you own multiple properties in different areas.  A security system is meant to be a purveyor of safety and convenience.  It helps protect your property investments and your patrons.

There is no “one-stop” security solution for any facility or residence.  That is why it is imperative to involve a security systems integrator, they will assess the risks associated with your particular facility and design a system that suits your specific needs. As a property manager you have people that depend on you to maintain the facilities they utilize, and security should be a factor in that maintenance.  Even if installing a security system isn’t your decision to make, it’s worth bringing up to whomever would make that choice.  Having a comprehensive security system can be a good selling point to your clients and a way to keep them.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992.  We understand the value a security system can add to a facility and the sense of safety it instills in those it is meant to protect.

If you live, run a business, or manage properties in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ines Hegedus-Garcia-Flickr-Creative Commons

What is Z-Wave Technology?

Smart home AccessIn the wake of home automation, smart home, or connected home technology you may have come across the term Z-Wave technology.  What is it?  Z-Wave technology is, “a wireless technology that makes regular household products, like lights, door locks and thermostats ‘smart’.”  It’s what allows your home devices to “talk” to each other and be controlled remotely via your mobile device.  Why is this important?  Well, if you have home automation or been considering it, it’s all about ease of integration, flexibility, and interoperability.  Home automation and its perspective devices are an integral part of a comprehensive home security system.  At Perfect Connections, Inc. our licensed integrators have been providing comprehensive home security solutions for the past 23 years.  We believe in making your life easier and more convenient by providing technologies that not only operate effectively but help provide superior protection.

Having strong communication between devices is crucial to the efficacy of your system.  It seems Z-Wave technology has the majority grip on the market as it stand today, one of the main reasons being it boasts communication capabilities for more than 1,100 products from over 300 different manufacturers.  This is beneficial to integrators and end-users alike.  The quantity of smart products that operate on Z-Wave technology opens the door to highly flexible smart home applications.  This means you can outfit your entire house with automation devices that can be controlled from your central control panel or a single application on your mobile device versus having to control devices piecemeal because they don’t operate on the same technology.

According to Mark Walters, chairman of the Z-Wave Alliance, “…greater than 80 percent of the North American security company-based lifestyle solutions are powered by Z-Wave.”  The wide breadth of automation product availability within the Z-Wave family provides immense system scalability for homeowners and integrators.  Meaning your initial product installations are not finite.  Security and automation devices can be added on an as needed basis.  For example, you may start with automated door locks, lighting, and garage door control but you may find that with time your needs expand to temperature management, skylight controls, and/or guarding against potential water damage; it’s always nice to only have to go through the installation process once, but it’s comforting to know you have options after the fact.  While most homeowners rely on the experts to properly install devices in their home, the range of Z-Wave technology products does open the door to a more DIY approach.  However, it is important to note that it is always wise to consult a licensed security system integrator to ensure proper product installation and operation.  This technology also provides an open platform for integrators and consumers who prefer products from a specific manufacturer, making it easier to get exactly what you want.

What about existing household technologies, will they be affected by Z-Wave home automation devices?  Today our lives are inundated with technology, your home probably has a slew of devices that operate on Wi-Fi or Bluetooth.  The potential issue with a house full of devices operating simultaneously is the communication disruption they can incur on one another.  Luckily with Z-Wave technology you don’t have to worry about interference with or from other household devices.  Its operational capabilities were designed specifically for home control.  It’s a low energy consumption, bandwidth efficient technology that won’t inhibit other home devices.  Z-Wave technology also has a vast international presence throughout Europe further expanding their territory for consistency, device compatibility, and home automation integration.

Home automation is a facet of comprehensive security systems that improves a homeowners posture in security.  It is meant to improve lives through convenience and seamless integration.  With home automation you can turn lights on and off remotely with the tap of your finger on your mobile device.  You can arm or disarm your alarm system while on vacation.  You can monitor an aging loved one who wants to maintain a level of independence by tracking their activity on your smartphone.  Or you can use it to receive instant notifications of real time events like your kids arrival home from school.  Like any system, home automation is only as good as the sum of its parts and the technology it operates on.

Z-Wave technology is the means by which many automation devices communicate with each other and the system as a whole.  The strong hold it has on the market today seems to prove it’s effectiveness and dependability.  It creates flexibility in product selection and system integration without interfering with existing household devices.  Chances are if you already have home automation as part of your security system your devices operate on Z-Wave technology.  This technology and the devices it encompasses show no signs of slowing down in our age of technological progression.

Our licensed integrators at Perfect Connections, Inc. have been providing custom and comprehensive security system solutions to homes throughout northern and central New Jersey since 1992.  We believe in providing technologies that enhance your home’s security and home automation devices do just that.  Home automation is part of a comprehensive security system which should include fire and burglar alarms, video surveillance, access control, and a monitoring service.  We help your home security stay relevant and provide technology that improves your quality of life.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Domoalert Smart Life Quality’s photostream-Flickr-Creative Commons

Healthcare Climate and Security

Healthcare-NEC Corp of AmericaHealthcare facilities pose a unique security situation.  By nature they hold a lot of risk other organizations don’t necessarily have to deal with.  Most healthcare facilities are open to the public and provide care for a vast array of people on a daily basis.  Many facilities also house expensive and often sought after narcotics or medications.  Also, recent changes to healthcare policies are having an effect on everyday operations and their implications may not be fully realized yet.  These factors combined with the unpredictability of patient and public behavior make healthcare facilities particularly sensitive environments that require special attention when it comes to security.

As licensed security system integrators our team at Perfect Connections, Inc. understands the changing healthcare climate is producing security risks that need to be addressed.  We have been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992.  Protecting the integrity of any healthcare facility is crucial to the safety of not only its patients and the general public, but medical staff as well.

Unfortunately, healthcare facilities are no strangers to criminal activity.  The 2012 Crime and Security Trends Survey, based on responses from 208 healthcare organizations across the United States, showed that incidents of crime at healthcare facilities are on the rise.  In just two years from 2010 to 2012 these incidents rose 37% from a reported 15,000 to more than 20,500.  Keep in mind these were reported events.  The US Department of Justice estimates that at least half of the crimes committed go unreported.  A reason organizations fail to report disturbances is at least partially due to the fact that they don’t want to look bad in the public eye and potentially lose patronage.

There are many contributing factors to the rise in criminal incidents at healthcare facilities.  For one, many facilities are open to the public 24 hours a day, 7 days a week which can leave them vulnerable.  Outside disputes sometimes spill into the healthcare environment causing disturbances and putting staff and patients at risk.  Many facilities house pharmaceuticals which can attract substance abusers and drug dealers, increasing the risk of narcotic theft and violence.  Another security issue facilities face is when their real estate expands.  When healthcare organizations acquire new facilities it can be difficult to create consistency in mitigating risks and instituting security protocols, especially across sprawling campuses.

The Affordable Care Act (ACA also known as “Obamacare”) poses a not so obvious concern when it comes to healthcare security.  How can a healthcare policy affect security you ask?  According to James Barbour, Market Research Analyst on the Kratos PSS Marketing Team, the ACA will undoubtedly have implications on healthcare budgets.  He says, “Hospitals will guard their budgets cautiously, and security—traditionally viewed as a cost center—will feel the pinch.”  Experts also estimate a rise in patient volume due to more people being insured.  This has the potential to overwhelm facilities that are already stretched too thin due to budget cuts.  The repercussions of the ACA have not been fully realized in general, however security integrators and healthcare professionals should be thinking about ways to effectively and economically manage the risks associated with the healthcare environment.

Often times a healthcare facility will employ physical security guards to help ensure the safety of their staff and patients.  However, in the changing economy and in light of policy changes we know security may be faced with spending challenges.  Security guards may be on the chopping block when it comes to budget costs, so how can facilities make up for the lack of physical security?  Implement comprehensive security systems that include access controls, surveillance, monitoring and notification systems, and lockdown capabilities.

Access control systems can help limit who can gain entry to specific areas of your facility.  This would help in sensitive areas, like pharmaceutical storage and data centers.  According to Joe Liguori, president of the Board of Directors Security-Net, “healthcare facilities are finding that there is a long-term cost savings by implementing access control for storage and supply closets, for example, eliminating the need to change locks and replace lost or stolen keys.”  Access control can also help decrease or eliminate theft.  By using different methods like card readers, fobs, or sometimes biometrics credentials are harder to duplicate or steal making it easier for medical staff to focus on what is most important, their patients.

In addition to access control, surveillance plays a key role in crime prevention and overall safety.  Security cameras allow an organization to have eyes across their entire facility including areas that often go unprotected like parking lots/garages.  Having a monitored security system, especially in regards to surveillance, helps alert the proper authorities faster in an emergency.  In tandem with a monitoring service, a mass notification system can notify the right personnel in an emergency or dangerous situation as it is occurring.  Being notified of an event as it happens would allow for immediate action and hopefully prevent further damage.  This is where lockdown capabilities would be beneficial as well.  All it would take is the touch of a single button from a facility member, and part or all of a building could be shut down.  This is a particularly beneficial feature that can keep a perpetrator out of certain areas in high risk scenarios.  Fortunately, lockdown capabilities can sometimes be easily integrated with existing access control features.

While crime statistics can seem daunting, it’s important to remember that many, if not most, healthcare facilities are generally considered safe.  However, as a healthcare professional or facilities manager it behooves one to consider the risks specific to their organization and how they can be mitigated.  As security system integrators, our licensed team at Perfect Connections, Inc. has been providing comprehensive security solutions to healthcare facilities throughout northern and central New Jersey for the past 23 years.  Just like your patients, we know that no two facilities are exactly the same and that it takes an individualized approach to solve specific needs.

If you live or run a healthcare facility in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by NEC Corporation of America-Flickr-Creative Commons

What Makes A Security System A System?

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that a security system should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing comprehensive security solutions to homes and businesses in northern and central New Jersey for the past 23 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons

What Is Web-Based Access Control?

Scott Lewis-smart lockThe technological climate is swiftly changing the way we connect and interact with the physical world.  Endless runs of cable and spaghetti wiring is becoming an antiquated notion with the development of wireless internet based equipment.  This is evident in the way some security system integrators are approaching system design and installation.  As industry professionals, our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey for the past 23 years.  It is our goal to not only provide innovative security equipment, but implement components that are effective and make sense within a specific organization.

Access control has always been a top security concern for any establishment.  Whether it means using a lock and key, card reader, or fingerprint, it’s a means by which your business is shielded from unauthorized personnel.  As an integral part of a comprehensive security system, access control mechanisms need to function on the same level as their system counterparts.  Meaning software and technology updates/applications should apply across the board without disrupting the system as a whole.  IP (Internet Protocol)/web-based technologies are making the advancement of security system components more attainable and desirable to both end-users and system integrators.  This is evident in the continuing migration from analog based surveillance to IP.  Web-based technology is not exclusively transforming surveillance, but security systems as a whole, including access control mechanisms.

What does web-based/IP access control really mean?  Your typical access control system is made-up of software, card/badge readers, controllers, and credentials.  In many existing systems today, the software has to be updated manually or on site, the readers and controllers have to be supplied with wired power, and credentials typically constitute a fob or swipe card.  With web-based or IP access control everything from installation to software updates changes.  Much like many IP surveillance cameras, web-based access control systems are connected to a company’s internet network.  Access control that operates over a network opens the door (pun intended) to increased scalability, installation flexibility, remote system access and management, reduction in the need for traditional power outlets, and cost efficiency.  This creates a more open platform for system management and integration.

In the not so distant past access control systems would be designed with products from a single manufacturer.  While this may seem like a good idea, think about what happens if products are discontinued or the manufacturer goes out of business and no longer supports your system.  You’re left with having to start from scratch which is not only a hassle but costly as well.  With web-based access control, components don’t necessarily have to be supplied by one manufacturer.  Being able to source readers, controllers, and credentials from different manufacturers benefits the end user and security integrator by limiting the cost of repair or replacement, as well as creating a smoother transition between software updates and system upgrades.  The technology and software behind these products are becoming more universal which leads to better overall system operation and integration.

The flexibility of web-based access control systems far surpasses physical access controls used in the past.  You have the option to secure multiple entry points at a singular site or across numerous sites nationwide, even worldwide.  Unlike traditional systems, multiple sites can be controlled, updated, and managed from a singular location either on site or remotely over a secured network.  In this sense web-based security features help with system management consolidation; streamlining operation processes making the day-to-day more convenient.

One of the most desirable features of web-based access control systems is the reduction of required cabling.  Depending on the application, readers don’t necessarily have to be wired directly to the network.  This cuts down on cabling and labor costs.  It also provides flexibility in situations where cabling may not be an option, such as installations in historical buildings.  Same is true about the energy supply to readers and locks.  In the past it may have been difficult for integrators to place access control equipment because of a lack in electrical outlets or supply.  Now, with web-based access control equipment, often times power can be supplied through a direct network connection known as PoE (Power over Ethernet).  PoE connections provide power and data to a connected device through a singular cable.

According to Bill Moran, vice president of Sales for Red Cloud Security, “Web-based access control offers features and functionality that enhance an organization’s security posture. From one consolidated screen, administrators can view and manage alarms, video surveillance, facility maps, and identities including photo and personnel details.”  He also points out that in the event of a triggered alarm or someone forcing their way through an entry point, the network can be suspended while cameras at the scene can be accessed for live streaming.  This is where the idea of a comprehensive security system comes into play, where all of the components are easily accessed and essentially working together.

Web-based security features are transforming the way end-users and industry professionals perceive security in general.  In a world that continues to become more and more connected through technological advancement and the IoT (Internet of Things), it only makes sense that the infrastructure of the physical world should follow suit.  Web-based access control is just another step in the direction to a more convenient and secured future.  At Perfect Connections, Inc. our licensed professionals are always looking for and researching technologies that better serve our customers.  Our team has been providing comprehensive security system solutions to organizations throughout northern and central New Jersey since 1992.  We help you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Scott Lewis-Flickr-Creative Commons

Changing Residential Access

Alan Cleaver-Key in doorThe days of struggling to carry 50 pounds of groceries while simultaneously trying to dig your house keys out of your pocket or purse, might be coming to an end.  As a homeowner your door locks have always been an essential line of defense when it comes to protecting your home.  While our everyday lives are saturated with technological advancement, it only makes sense that our physical structures should follow suit.  That being said, using a key to unlock your doors may be a thing of the past with wireless access control on the rise.

What is wireless access control?  Essentially, wireless access control in a residential setting means replacing the standard lock and key with a keypad, remote control, biometric reader, card reader, or Wi-Fi access.  Keys are no longer the only method for unlocking your doors, in fact, they become the back-up.  At Perfect Connections, Inc. our team of licensed experts have been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992.  We stay in touch with current technologies and how they might benefit our customers.  Protecting entrances is key (no pun intended) to the safety and security of any home, and we aim to provide the best solutions to each individual residence.

How does a wireless lock work?  Most traditional locks operate on some form of a “pin and tumbler” method.  This is when the serrated edge of an inserted key moves pins on the interior of the lock a certain distance allowing you turn the lock cylinder and open the door.  With a wireless lock (which typically operates on electricity or battery power) has “actuators,” which connect the cylinder or bolt to a motor within the door or frame.  The motor is electrically activated by a keypad, card reader, or wireless remote controller.  On top of that there are locks that work on Wi-Fi signals used in conjunction with your smartphone or mobile device, sometimes referred to as smart or automated locks.  Lastly, biometrics are sometimes used to control home access.  Typically a fingerprint or hand print is the credential required for such a system.

There are many advantages to a wireless locking system.  For one, you never have to worry about losing or forgetting your keys.  This eliminates having to leave spare keys outside or giving them to people who need access to your home.  Instead of using a key you can, depending on the type of wireless lock, give your visitor the access code or with an automated system you can unlock the door from your smartphone.  With a wireless lock there are no wires.  Typically this means an easier and seamless installation.  It’s a technology that would allow for a more ubiquitous integration that includes old and new construction homes.  Wireless locks offer a convenience and extra layer of security you can’t get from a standard door lock.

While there are multiple benefits to a wireless locking system, none of them are perfect.  With a regular lock you might lose your keys, with a wireless keypad lock you could forget your access code or the code could be hacked by a savvy burglar.  Fortunately, if you forget your code many keypad locks come with a physical key as a backup.  As for code hacking, it’s usually best practice to pick a random code, so don’t use a birthday or something easily guessed.  It’s also prudent- and some systems may require it anyway-to change the code every few months or after you’ve let an outsider use it.

The main drawback with a remote controlled lock is, just as with keys, you could lose the remote.  Unlike keys, a remote is usually programed by a computer.  Therefore, in the event that you lose the remote you can deactivate it from the convenience of a computer.  With a smart or automated lock you run into the issue of not always having a reliable Wi-Fi signal.  Then there’s the dreaded question of what happens when the power goes out?  As some of the wireless locks run on electricity, a power outage could be an issue.  However, many of these locks tend to have multiple redundancies in place including backup battery power.  The main deterrent when it comes to biometric locks is the price as they tend to be a fairly complex system that isn’t as pervasive in the residential market as the other technologies.

Whether you are building a new home or want to enhance the security of your current residence, wireless locks can reinforce your first line of defense and provide a convenience you can’t obtain with conventional locks.  As with any security device or installation you should always consult a licensed security systems professional, especially if you’re looking for full system integration.  At Perfect Connections, Inc. our team has been providing comprehensive security system solutions to homes throughout northern and central New Jersey for the past 23 years.  We help you connect and protect what matters most, offering a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alan Cleaver-Flickr-Creative Commons

Should I Move To The Cloud?

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds.  These natural wonders are not the clouds we’ll be investigating here.  Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it.  Think about your everyday, do you use an internet based e-mail account, like Gmail?  If so, then you use a cloud based service.  So what is the “cloud”?  Basically, the cloud takes recorded information and stores it on internet servers.  Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet.  In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that.  While it is an exciting technology with seemingly endless applications, it is not without flaw.  That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry?  In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions.  As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some.  As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network setup and what are the benefits?  In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service.  Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced.  According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.”  Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers.  If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device.  Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency.  As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com).  It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department.  This could help cut down on unnecessary manpower costs.  And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology.  Systems that rely solely on the cloud for recording and storage face some obvious risks.  For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud.  However, these outages are estimated to be no more than 4 hours per year.  Fortunately there are inexpensive solutions to such an issue.  To avoid losing any data a local recording device can be set up to operate for more than 4 hours.  Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users.  However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems.  Business size is also a factor in the cost.  Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required.  So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations.  Cloud access is another major concern for end-users.  The question remains, what is stopping someone from hacking into my network?  Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future.  The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking.  Once the dialogue becomes clearer the cloud has potential to become standard protocol.  If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional.  Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons

What Are My Access Control Options?

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons

Why Custom Is Best

Installing a security sy9677247879_a39e3e702c_zstem can be one of the best ways to protect your business from unpredictable threats like fires and burglars.  Did you know that not all systems are the same?  That’s right there really isn’t a “one size fits all” solution when it comes to securing your workplace, nor should there be.  Why?  Because no two businesses are exactly the same.  Therefore, doesn’t it make sense that a security system should be tailored to a facility’s individual needs?  A healthcare facility wouldn’t have all the same security needs as a retail store, right?  Right.  So how do you go about finding the right system for your business?  Your best option is to hire a licensed professional in the security system field who has extensive knowledge and experience.  At Perfect Connections, Inc. our team has been customizing security system solutions for businesses throughout northern and central New Jersey for the past 23 years.  We understand your business is unique and requires personal attention versus a one-stop solution.

As every home is different and each family has different security needs, the same is true for every business.  There are many factors that go into creating the right system for your facility.  For example the location and demographics, local fire codes and regulations, facility size and type, building/facility access, number of employees, local restrictions, and more.  A business in the middle of a city is going to need a different security system than one located in an industrial park in the suburbs.  This is why it is vital to have a security systems expert do an in person assessment of your facility’s needs before pricing becomes part of the equation.  Don’t fall for the security system company that says they can give you a quote without ever having stepped foot in your facility.

What are the main ingredients for a security system?  At Perfect Connections, Inc. it is our belief that any comprehensive security system includes fire alarms, burglar alarms, access control, surveillance, a monitoring service, and carbon monoxide and smoke detectors.  There are variations on how some of these components are installed and what products are used.  For example there are many different forms of access control.  Access control can be anything from biometrics-which typically analyzes physical human traits like a fingerprint-to smart card readers that require a swipe or tap of a programmed card or fob.

Again, the type of access control that would suit your business best, really depends on what your specific needs are.  Maybe you run a healthcare facility where only certain employees are allowed to access medication supply rooms.  Maybe the best solution in that situation is issuing swipe cards to those specific individuals, or maybe a coded lock would work better.  These are the types of things you want to discuss with your security systems expert.  They will be able to advise you on what system would work best.

Monitoring your alarm system can be varied as well.  While it’s pretty standard to sign a contract with a monitoring service, there is the option to self-monitor as well.  Self-monitoring works by allowing you to access your security system via a smartphone or mobile device.  This type of monitoring could be set up to alert you directly if there is any activity detected at your facility.  The disadvantage to a solely self-monitored system is a slower reaction time and having to constantly be vigilant.  Imagine you don’t have your phone on you and an alarm is triggered at your facility, who’s going to contact the local authorities?  Fortunately, with a monitoring service you don’t have to worry about reaction time because someone is constantly keeping watch.  Even if you opt for a monitoring service often times you can still have the ability to self-monitor at your convenience.  The combination of both gives you the advantage of not having to worry about checking in constantly and the convenience of doing so when you need/want it.

Surveillance is a key component to protecting any business.  How surveillance equipment is set up will vary business to business.  Some facilities may require more or less coverage than others.  Some businesses may be at a higher risk for crime or theft than others as well.  For example Plato’s Closet in Des Moines, IA is susceptible to shrinkage due to clothing, shoe, and accessory theft.  This particular location of Plato’s Closet had a shrink rate of a little over 1 percent, but after they installed 19 IP (Internet Protocol) cameras that rate fell to .8 percent.  The quantity, type, and location of surveillance cameras will depend on an individual business’s needs.

Whether you run a recycling, retail, or healthcare facility protecting your business is a top priority that shouldn’t be left to just anyone.  You need a licensed security systems expert who will assess the risks associated with your business and customize an appropriate solution.  Our team of licensed professionals at Perfect Connections, Inc. understands you’ve worked hard for what you have and we want to help you keep it secure.  We have been providing customized security system solutions to businesses throughout northern and central New Jersey since 1992 helping you connect and protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Nuclear Regulatory Commission’s photostream-Flickr-Creative Commons