False Alarms

False alarm may cost a life-Shannon ClarkIf you have a security system you might already understand the consequences of a false alarm.  It is not something to be taken lightly and can have serious implications.  False alarms can happen for any number of reasons and it’s important to understand why and how best to avoid them.  No security system is perfect, and false alarms are bound to happen, but as end users and integrators it is our duty to try to minimize them.  At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  They are knowledgeable about the products they install and can provide useful information on system function and upkeep to help avoid any mishaps.

As technology progresses and advancements in security manufacturing lead to better products it’s likely the instance of a false alarm or dispatch will be lessened.  According to Ron Walters, director with the Security Industry Alarm Coalition (SIAC), prior to the 90’s false alarms were typically attributed to faulty security products.  Since then manufacturers have been and continue to produce quality products, however that doesn’t guarantee proper application and use.  Accurate installation and usage lies the hands of the security integrator and the end user.  That is why it is critical to hire a licensed security expert for system installation and user specifications.  It is also important that the end user has an understanding of what is expected of them in order to avoid false dispatches.  Unfortunately, approximately 15% of false alarms are considered to be caused by user error.

In a world where there are an estimated 35-36 million alarms in use, according to Stan Martin who is the executive director of the SIAC, false alarms are an unavoidable evil. False alarms and dispatches are an annoyance for end users, but their ramifications don’t end there.  They take valuable time and resources away from emergency responders that might otherwise be needed at an actual crisis.  If you have too many false alarms it can create a “boy cried wolf” situation where authorities might be more hesitant to respond.  On top of all that you could end up paying substantial fines for repeat offenses.  Recurring false alarms that go unchecked can create tension between local authorities, end users, and security integrators.  But negative impacts aside, the SIAC reports that 90% of law enforcement still consider alarm industry professionals valuable allies.

Sometimes it’s difficult to pinpoint the cause of a false alarm as it could have been a situation where an intruder was attempting a break-in and escaped before authorities arrived making it appear like a false alarm.  This is where video surveillance, alarm monitoring, and remote system access come in handy.  Being able to tap into your facility’s surveillance system and visually verify whether or not an intruder is or was present, is a critical time and resources saver.  With remote access via an app on your smartphone or mobile device you can do just that.  The beauty of remote access is you don’t have to physically be on site to see what is going on at your facility.  Having a monitoring service will also help determine whether or not there is an actual emergency and whether or not authorities should be dispatched.  An added benefit to having video surveillance is even if the perpetrator escapes before authorities arrive, the recorded footage can be used to aid an investigation and hopefully identify the intruder.

Aside from having proper security equipment installed there are some helpful tips for end users to keep in mind that will help avoid pesky false alarms.  One, always know your alarm code and be sure all windows and doors are secured before arming your system.  Two, be sure you get your system tested regularly, it’s typical to have an annual inspection but some situations might require quarterly or more frequent tests.  Be sure critical sensors and smoke detectors are adequately covered during any construction or building modification to avoid disruptions caused by debris.  Lastly, always consult a licensed security system provider with any maintenance or care questions.

While false alarms aren’t completely avoidable, you can lessen the chances of them happening to you.  Hiring a licensed security system integrator who is knowledgeable and has extensive installation experience is key.  Installing a comprehensive security system that includes video surveillance, fire and burglar alarms, access control, and a monitoring service will provide complete coverage and reduce the risk of false dispatches and alarms.  At Perfect Connections, Inc. our licensed professionals have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years.  Our technicians have the experience and expertise to install security devices and can help educate you on proper usage.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Shannon Clark-Flickr-Creative Commons

What Happens if My Network Fails?

No Internet-Marcelo GraciolliDoes your security system, or part of it, rely on your company’s internet network?  Or are you considering a system that is at least partially dependent on network connectivity?  If so, what happens if that network fails or is compromised?  Fortunately nowadays the chances of your network dropping or losing connection is pretty slim, in fact the probability of most Internet Service Providers (ISPs) experiencing an outage is about 1%.  But in the rare case that it does become inactive there are methods to keep security features active, in particular network attached surveillance or IP (Internet Protocol) cameras.  Maintaining an operating surveillance system is crucial to the overall effectiveness of a comprehensive security system.  Surveillance footage can aid in police investigations and the mere presence of cameras can help deter criminals.  Fortunately there are methods of streaming and recording footage even when your local area network (LAN) is down.

Our licensed integrators at Perfect Connections, Inc. understand the importance of security system continuity and one that functions with minimal incident.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We specialize in surveillance systems, fire and burglar alarms, and access control solutions.  There is no perfect system, but by installing redundancies and planning with prevention in mind, system issues will be few and far between.

Traditionally recorded surveillance footage would be stored on an external digital video recorder (DVR), but thanks to progressing technology and the desire to streamline everything, virtual and network storage options are becoming more popular.  The cloud is becoming a popular virtual storage method that is cost effective and has seemingly limitless real estate.  To find out more about the cloud, check out our post here.  Whether you’re using the cloud or an external device like a DVR, it’s not a bad idea to have a back-up in the unlikely event your network goes down.  Two common types of redundancies are Network Attached Storage (NAS) devices and SD memory cards.

NAS devices are installed on the same network as your security cameras.  If you’re network were to suddenly go out or someone accidentally caused and outage, the NAS would continue recording.  If you were using the cloud as your main storage and the network drops, the NAS device could be setup to automatically upload recorded data to the cloud once the network is repaired.  It’s also a cost effective method as multiple network cameras can be setup to stream to the same NAS device.

SD memory cards are exactly what they sound like.  They’re storage cards within the actual camera, essentially the same as memory cards used in digital cameras and other devices.  This type of technology is also sometimes referred to as “edge storage.”  SD cards are typically programmed one of two ways.  Either they are constantly recording regardless of the network status, or they are programmed to kick-in when network connection is lost.  According to Fredrik Nilsson, General Manager of the Americas for Axis Communications, using SD cards as a redundancy works best in smaller applications where there are minimal cameras.  The main reason being they cost more per gigabyte of storage in comparison to NAS devices that can accommodate multiple cameras on a single device.

While the likelihood of your network failing or dropping out is pretty low it’s always best to plan for the worst case scenario.  There is no perfect security system, but there are measures that can be implemented to ensure coverage when you need it most.  When it comes to surveillance it’s imperative to have continuity, therefore it couldn’t hurt to have redundancies installed when using network cameras.  NAS devices and SD memory cards are two effective back-up storage methods that will help retain critical information that can later be accessed if need be.  To find out which type of backup is best for your facility always consult a licensed security system integrator.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand no two businesses are exactly the same and that they should be treated with an individualized approach that suits their specific needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Marcelo Graciolli-Flickr-Creative Commons

What is Motion Detection and How Does it Work?

Motion_detectorWhen you think motion detectors (or sensors) you might picture a heist scene from the movies where a thief has to perform acrobatics in order to avoid a web of alarm triggering laser-beams surrounding a priceless gem.  While that narrative is not necessarily complete fiction, it’s not exactly how motion detection is implemented in the real world.  In modern day applications security system integrators use motion detectors to sense unwarranted movement within or outside of a home or facility.  Motion detectors are typically implemented as an essential part of a comprehensive security system meant to help detect an intruder.  There are different types of detectors and their applications are not necessarily synonymous.

Our licensed team at Perfect Connections, Inc. has been protecting homes and businesses throughout northern and central New Jersey with comprehensive security systems for the past 23 years.  We know one of the best ways to halt an intruder is immediate detection that triggers the alarm system.  Motion detectors do just that.  When they detect motion they communicate with the central alarm panel triggering an alarm, ultimately notifying your monitoring service of a disturbance; and before you know it help is on the way.

What are the different types of detectors?  In general there are two types of motion detectors, passive and active.  Within those two categories there are different detector technologies.  Passive detectors sense energy changes within a specific boundary whereas active detectors emit energy to detect motion.

Passive infrared (PIR) is a common technology that detects heat.  If there is disparity between the temperature of the protected area and an obstructive object (intruder) the sensors will be tripped and an alarm will be triggered.  This technology is not immune to triggering false alarms especially if automatic temperature compensation is not employed.  A PIR detector should have automatic temperature compensation to help stabilize the detector in variant temperature conditions.

Microwave (MW) is an active detector that emits microwave pulses and reads the reflection of a moving object.  This type of detector can cover a larger area than a PIR but it can be susceptible to electrical interference.  MW detectors do not recognize the boundaries of walls so they can trigger false alarms set off by random exterior motion.

Then there is Dual Technology detectors which employ a combination of active and passive sensors.  This could mean the combination of PIR and MW technology.  These types of detectors are less likely to set off false alarms as both types of sensors would have to be tripped in order for an alarm to be triggered.  However, that doesn’t mean these detectors are infallible.

Prior to the creation of PIR and MW detectors, motion detectors were not held in the highest regards by system integrators and end-users alike due to their high false alarm rates.  Before PIR and MW there was ultrasonics and photoelectric beams.  Ultrasonic detectors would send out high frequency tones and then interpret the reflections for any disruptions.  Photoelectric beams would send a light beam to a receiver that if interrupted would initiate the alarm sequence (picturing that heist scenario?).  These types of detectors were particularly susceptible to unpredictable movements as they didn’t have the technology to discriminate accurately.  While these motion detectors are not as widely used today they are by no means obsolete.

As technology progresses and the notion of wired installations becomes less and less appealing, wireless systems are taking off.  It’s no different with motion detectors.  Most can be installed wirelessly making their applications less laborious and diverse.  Many security system components have been developed to include interior motion sensors as well, like surveillance equipment and access controls.  For pet owners, there are motions detectors that can be setup to ignore regular motion from pets of a certain size.  Proper installation is crucial to the effectiveness of a motion detector therefore it should be done by a licensed professional.

Comprehensive security systems are what protect your home and business from external and internal threats.  It’s important to consider motion detectors as part of a comprehensive system.  They provide a layer of security that can’t be duplicated, sensing an intruder at the first sign of a break-in.  As licensed security system integrators, our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and homes throughout northern and central New Jersey since 1992.  We help protect what is most important and give you a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by CHG (Own work)-Google-Creative Commons

Healthcare Climate and Security

Healthcare-NEC Corp of AmericaHealthcare facilities pose a unique security situation.  By nature they hold a lot of risk other organizations don’t necessarily have to deal with.  Most healthcare facilities are open to the public and provide care for a vast array of people on a daily basis.  Many facilities also house expensive and often sought after narcotics or medications.  Also, recent changes to healthcare policies are having an effect on everyday operations and their implications may not be fully realized yet.  These factors combined with the unpredictability of patient and public behavior make healthcare facilities particularly sensitive environments that require special attention when it comes to security.

As licensed security system integrators our team at Perfect Connections, Inc. understands the changing healthcare climate is producing security risks that need to be addressed.  We have been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992.  Protecting the integrity of any healthcare facility is crucial to the safety of not only its patients and the general public, but medical staff as well.

Unfortunately, healthcare facilities are no strangers to criminal activity.  The 2012 Crime and Security Trends Survey, based on responses from 208 healthcare organizations across the United States, showed that incidents of crime at healthcare facilities are on the rise.  In just two years from 2010 to 2012 these incidents rose 37% from a reported 15,000 to more than 20,500.  Keep in mind these were reported events.  The US Department of Justice estimates that at least half of the crimes committed go unreported.  A reason organizations fail to report disturbances is at least partially due to the fact that they don’t want to look bad in the public eye and potentially lose patronage.

There are many contributing factors to the rise in criminal incidents at healthcare facilities.  For one, many facilities are open to the public 24 hours a day, 7 days a week which can leave them vulnerable.  Outside disputes sometimes spill into the healthcare environment causing disturbances and putting staff and patients at risk.  Many facilities house pharmaceuticals which can attract substance abusers and drug dealers, increasing the risk of narcotic theft and violence.  Another security issue facilities face is when their real estate expands.  When healthcare organizations acquire new facilities it can be difficult to create consistency in mitigating risks and instituting security protocols, especially across sprawling campuses.

The Affordable Care Act (ACA also known as “Obamacare”) poses a not so obvious concern when it comes to healthcare security.  How can a healthcare policy affect security you ask?  According to James Barbour, Market Research Analyst on the Kratos PSS Marketing Team, the ACA will undoubtedly have implications on healthcare budgets.  He says, “Hospitals will guard their budgets cautiously, and security—traditionally viewed as a cost center—will feel the pinch.”  Experts also estimate a rise in patient volume due to more people being insured.  This has the potential to overwhelm facilities that are already stretched too thin due to budget cuts.  The repercussions of the ACA have not been fully realized in general, however security integrators and healthcare professionals should be thinking about ways to effectively and economically manage the risks associated with the healthcare environment.

Often times a healthcare facility will employ physical security guards to help ensure the safety of their staff and patients.  However, in the changing economy and in light of policy changes we know security may be faced with spending challenges.  Security guards may be on the chopping block when it comes to budget costs, so how can facilities make up for the lack of physical security?  Implement comprehensive security systems that include access controls, surveillance, monitoring and notification systems, and lockdown capabilities.

Access control systems can help limit who can gain entry to specific areas of your facility.  This would help in sensitive areas, like pharmaceutical storage and data centers.  According to Joe Liguori, president of the Board of Directors Security-Net, “healthcare facilities are finding that there is a long-term cost savings by implementing access control for storage and supply closets, for example, eliminating the need to change locks and replace lost or stolen keys.”  Access control can also help decrease or eliminate theft.  By using different methods like card readers, fobs, or sometimes biometrics credentials are harder to duplicate or steal making it easier for medical staff to focus on what is most important, their patients.

In addition to access control, surveillance plays a key role in crime prevention and overall safety.  Security cameras allow an organization to have eyes across their entire facility including areas that often go unprotected like parking lots/garages.  Having a monitored security system, especially in regards to surveillance, helps alert the proper authorities faster in an emergency.  In tandem with a monitoring service, a mass notification system can notify the right personnel in an emergency or dangerous situation as it is occurring.  Being notified of an event as it happens would allow for immediate action and hopefully prevent further damage.  This is where lockdown capabilities would be beneficial as well.  All it would take is the touch of a single button from a facility member, and part or all of a building could be shut down.  This is a particularly beneficial feature that can keep a perpetrator out of certain areas in high risk scenarios.  Fortunately, lockdown capabilities can sometimes be easily integrated with existing access control features.

While crime statistics can seem daunting, it’s important to remember that many, if not most, healthcare facilities are generally considered safe.  However, as a healthcare professional or facilities manager it behooves one to consider the risks specific to their organization and how they can be mitigated.  As security system integrators, our licensed team at Perfect Connections, Inc. has been providing comprehensive security solutions to healthcare facilities throughout northern and central New Jersey for the past 23 years.  Just like your patients, we know that no two facilities are exactly the same and that it takes an individualized approach to solve specific needs.

If you live or run a healthcare facility in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by NEC Corporation of America-Flickr-Creative Commons

What’s The Difference Between Conventional & Addressable Fire Alarms?

Fire Alarm-shlala-FlickrAs with anything in the security systems industry, prevention is vital.  Preventing catastrophic loss is a top priority and one of the most crucial security system components that helps avoid such situations is the fire alarm system.  This is a no brainer, but there is some disparity between what type of fire alarm system is best.  In the alarm industry there are basically two types of fire alarm installations, conventional and addressable (or analog addressable).  As always, every situation and application is different therefore claiming one system is superior to the other may not be the right approach.  However, it is important to understand the difference between systems and why one might be used over the other.

Regardless of the type of system installed, all have to meet the National Fire Protection Association (NFPA) codes, local regulations, and the Life Safety Code enforced by the authority having jurisdiction (AHJ).  All commercial buildings are required to have a code compliant fire alarm system, the best way to ensure proper installation is to hire a licensed integrator with knowledge and experience.  Our licensed experts at Perfect Connections, Inc. have been providing comprehensive security system solutions, including fire alarms, to facilities throughout northern and central New Jersey for the past 23 years.  We stay updated on current technologies and how they may benefit our customers, implementing solutions that fit individualized needs.  It’s also part of our mission to help our clients gain a better understanding of the systems that we install.

To understand the difference between an addressable fire alarm system and a conventional one you must first understand what a fire alarm system is.  In general a fire alarm system is a group of visual and audio devices (automatic and/or manual)-i.e. smoke detectors, heat sensors, strobes, alarm pulls, and sprinklers-linked to a main fire panel that sends a signal to local emergency responders when an alarm is activated.  Each device has to be linked to the main fire panel, but there are different methods of doing so.  This is where the big difference between addressable and conventional comes into play.

fire alarm system diagramAddressable fire alarms indicates that each installed device or module is connected to the main fire panel in a “loop” often by means of a singular wire.  Conventional alarm systems require individual wires per each device, again connecting back to the main fire panel.  The most obvious difference between the two, in terms of installation, is cabling requirements and labor costs.  Due to the fact that addressable systems require less cabling they make for less complex installations.  That’s not to say there aren’t situations where a conventional system might make more sense.  Although it seems most new construction projects implement addressable systems.

One of the many benefits of an addressable fire alarm system is that each device is given its own unique address.  In the event of a triggered alarm a single device can be pinpointed which gives responders a more concise location as to where a fire might be occurring.  This helps save precious time and improves life safety.  It’s also helpful in the event a device is malfunctioning or requires maintenance.  According to Jim Kimpel, product manager for Fire Control Instruments, Inc., being able to pinpoint specific devices lessens the hesitation an end-user might have-mostly caused by the fear of costs-when making a service call.  This helps prevent unnecessary losses due to a defunct system.

As with any alarm system, routine inspections are required for addressable fire alarm systems.  According to Brandt Phillips, Commercial Fire & Security Director of Sales for Napco Security Technologies Inc., inspections and system testing are made easier with addressable systems.  He says installing an addressable system, “…eliminates the need for expensive testers, excessive labor for testing, and gives you the ability to automatically generate the same reports directly from the software you used to program the panel…”  In comparison Phillips points out that inspections for conventional systems can cost thousands and be quite lengthy.

While conventional systems may require extensive wiring, intensive testing, a higher labor cost, and are being phased out by addressable alarms, they’re not completely disregarded when it comes to installations.  The size of a project may determine what type of system is a better fit.  It seems that for small jobs, i.e. a single story office building, conventional systems may work just fine.  They’re initial upfront costs are fairly low and if you’re not dealing with multiple floors and zones it may not be necessary to implement an addressable system.  However, the appeal of quick installs, concise reporting of fire occurrences, and the ease of inspection and system testing will continue to draw support for addressable systems; it seems to be the trend in most new construction projects.

With fire and life safety codes continually evolving, in tandem with developing technologies, there’s no telling what advancements will emerge next.  For now, streamlining processes and incorporating intelligent components will continue to help shape the fire alarm systems of today.  Our licensed experts at Perfect Connections, Inc. are committed to providing security systems that enhance life safety and help prevent disasters.  We have been installing comprehensive security system solutions, including fire alarms, to facilities throughout northern and central New Jersey since 1992.  Don’t wait for the unpredictable to happen, let us help you protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image #1 by shlala-Flickr-Creative Commons, Image #2 by fire-magazine.com

What Makes A Security System A System?

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that a security system should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing comprehensive security solutions to homes and businesses in northern and central New Jersey for the past 23 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons

Should Surveillance Systems Share A Network With Office Computers?

Network-Norlando PobreWhether you are installing a new surveillance system or changing an existing one you need to consider the type of system and the operating implications associated with it.  The desire for advanced image quality, video analytics, ease of integration, and remote access has ushered in the era of IP (Internet Protocol) surveillance systems.  IP surveillance systems have opened the door to a more integrated security system and they provide increased scalability which is important to company growth and future adaptation.  This type of surveillance system typically relies on an internet network, and as they say “therein lies the rub.”

Should your surveillance system operate on the same internet network as your office computers?  The answer is not a simple yes or no.  The short answer being it certainly is a viable option, but it could depend on the size and type of business you run.  It’s also possible to set up an IP surveillance system on its own network but it may not be cost effective or necessary.  For these reasons it is imperative to consult a licensed security system professional when altering or adding a surveillance system.

When it comes to a company’s network there seems to be some trepidation about how and what devices can and should be allowed on it.  It’s understandable, a company’s network is often a basis for its everyday functions, but where does the worry come from?  A lot of it usually has to do with a communication gap between security integrators and IT professionals or end users.  At Perfect Connections, Inc. our licensed experts are able to provide clear and understandable information about the surveillance equipment we implement and how it will affect your company’s network.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  Our team has witnessed and been a part of the migration from mainly analog surveillance to IP.

Let’s discover the common concerns about network devices and how they can be dissolved, but first we’ll review some quick terminology when talking about networks.  LAN, MAN, and WAN are three basic types of networks you’ll likely hear about from integrators and IT professionals.  Local area networks (LANs) are typically found at most small to medium sized businesses as they cover a smaller more specific area.  In all likelihood your company operates on a LAN network.  Metropolitan area networks (MANs) cover a larger area and are usually present in cities and across large campuses.  Wide Area Networks (WANs) provide the most coverage, anything from expansive distances to the whole world.  According to Fredrik Nilsson, general manager for Axis Communications in North America, WANs are often comprised of multiple smaller networks including LANs and MANs.

All networks are comprised of some sort of cabling and equipment such as switches, servers, and hubs.  The most popular type of network configuration used with LANs is called star.  A star configuration allows all network devices to be connected to a central point where if one device crashes the rest will remain in operation.  However, redundancies are typically incorporated to account for the possibility of a central station crash.

Now that terminology is out of the way, what are some of the major concerns one might have when adding surveillance equipment to a company network?  One of the most common is bandwidth consumption.  This often stems from companies that have had to deal with employees streaming or downloading videos via company networks which eats into the available bandwidth.  According to James Marcella, director of technical services for Axis Communications, IP surveillance equipment is wrongly accused when it comes to bandwidth consumption.  He says most IP cameras today can be customized to fit a company’s network and storage guidelines.  To help limit their consumption surveillance can be setup on a Virtual LANs (VLANs) which Marcella says, “prevents video traffic from grabbing the lion’s share of bandwidth.”

Then there’s the ever-present question, “what about hacking?”  In our world where virtually everything is connected through the IoT (Internet of Things), it’s hard not to worry about who can access private information and how that information is being protected.  Having surveillance equipment on the same network as your company computers may seem scary, but in reality, more oft than not, there are procedures in place to prevent hacker access.

When it comes to adding network devices and keeping the network safe authentication protocol and data encryption are key.  According to Marcella authentication protocol protects the network at the physical port level.  If someone were to unplug a network camera and try to plug in their own device, all “traffic” to that port’s switch would automatically be shut down as the foreign device wouldn’t have the proper authorization.  Data encryption is essentially creating a password to your network whether it’s wired or wireless.  This prevents someone from getting into your network or freeloading on your company’s internet.  Encryptions can be highly effective as long as they are not something obvious or easily guessed.

Lastly, network storage is a top concern.  This is often directly linked to bandwidth consumption concerns.  Due to high image quality of IP camera recordings it’s not uncommon for businesses to store video footage for longer periods of time.  Fortunately, with IP surveillance systems you don’t necessarily have to store recordings directly on the network.  For smaller installations there is the option to utilize in-camera storage through internal SD cards (Secure Digital Cards).  Network Attached Storage (NAS) devices and cloud-based systems are other viable options.  In order to determine which method is best for your company an evaluation of camera quantity and storage needs should be conducted.

Whether you are adding a new surveillance system or updating an existing one it’s imperative to consider the impact it will have on your company’s network, if any at all.  Always consult a licensed security system professional as they can help guide you or your IT department through the process from initial assessment to final installation.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We can help break down the communication barrier that sometimes creates apprehension when installing network devices.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Norlando Pobre-Flickr-Creative Commons

What You Need to Know About Fire Alarm Maintenance

Fire Strobe-Alfonso PierantonioFire is an unpredictable force that can wreak havoc on any business.  It is imperative as a business owner, facility manager, or building owner that the proper precautions are in place to help prevent catastrophe.  The NFPA (National Fire Protection Association) is a leading advocate in fire prevention and safety.  They’ve written numerous codes and standards that have been implemented nationwide.  These standards are designed to help reduce the risk and effects of fire.  In combination with local regulations, NFPA codes and regulations are what system integrators and contractors have to follow in order to pass inspection from local authorities.

While you no doubt have some sort of fire detection and/or suppression system in operation it’s important to maintain it in accordance with national and local requirements.  As a security systems integrator, our team at Perfect Connections, Inc. has been installing fire alarm systems in business facilities throughout northern and central New Jersey for that past 23 years.  We specialize in comprehensive security systems that include fire alarms as a major component to a fully functioning system.  We do offer maintenance and service contracts helping you preserve a system that will continue to pass annual inspections and work efficiently in the event of a fire.

What goes into fire alarm maintenance?  First off, unless you or your staff is trained and licensed, you must hire a licensed technician.  This will help avoid accidentally setting off any false alarms which can result in substantial fines.  A common starting point, whether the system is fairly new or if you moved into a space with an existing system, is to find out the systems age and maintenance history.  The age of a fire alarm system will help determine whether or not components need to be replaced and what type of maintenance might be required.

According to Mike Lohr, director of service marketing for SimplexGrinnell LP, “Systems between five and ten years old may experience component breakdown caused by harsh, but normal, environmental factors. Voltage fluctuations, temperature, and humidity may cause system failure or nuisance alarm problems.”  He notes that systems between 5-10 and 10-15 years can provide adequate “life-safety” responses, but those within the 10-15 year marks should be watched carefully.  This is even more important if you have a shoddy record of maintenance history as it could have been poorly taken care of in the past.

Aside from knowing the age of your system you have to take any specific regulations the local authority having jurisdiction (AHJ) might have into consideration.  While the NFPA provides codes and standards for the nation, the AHJ will likely have their own set of rules that are specific to the area they preside.  This means that even if your system meets NFPA standards it may not pass local inspection because of AHJ specifications.  For this reason it is imperative to hire experts that are licensed and educated not only in maintenance specific to your system, but national and local requirements as well.

In most cases fire alarm systems must be inspected at least once a year some may require a more frequent assessment.  It really all depends on the type of business.  During an inspection all components of the system will be tested so if something is not functioning properly, it will likely be taken care of at that time.  Before an inspection you should notify the building occupants as the alarms will be tested and it gets noisy.  Your alarm system company is the one who should contact the alarm monitoring station and local authorities in advance to avoid false emergencies.

Maintaining a functional fire alarm system is key to preventing potential catastrophe.  It helps protect not only the physicality of your business, but everything that goes into running your business, i.e. you, your employees, company records, and equipment.  If you ever consider cutting corners when it comes to fire alarm maintenance carefully consider the extent of what it might cost you if you do.

While as a business owner you may not need to know all the fine details of what goes into fire alarm maintenance, it is important to have a basic understanding of what you can expect when the time comes.  For further information on fire alarm maintenance and inspections check out our related blog post HERE.  If you run a business in northern or central New Jersey do not hesitate to call on our licensed technicians at Perfect Connections, Inc..  We have been providing comprehensive security system solutions including fire alarm installation and maintenance since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alfonso Pierantonio-Flickr-Creative Commons

How to Secure a Parking Garage

Parking Garage-David HilowitzThere are many architectural components to a business facility sometimes that includes a parking lot or garage.  Whether it is attached or detached, near or far from the main building it can be a convenient asset to any business.  It’s likely the place where you and your employees park in the morning and leave in the evening.  At some point in your life, whether you were at work or another establishment, you’ve probably had an uneasy feeling walking to your car.  But why?  Perhaps it had something to do with a perceived lack of security.

A parking lot or garage can often go overlooked when it comes to the security of an organization as it is not necessarily looked at as an actual part of the main building.  Often times organizations focus on protecting the areas people spend most of their time in, their office or interior work destination.  Sometimes a parking lot or garage isn’t even owned by the business it serves but rather an outside property manager.  However, parking destinations can often be high risk areas especially at night.  As a licensed security systems company our experts at Perfect Connections, Inc. assess the security risks of an organization as a whole.  We have been offering comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We understand not every business or location is the same, and with different locations comes different security risks.  Our team helps minimize risk by offering tailored security system solutions.

The risks associated with an unprotected parking lot or garage can be mitigated once brought to light.  Speaking of light, it is one of the most important safety factors in parking lots and garages.  As you’ve probably experienced at one point or another not all parking areas have adequate lighting, thus creating dark corners and easy hiding spots for potential criminals.  According to James Marcella, Director of Technical Services for Axis Communications, “The most effective deterrent to criminal activity is a well-lit area, because not only does it increase the ability for natural surveillance, it also improves the quality of recorded images from security cameras.”

Not only is it imperative for patrons to be able to see, but if something were to happen it’s crucial that security cameras record useable footage.  Lighting and surveillance tend to go hand-in-hand.  This means installing light fixtures that will provide ample illumination and an adequate CRI (Color Rendition Index) rating.  CRI ratings quantify the precision a light source has when it comes to reproducing color.  One of the best and overall cost effective options is LED (Light Emitting Diode) lighting.

While lighting is paramount, surveillance is key when it comes to catching criminal behavior, especially in parking lots and garages.  In our current technological environment surveillance cameras and equipment are becoming more efficient and advanced.  For instance, garage and parking lot environments are not exactly the cleanest or protected areas, therefore surveillance equipment has to be able to withstand harsher elements.

Fortunately there are cameras built specifically for such vulnerable settings.  Vandal-resistant cameras happen to be a surveillance solution in volatile areas, providing protection from both human and environmental elements.  They typically come sealed from dust and moisture right out of the box making them durable and increasing their longevity.  This helps cut down on long term costs of repairs or replacements.

Aside from being durable, ease of integration is becoming a pervasive quality in cameras and security equipment.  Today, end-users are starting to migrate from analog camera systems to IP (Internet Protocol) for their image quality, coverage, and scalability.  This opens the door to whole system integration where a garage surveillance system can be on the same network as the business it services, or at least that’s the idea.  With IP and cloud-based surveillance systems becoming more ubiquitous, clearer images and video analytics are sure to play an important role in the security of any infrastructure, including parking lots and garages.  It would help cut down on the need for physical monitoring services as well provide a platform for remote access via a mobile device or computer.

When enhancing the safety of your parking lot or garage it’s important to consider landscaping, signage, cashier booths and pay stations, and alert systems for the patrons.  Landscaping around a garage or lot should be well kept and vegetation should be trimmed low to maintain a clear line of sight.  There should be clear signage that improves way-finding and some that indicates the area is under surveillance.  Sometimes seeing signage is enough to deter criminal activity.  Cashier booths and pay stations are crime targets for obvious reasons, therefore they should be well-lit and have adequate surveillance coverage.  Alert systems can be a helpful added security feature that would notify patrons by text message of any issues or disturbances while they are away.

Whether you are the owner of a parking lot/garage or a patron it is critical to ensure its security.  It’s not just about being vigilant of your property, it’s about protecting you, your employees, and your patrons.  As every location has different risks you should always call on a licensed security systems professional to perform an in-person security assessment.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992.  Our team is skilled at providing custom solutions tailored specifically to your needs.  We appreciate the complexities involved in protecting an organization as a whole.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by David Hilowitz-Flickr-Creative Commons

Should I Move To The Cloud?

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds.  These natural wonders are not the clouds we’ll be investigating here.  Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it.  Think about your everyday, do you use an internet based e-mail account, like Gmail?  If so, then you use a cloud based service.  So what is the “cloud”?  Basically, the cloud takes recorded information and stores it on internet servers.  Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet.  In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that.  While it is an exciting technology with seemingly endless applications, it is not without flaw.  That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry?  In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions.  As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some.  As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network setup and what are the benefits?  In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service.  Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced.  According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.”  Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers.  If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device.  Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency.  As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com).  It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department.  This could help cut down on unnecessary manpower costs.  And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology.  Systems that rely solely on the cloud for recording and storage face some obvious risks.  For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud.  However, these outages are estimated to be no more than 4 hours per year.  Fortunately there are inexpensive solutions to such an issue.  To avoid losing any data a local recording device can be set up to operate for more than 4 hours.  Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users.  However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems.  Business size is also a factor in the cost.  Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required.  So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations.  Cloud access is another major concern for end-users.  The question remains, what is stopping someone from hacking into my network?  Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future.  The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking.  Once the dialogue becomes clearer the cloud has potential to become standard protocol.  If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional.  Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons