How To Ditch Your Keys And Use Your Phone For Access

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives. It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone. We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems. In particular as a means of access control and authentication in commercial applications using near field communication (NFC). According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…” This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey. We have been helping a wide range of businesses secure their facilities for over 25 years. As with any technology, progression in the realm of security components shows no signs of slowing. At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications. However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers. NFC access works by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential. The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control. This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord. Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access. Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike. Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night. It only makes sense that phones would become part of integrated security protocols. With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce. They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand. While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming. It also allows you to change credentials on and as needed basis. This would be helpful if you have a contract or temp worker who needs provisional access. You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials. Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification. So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user. If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving. There are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons. The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

Aside from NFC, one of the easiest ways to use a your phone to control your access system is with Brivo. Using Brivo’s OnAir pass, unlocking a door is as simple as opening an app and tapping a button.

The world of security systems is constantly evolving. This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems. NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years. It will provide a new level of security and convenience that has yet to be fully realized. At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients. We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992. Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

What’s The Best Way To Store Your Footage?

Surveillance playSAN-Dennis van Zuijlekoms a vital role in any comprehensive security system. It helps authorities catch criminals and provides helpful insight into your business operations by collecting and analyzing data on a daily basis. Where and how is all of this visual and analytical data being “collected?” That is the ever pressing question for system integrators and end-users alike. Storing surveillance data can be as important to the efficiency of your security system as having the surveillance equipment itself. We are catapulting ourselves into the future with the constant evolution of technology in all aspects of life including security system components, and surveillance storage solutions are no exception, but not all are created equal.

At Perfect Connections, Inc. our licensed integrators are dedicated to providing comprehensive security system solutions that protect people and property. We have been installing security systems at business facilities throughout northern and central New Jersey for over 25 years. Our team designs system solutions that meet the needs specific to your organization. Surveillance storage is a security system component that will vary project to project and should be treated with an individualized approach.

In the not so distant past, video recordings weren’t as advanced as they are today in terms of image resolution, clarity, and noise distortion. Recordings would often be deemed unusable due to their lack of clarity and they would typically be discarded freeing up storage space for new recordings. Today, with the advent of IP cameras (internet protocol) and more advanced camera technology the recordings have become critical data sources that are considered valuable. This means more and more end-users are interested in keeping recorded data for longer periods of time. The obvious consequence is the need for more storage space.

There are many factors that affect what kind of surveillance storage solutions can and should be implemented at a facility. The size of the project, existing infrastructure, and client budget are all critical determinants as to what type of storage should be implemented. The camera type, camera quantity, compression standards, frame rates, motion detection, desired length of storage, and overall estimate of desired resolution all should be taken into account as well.

When it comes to storing surveillance data it is paramount that the integrity of the footage is not lost. Traditionally surveillance footage would be stored on a DVR (digital video recorder), but it’s limitations within a networked system make it less than ideal. With so much of the surveillance world developing around IP and network solutions it’s only natural that network storage solutions should arise. NAS (network attached storage), SAN (storage area network), and DAS (direct attached storage) are all potential methods for storing surveillance data. All have different installation requirements. Some may call for extensive cabling and a large closet to store servers, but it all depends on the size and type of project. According to Justin Schorn, vice president of product management for Aimetis, “The critical decision is choosing between a storage area networks (SAN) and network attached storage (NAS).”

The different storage devices vary in how they present information to the user and how data is accessed. The NAS devices present data in a “file system” same with DAS, whereas SAN is presented in what is referred to as “block storage.” DAS and NAS either attach directly to an existing network or the NVR (network video recorder). SAN is essentially an extension of a DAS, but provides a higher storage capacity.

DAS is typically implemented in situations when expansion is not an option, the system performance requisites are static, and shared access is not necessary. The reason being is DAS devices are limited to singular DVR or NVR applications. SAN solutions are typically used in larger camera applications that may later require scalable options. According to Lee Caswell, founder and chief marketing officer at Pivot3, “Many archivers can share the storage and the SAN platform introduces more reliability over NVR/DVR systems because there is no single point of failure.” Common applications for SAN storage include airports, casinos, and prisons.

NAS devices are typically used in smaller surveillance applications as its performance isn’t as robust as SAN. One of the advantages to NAS solutions is data can be easily accessed by anyone on the same protected network. Lee says, “The advantage of the file system on the NAS platform is that it is easier to support a hybrid storage case as some storage occurs locally on self-contained NVRs/DVRs and extended storage is sent to a specific file on the NAS.”

An additional option is to store your footage in the cloud – with a system like Eagle Eye cameras, you don’t have to worry about running out of storage space, or if your storage device is damaged or stolen. And just like traditional NVR/DVRs, your footage is accessible to you from any mobile device or computer.

Keeping high quality recorded data for longer periods of time can help local authorities with investigations and it can provide insight into your business that you otherwise wouldn’t observe. While storing recorded footage from your surveillance system is critical to your overall security, it’s important to remember that the type of storage necessary will vary depending on the project parameters. It is imperative to work with a licensed security system integrator to help evaluate security risks, the quantity of cameras needed, and how a surveillance storage system can be implemented to meet your requirements. At Perfect Connections, Inc. we are committed to providing security systems that suit your specific needs. We have been designing and installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Dennis van Zuijlekom-Flickr-Creative Commons

Alarm System Maintenance 101

So you bought an alarm system, what kind of maintenance and service should you do?

Really, you won’t need to do too much. It should work flawlessly for quite some time. The first thing to go will be batteries. All systems will have to have their system battery replaced after 3 to 5 years. When the battery is low, the keypad will notify you as will the central station. The batteries for most alarm systems in service today are 12 volt and 4 to 7 amp hour. Newer graphic self-contained systems have different smaller batteries – for example, the 2Gig Go Control has a 7.2 volt back up battery. All batteries should give you 24 hour back up. It is not a bad idea to schedule replacement of your battery every 3 years to preempt any possible issues.

If you have a wireless alarm system, you will also need to replace the batteries in the various devices such as door and window transmitters, wireless motion detectors, wireless glass break detectors, wireless carbon monoxide detectors, wireless smoke detectors, key fobs, panic buttons, and other wireless devices. Most of the new devices use lithium batteries, from CR123 3 Volt lithium batteries to lithium watch sized batteries. The smaller the device, the smaller the battery. Typically the bigger batteries last longer, 3 years plus, while the watch type batteries last 2 years plus. Devices that are used most often, like entry doors, drain quicker. On the newer systems, the keypad tells you which transmitter has a low battery, making replacement easy.

Make sure your alarm company shows you how to change the batteries during the installation. You should also get a list of the batteries required for all the various devices you have so you don’t have to scramble to find out when they are low. If you choose not to replace your own batteries, the alarm company should be happy to replace them for you.

Older systems use typical alkaline batteries, 9 volt, AAA and AA are common. These need to be replaced more often. Many older systems don’t tell you when the batteries are low so regular replacement is necessary.

Other than changing batteries, not much else is necessary. Make sure devices such as motion detectors and smoke detectors are clear of spider webs and that’s about it.

If installed and programmed correctly, your alarm system should monitor all parts and devices on the system, as well as services it is connected to, like power, telephone, and cellular. If any of these systems go down, your alarm system should alert you to that fact. The first reaction is to think that there is something wrong with your alarm system, when in reality it is working correctly. It is supposed to tell you when it is compromised when a service it relies on is not working properly.

Even though the system monitors itself, testing the alarm system is something that you should regularly do. You depend on your alarm system and you should make sure that it is working properly all the time. The best way to test the system is as follows: Call the central station and put the system on test. Arm the system and then trip a zone. Reset the alarm and then call the central station to make sure they received the right signal. Next week put it back on test and trip the next zone. Go clockwise around your house and you will eventually check all your devices. It is worth the effort to protect your home and family.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, or if you would like us to perform a Home Safety and Security Audit, absolutely free, please call 800-369-3962.

How To Stop Shoplifting This Holiday Season

Helpful Tips to Prevent Shoplifting

Each year, shoplifting accounts for millions of dollars of loss for businesses all across the country. Some of the most common items stolen include watches, jewelry, music, books, clothing, and even car parts. While installing a security camera can help to identify suspects after the theft occurs, there are quite a few things a retailer can do to stop shoplifting from taking place in the first place.

Some actionable tips that can help all types of retailers this holiday season include:

• Greet customers as they come into the store.
• Watch for the customers who avoid eye contact, linger, are constantly looking for the employees, wander around the store or seem to be overly nervous.
• Make sure your employees keep moving and walking around the store.
• Maintain the store and keep it well-organized and clean.
• Restrict the use of the fitting rooms to only customers who request them.
• Install various anti-theft devices.
• Create a shoplifting policy and make sure to enforce it.
• Hire plenty of employees.
• Talk to other businesses in the area about suspicious behavior they may have seen.
• Keep items that are often stolen in plain view.

If you ever do suspect that a person is shoplifting, do not accuse them of this. Instead, just ask them if you can either help them or ring them up. Keep an eye on the person and contact security or a manager right away. You should never attempt to stop the person that’s shoplifting, and if they wind up leaving the store, try to provide a detailed description of the individual, as well as what they are driving.

4 Tips to Safeguard Your Business from a Break-In

Good business security offers peace of mind and helps to prevent acts of vandalism and robberies. Being able to protect your business from a possible theft and break-in is essential for creating a safe environment for your customers and workers – all while protecting your assets.

Below are 4 tips that will help you keep your business safe and sound:

1. Find vulnerable areas.
The first step is to take a walk around the building. Hunt for any damaged windows, doors or other locations where someone could get in undetected. Repair or replace any weak areas.

2. Use video surveillance (CCTV). This is perhaps the most important component of good business security. Having video surveillance allows you to see what is going on. With today’s CCTV systems, you can have live access to your cameras, day or night, from wherever you are (as long as you have access to the internet). And, if a break-in does occur, you have the evidence necessary to catch the culprit. This will also help protect your business from employee theft.

3. Use access control card systems. There are likely some parts of your business where you have rather expensive assets or sensitive information. When you install an access card control system, you will be able to limit some rooms to only authorized individuals. If someone were to break-in, they would have a hard time getting into these locked areas.


4. Advertise your security system. Once the security equipment has been installed, be sure that you post stickers and signs all around letting would-be burglars know about the system.
When you secure your business as outlined above, you’ll have peace of mind knowing your location is safe and sound.

How Lighting Affects Your Video Quality

When it comes to surveillance cameras, visibility is key.  Some of the obstacles surrounding a camera’s capability to retain high video quality such as lighting, camera installation, and type of camera are somewhat within our control, others are not.  Uncontrollable issues of extreme brightness, like light produced from headlights and the sun, or extreme darkness are not necessarily easily overcome.  However, as with anything, technological progression helps change these harrowing limitations.  As industry professionals our team at Perfect Connections, Inc. has been providing security system solutions, including surveillance, to organizations throughout northern and central New Jersey for over 25 years.  We’ve seen the impact changing technology has on the equipment we install and how it can be beneficial to our customers.

Surveillance systems are in the midst of a transition from using conventional analog equipment to IP (Internet Protocol).  Why? For one, image quality.  The tricky thing with IP cameras is not all are created equal.  There isn’t necessarily a defined industry standard that is accepted by all integrators and camera manufacturers when it comes to “best” image quality.  For example some might argue that the higher the megapixel count the better, but it doesn’t necessarily guarantee a better image.  At least with HD (high definition) cameras there are standards manufacturers must comply with in order to be considered HD.

Aside from pixel count, an IP camera’s display threshold in extreme conditions is critical, but limited.  This limit, specifically when referring to extreme brightness or darkness, is typically known as “dynamic range.”  Wide dynamic range (WDR), “allows cameras to capture much more detail in scenes where there are varying levels of light, much like the way the human eye ‘processes’ these types of scenes.”  You know the feeling of widening your eyes in the dark to try to see clearer because you’re eyes haven’t quite adjusted yet?  It’s sort of the same idea with WDR cameras and how they adapt in both light and dark conditions.  However, their adjustments aren’t a physical strain and transitions are typically quicker than ours.

WDR footageThe images above show the difference between a parking garage being monitored by a camera with no WDR or WDR turned off on the left, and on the right the same area monitored by a camera with WDR enabled.  The difference is clear as day.  Why do they differ so much?  The camera with the WDR enabled has two internal Charge-Coupled Devices (CCD).  The two devices, or sensors, scan an image at different speeds, one low and one high, the image processor then combines the separate images producing a clearer, more balanced picture with better contrast and lighting.  This process happens quickly enough to produce a stream of clear recorded footage.  There are many different manufacturers that produce these WDR cameras in the market today, and not all of them use the same type of sensor and image processing combinations.  The best way to ensure you are getting the best camera for your specific application is to hire a licensed security systems integrator who is educated in which camera specifications will work best in variant conditions.

WDR technology, like anything else, is not perfect.  Depending on the camera manufacturer, you could end up with a camera that takes up to 15 seconds to adjust with varying light levels.  That doesn’t sound like that long, but it could mean the difference between catching a perpetrator and them getting away.  Another issue you might run into are cameras that don’t have the ability to turn WDR settings on and off automatically.  Without the automation the transition becomes the responsibility of someone on site, which can be time consuming and ineffective in a time sensitive situation.  This is why it is vital to consult a professional security systems integrator who is educated in the differences between product specifications and their appropriate applications.

The clarity of recorded video footage is crucial to the security of any organization.  As a business owner you don’t want to be left wondering why your recordings are grainy, washed out, or so dark they become unusable.  No one can control the external factors that affect an organization, but you can be prepared for them by taking the proper precautions.  Licensed system integrators are there to help.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We recognize the importance of utilizing quality security products that not only perform well but perform to their intended specifications.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by IQinVision-Google-Creative Commons

What’s Missing From Your Security System

Missing puzzle pieceWhile businesses have a lot to offer, many are lacking the protection they need.  No I don’t mean stowing an arsenal below your cash-wrap, but rather an effective security system and security features.  At Perfect Connections, Inc. we can help you protect what you’ve worked so hard for.  If you run a business in central or northern New Jersey, let us assess your security risks and provide a custom solution to fit your needs.  Many don’t know what they are lacking and how it can be rectified – our licensed professionals can help in that arena.  Don’t fall victim to preventable disasters – find out what a comprehensive security system can do for you and the health of your business.

What’s lacking?

An incomplete security system is a bit like working on a puzzle with missing pieces.  There are essential features that should be included in a comprehensive security system.  Maybe you already have a security system installed at your business, but is it monitored?  What good is a security system if no one, except those in the area, is alerted when the alarm goes off?  Having a 24/7 monitoring service as part of your security system is crucial for the quickest response times.  Surveillance equipment can also help deter employee theft which is, “the fastest growing crime in America,” according to the FBI.  Employee theft costs businesses up to $200 billion each year.  Installing surveillance equipment not only in the main customer space, but in offices, storage, and inventory spaces can help decrease chances of employee theft and misconduct.

Other areas that tend to be overlooked or under-protected are doors and safes.  While a door typically locks, if it’s not sturdy and linked to an alarm, what’s preventing someone from kicking it in?  To protect your entries, exits, and interior spaces be sure that your doors are not only sturdy and alarmed but protected by some sort of access control.  Whether it’s a swipe card, key fob, passcode, or some form of biometrics, access control will help prevent unwanted entrants.  Safes that are out in the open and easy to grab or crack open provide minimal protection for whatever is in it.  If you’re going to store valuables or cash in a safe at your business be sure it’s secure either bolted to the ground or in a fortified room.

Inadequate protection from fire and carbon monoxide can be a killer for any business.  Having detectors and alarms may not be enough if they don’t communicate with emergency services.  It’s the same idea as the unmonitored burglar alarm, if no one is around to hear the detectors go off a fire could easily escalate to the point of no return.  For the quickest response time, fire alarms and detectors should be linked to a monitoring service that communicates with emergency services.  Proper fire alarms, smoke and carbon monoxide detectors should be an integral part of a comprehensive security system.  Your business is likely your livelihood, protect it.

There are few certainties in life, but taking initiative to protect what you’ve built by installing a comprehensive security system is guaranteed to help.  No two businesses are the same, therefore no two security systems will be the same.  At Perfect Connections, Inc. we believe in customizing security solutions for each individual business based on their specific needs.  As security systems experts we have been providing security solutions to northern and central New Jersey businesses since 1992.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

How Using Edge Technology Can Secure Your Business

Todd Huffman-SurveillanceWhen it comes to security systems you may have heard the term “edge technology,” “edge analytics,” or “edge devices.”  What exactly do these terms mean and why are they important?  When talking about security systems “the edge” is typically used when referring to video surveillance components.  Every security system integrator and industry professional will likely have their own definition of what it means, but in summary “edge technology” refers to surveillance devices that operate, analyze, and record at their source versus transmitting all that information over a network to the system’s core.  In traditional surveillance systems there is a central server where recorded data from peripheral devices is stored and analyzed.  In an edge-based system cameras perform these functions locally.

Why is this pertinent information?  Depending on your specific situation, using edge-based technology can provide more efficient surveillance processes and enhance the overall effectiveness of your security system.  As every situation is subjective, a licensed security systems integrator should always be consulted when determining what type of components will serve your business best.  At Perfect Connections, Inc. our licensed security system integrators are committed to providing comprehensive security systems that exceed your expectations.  We have been installing comprehensive security systems at businesses throughout northern and central New Jersey for over 25 years.  We know how to assess your security needs and implement relevant technologies that will help keep business running as usual.

Surveillance components that can be considered on “the edge” are IP cameras, video encoders, and network attached storage (NAS) devices.  These devices have recently become more advanced and their capabilities that were once unique to the central server of the security system continue to improve.  According to Steve Gorski, general manager at Mobotix, “Edge-based surveillance solves the bottleneck problem by using the camera to decentralize intelligence and video data.”  This means the cameras themselves are more intelligent and effective.

Edge-based technologies allow for higher image resolutions and the ability to compress them without the loss of image quality.  Even with the use of high resolution IP cameras becoming more commonplace, in a traditional system, the images still have to travel to the central server to be stored and typically compressed; this is where image quality can be lost.   Edge technology helps reduce the need for exorbitant storage space on the central server as many edge devices are capable of storing data locally on SD memory cards or NAS devices.  Traditionally these types of storage options were primarily used as backups for the system, but they can now be implemented as the main recording devices in smaller applications.  Cutting down on the need for centralized storage will reduce the need for high bandwidth consumption, ultimately cutting costs.

According to Fredrik Nilsson, general manager for Axis Communications, “It’s estimated today that a staggering 99 percent of all recorded surveillance video is deleted before it’s ever seen.”  How does that make surveillance useful?  It really doesn’t except for use in forensic investigations or after the fact viewing, but with edge-technologies providing intelligence and analytics at the source, detection capabilities increase which creates a more effective system.  With smarter edge devices that can detect patterns, motion, facial recognition, license plates, camera tampering, and people count, you can avoid potential catastrophe that could be caused by deleting recordings to free up space.  These types of analytics provide a platform for real-time viewing that can even be streamed to mobile devices, which are also often considered part of “the edge” realm – the ultimate goal always being prevention and proactive approaches rather than delayed after the fact reactions.

With any technology, “the edge” is a work in progress and will continue to evolve.  It seems edge devices are primarily implemented in smaller applications where the camera need is less than 20.  One of the reasons being a server-based surveillance system can run more analytics per camera because of the CPU power, so the more cameras you have the more processing power you’ll likely need.  For smaller facilities and businesses with remote locations that need surveillance, edge devices are a viable option as they provide real-time analytics, can store footage locally, and don’t require a ton of bandwidth consumption.

At Perfect Connections, Inc. we are committed to providing security system solutions that fit your specific needs.  Our team of licensed integrators has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We realize that just because a new technology is available that doesn’t mean it is the appropriate solution to every problem.  Our integrators work with you to learn your needs and will design a custom system that addresses your subjective security risks.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Todd Huffman-Flickr-Creative Commons

Can Your Camera See In The Dark?

West Midlands Police-Infrared FootageNot all surveillance cameras are created equally.  It may seem as simple as selecting a surveillance camera and popping it into place, but what about the external factors that affect the quality of recorded images?  One of the top concerns for industry professionals and end-users alike is a cameras ability to see in the dark or varied light conditions.  Whether you’re using interior or external cameras, their ability to function under varied light conditions is paramount.  Our experts at Perfect Connections, Inc. understand the importance of a surveillance system that doesn’t quit when the sun goes down.  We are a licensed security systems company that has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for over 25 years.

What challenges do different lighting conditions pose to surveillance cameras?  The most obvious is the absence or lack of light.  Unless your cameras are True Day Night it is likely that they will not be able to pick up fine details in the lack of light.  Another common issue is the effect of light glare.  Problematic glare can come from car headlights to poorly placed exterior lighting fixtures.  Glare will disrupt the sensors in the video camera and the recorded footage can be rendered useless.  It is important to take lighting conditions into consideration when choosing and installing cameras as it will impact the overall effectiveness of your system.  What good is a camera that captures grainy unclear images or blanks out for seconds at a time?

Fortunately there have been vast improvements in the surveillance industry that are changing the game when it comes to light adaptation capabilities.  According to Greg Peratt, Senior Director of the Panasonic Video Solutions Integration Team, there are IP (Internet Protocol) cameras that can capture detailed footage in lighting less than .01 lux illumination.  Lux illumination is the metric measurement for how much light falls on an object.  A measurement of 1 lux, “equals the amount of light that falls on a one-square-meter surface that is one meter away from a single candle.”  Therefore a camera that can capture detailed images in less than .01 lux illumination is not only impressive, it’s advantageous.

Another helpful advancement in the case of low or varied light is the Infrared Cut-Filter Mechanism (IRCF).  This filter is automatically lifted or lowered in front of the camera’s sensor depending on the light levels.  The IRCF helps block out disruptive infrared light that can come from sunlight or certain lighting fixtures and it ultimately improves the camera’s low-light performance.  When light levels are low-typically at night-is when the filter is automatically lifted from in front of the sensor.  Cameras that have this feature are considered to have True Day Night capabilities.

The only hitch with this technology is color is often distorted or lost completely.  However, the camera is still able to capture a clear black and white image and according to Steve Carney it captures an image, “…that is not only vastly more usable but also cleaner without chroma noise.”  Carney points out another differentiator between True Day Night cameras and the impersonators is what happens when the IRCF is lifted or removed.  In a True Day Night camera a piece of “dummy” glass will take the place of the IRCF in order to maintain focus and, “minimize the spectral offset between visible and IR light.”  In other cameras the ability to remove such a filter doesn’t exist, therefore the full spectrum of visible and infrared light cannot be taken advantage of.

Other features to look for when considering Day Night cameras are the shutter speeds and any tinting on the camera housing.  Varying shutter speeds affect the amount of the light that is able to be captured.  The slower the shutter, the more light is captured which isn’t always better.  Often times a camera will come with a domed or “bubble” exterior housing.  These “bubbles” can sometimes be tinted.  Depending on your application you may or may not need tinting; sometimes the tint can have an adverse effect by decreasing visibility and obstructing image clarity.

Whether you are replacing older interior/exterior cameras or installing new, your best solution is to call on the experts.  Every business and facility is different which means each will have different requirements when it comes to day/nighttime surveillance.  Having a licensed security professional do an in person assessment of your facility will help determine what type of camera should be implemented and where.  Our team of licensed professionals at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and facilities throughout northern and central New Jersey since 1992.  We believe in personalized service that tailors solutions to your individualized needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by West Midlands Police-Flickr-Creative Commons

Why You Need A Monitoring Station

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response. This system still exists today and is considered an effective means for preventing disaster and catching criminals. However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device. One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We have seen how technology can affect not only individual security devices but the system as a whole. There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it. This is where the idea of self-monitoring comes into play. If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device. This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act. The same is true of a tripped alarm. This all sounds great, right? However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response. This could happen for a number of reasons. One being your mobile device is turned off or not on your person. Another could be a missed notification. As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times. It’s a feat not likely met by any independent business owner, you have to sleep at some point. Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day. The constant interruption would be enough to drive anyone mad. It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one. In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage. Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring. There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors. According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.” It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location. However, this doesn’t mean someone will be vigilant 24/7. This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it. Lastly, there’s professional remote video monitoring. This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios. These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities. Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage. As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it. These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility. An operator may notice things like loose wires or a piece of equipment that looks out of place. Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them. Many industry professionals agree that having a professional monitoring station is still the preferable method of watching over your facility. There’s simply too many holes in trying to self-monitor your own business. According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.” Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.” With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for over 25 years. We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs. If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t. The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

If Your Security System Is Missing One Of These, It’s Not Complete

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a complete security system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that complete security systems should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing complete and comprehensive security solutions to homes and businesses in northern and central New Jersey for over 25 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons