Important Information for Verizon Customers

If you have Verizon telephone/internet service, please read the below for important information.

We’ve been getting a few inquiries lately, so we wanted to put an article on our blog about this – Verizon has recently made the decision to retire their copper phone lines in favor of fiber-optic communications. If you still have copper cabling at your home or business, you will be receiving a notification from Verizon along with a request to access your building in order to upgrade your cabling.

Failure to respond to Verizon or failure to allow the upgrade will cause a discontinuation of your phone service, which will result in a communication failure for your burglary or fire alarm system. Local Fire Marshals have begun notifying their residents that a non-communicating fire protection system is a violation of the New Jersey Uniform Fire Code and that you may be subject to penalties.

Please keep an eye out for any communications from Verizon and coordinate appropriately. If you do not wish to upgrade your copper cabling, please call us at 800-369-3962 to discuss other options for communication, including cellular.

For more information, please see this release from Verizon regarding their plan.

To see if you are affected by this, please take a look at the addresses here.

If you have any further questions, you can contact your local Fire Marshal, or you can call us at 800-369-3962.

How To Avoid Security Scams

Scam-Widjaya IvanImagine you’re at home and the doorbell rings. You go to answer the door. Who’s there? It’s a salesman claiming to be a representative from a security system company. They tell you they’re at your home to offer you a free security system. Sounds too good to be true, right? That’s because it probably is. Unfortunately, this type of scam is not uncommon in the residential security system industry.

At Perfect Connections, Inc. we believe in helping our customers, not ripping them off. Our licensed experts install customized and comprehensive residential security systems throughout Northern and Central New Jersey. We know each home is unique, which means each system should be tailored individually. False promises, aggressive sales tactics, lengthy and overpriced contracts are NOT what we are about. Unfortunately, there are many door-to-door “sales” people that are only looking to make a quick buck. In doing so, they typically pressure you to sign high priced contracts or make a purchase on the spot. They talk fast to avoid any questions you might have, and to meet their end goal which is you writing a check or giving them your credit card information.

These so called “sales” representatives aren’t even associated with an actual security company in many instances. In some cases, like one reported by CBS Miami, these sales associates may falsely represent themselves as part of an already established company. The case in Miami involved a man named Yassiel Cabre who reportedly worked for a company called Alarm Digital Telecommunication. Instead of representing himself that way, he would tell homeowners he worked for ADT, which is a well-known security systems company. He even gave out folders and business cards that clearly displayed the ADT logo. He conned one victim into signing a 5 year contract (industry standard is typically 36months) with a company called Monitronics (ADT competitor), promising them they would be saving money because ADT supposedly purchased Monitronics. Of course this was 100% false.

Con artists or aggressive door-to-door sales people will sometimes use scare tactics to get you to sign contracts, buy what they are trying to sell, or simply let them into your home-only to steal from you. They might feed you forged crime statistics about your neighborhood to persuade you into buying what they’re offering. They do this hoping fear will get the better of you. If they’re not scaring you into buying an inadequate or fake system, they might offer freebies. A common tactic is to offer a free “system” in exchange for allowing them to put a sign on your lawn (consumerreports.org). While this may sound like an awesome deal, it’s not. As you’re caught up in the word “free,” long term contracts will be sneaked in as a formality of the deal, and you’ll sign because it seems fair. Next thing you know, you’re locked into an expensive agreement that costs an arm and a leg to cancel.

Don’t let yourself be a victim of these forceful sales strategies. There are some telltale signs that you might be getting scammed or ripped off. Check out the list below:

  • Aggressive sales tactics
  • Skipping right to the contract instead of taking the time to discuss and review the vulnerabilities of your home
  • Limited time offers
  • Companies that sell your contract to a bigger company after the initial agreement is made
  • Using fear as a selling point
  • Offering everything for “free”
  • Claiming to be a representative from your current security systems company
  • They will not produce proper identification or licensing
  • Fast talking and speedy contract review
  • Immediate installation without an assessment

Lesson number one: do your research before signing anything. If you suspect someone of false representation or not having the proper licensing, report it to your local authorities. Be sure you find a security systems company that is not only reputable but knowledgeable. The sophistication and effectiveness of your system is only as good as the experts who provide and install it. For over 20 years Perfect Connections, Inc. has been providing custom residential security systems to Northern and Central New Jersey. Our specialists are licensed and understand the complexities of a comprehensive system. We know how to guide you through the process from an initial on site assessment to final installation. Let us help you protect what matters most.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Widjaya Ivan-Flickr-Creative Commons

Hybrid Surveillance

Mike Mozart-surveillanceAs a business owner protecting your facility is always a top concern. Are you getting the coverage you need? If you have a comprehensive security system you’re already in a good position. However, a security system is only as good as the sum of its parts. One of the most crucial parts of a security system is the surveillance aspect. Surveillance systems are the eyes that keep watch over your business even when you can’t.

Like any other technology surveillance equipment is constantly evolving through research and development that is meant to improve its efficiency. In today’s IoT (Internet of Things) IP-based (Internet Protocol) systems are a driving force that is changing the role of surveillance in comprehensive security. But not everyone is so keen on the uptake. Prior to the inception of IP cameras and network devices the world was and has been dominated by analog cameras and DVR devices (Digital Video Recording). If you have existing surveillance equipment, chances are it’s a legacy analog system.

While the IP surveillance trend is picking up, there are still more than 40 million analog cameras in operation around the world today. Making the switch from analog to IP isn’t an easy transition for everyone and integrators have become increasingly aware. Fortunately there are hybrid solutions that allow you to work with your existing analog infrastructure and start your migration to an IP-based system. At Perfect Connections, Inc. our team of licensed integrators work with you to provide comprehensive security solutions that meet your needs. Our experts have been providing comprehensive security system solutions, including surveillance, to businesses throughout northern and central New Jersey for that past 23 years. We recognize the value technology adds to the security systems we install and how they can benefit our customers.

Why replace an analog system? To be fair, analog systems have filled a security need since the beginning of surveillance that would have otherwise gone unfulfilled. But just like any technology, progress is always pushing the envelope of what is relevant and effective. Look at smartphones, they are constantly evolving, every year a new model with new features that jettisons society forward. While businesses aren’t necessarily turning over their surveillance systems at the same rate, the growing trend is leaning towards IP and network based solutions.

Hybrid solutions for companies that aren’t ready to make the full switch to IP just yet offer the benefits of a more effective system that will ease the transition when the time is right. According to Mark Collett, general manager of Sony Security Systems Division, “With hybrid solutions, you can get the best of both worlds—the near-zero latency of analog plus IP’s HD imaging quality.”

Video encoders are the catalyst for the hybrid solution, replacing out of date and expensive DVRs. DVRs were traditionally responsible for storing and recording footage captured by connected surveillance cameras. According to James Marcella, a technologist in the security and IT industries, a video encoder is, “an open-platform technology that acts as a bridge between the analog and digital world by essentially turning an analog investment into IP cameras.” Video encoders would allow you to make use of existing infrastructure by attaching to the coaxial cable from you analog system, transforming the analog signal into a digital stream.

Many industry experts consider DVRs to be one of the most expensive pieces of equipment the consumer will purchase, and they are typically outlived by the analog cameras. Also, they are not dependable, if they go down so does the whole surveillance system, and this could happen at a critical moment. Video encoders are capable of running on power over Ethernet that can be tied to a backup power supply, keeping you covered no matter what. You can also employ redundancies like NAS devices (Network Attached Storage) and SD memory cards to help prevent recording loss.

DVRs lack the image resolution, edge intelligence, and network capabilities that a video encoder can offer. The frames per second rate (fps) is what creates a smoother clearer image, the higher the better especially in high motion scenarios. Video encoders are capable of capturing images at up to 60fps whereas DVRs only go up to 15fps. DVR intelligence is typically limited to whatever the manufacturer specifications have been set to. Video encoders open the door to third party intelligent applications which allow you to choose video management software from virtually any provider in the connected world. This creates a platform for advanced video analytics.

There is a large storage and scalability disparity between DVRs and video encoders. DVRs typically have a low tolerance for the quantity of cameras they can accommodate which can leave a business vulnerable by not being able to cover risky areas. On the other hand video encoders offer virtually limitless retention by being highly scalable. Video encoders have the ability to accommodate single cameras and there are some units that can accommodate up to 84 cameras making them a highly flexible and effective solution for a large or small facility.

The hybrid solution allows you to keep existing analog cameras and infrastructure and as the cameras die or warrant replacement, they can easily be swapped out for IP creating a smoother transition. Remote monitoring is another benefit to opting for a hybrid solution. This adds a level of security you can’t obtain from an analog system, being able to login to your surveillance system to see what is going on at your facility when you can’t be there.

Hybrid solutions are an economic and less disruptive option if you’re not fully committed to taking the IP plunge, even though progress will continue to push us in that direction. If you opt for a hybrid solution or aren’t sure what to do always consult a licensed professional to ensure proper application and installation. At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992. We can guide you through the process of creating a system that meets your specific needs, from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Mike Mozart-Flickr-Creative Commons

Moving To The Cloud

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds. These natural wonders are not the clouds we’ll be investigating here. Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it. Think about your everyday, do you use an internet based e-mail account, like Gmail? If so, then you use a cloud based service. So what is the “cloud”? Basically, the cloud takes recorded information and stores it on internet servers. Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet. In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that. While it is an exciting technology with seemingly endless applications, it is not without flaw. That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry? In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions. As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some. As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget. We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network set up and what are the benefits? In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service. Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced. According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.” Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers. If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device. Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency. As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com). It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department. This could help cut down on unnecessary manpower costs. And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology. Systems that rely solely on the cloud for recording and storage face some obvious risks. For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud. However, these outages are estimated to be no more than 4 hours per year. Fortunately there are inexpensive solutions to such an issue. To avoid losing any data a local recording device can be set up to operate for more than 4 hours. Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users. However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems. Business size is also a factor in the cost. Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required. So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations. Cloud access is another major concern for end-users. The question remains, what is stopping someone from hacking into my network? Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future. The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking. Once the dialogue becomes clearer the cloud has potential to become standard protocol. If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional. Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation. We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons

Video Surveillance Trends To Know

Video Surveillance-Christian SchnettelkerThe key components to a comprehensive business security system includes fire alarms, burglar alarms, access control, alarm monitoring, and last but not least video surveillance. That’s what this post will be focusing on. The development of video surveillance, its benefits, and where is it going in the near future. At Perfect Connections, Inc. we provide comprehensive security systems to businesses in Northern and Central New Jersey. Our experts understand the benefits of solid surveillance equipment, and always keep abreast the technological advancements being made in that arena.

Where did it all start?

It may not be on everyone’s mind on a daily basis, but in today’s society video surveillance is actually an integral part of our everyday lives. From ATM machines, to traffic lights, to drones, cameras seem to be everywhere. To understand where the concept for video surveillance came from, we have to look at the history and development of video cameras. Traveling back in time the first movie cameras were developed in 1880 by Thomas Edison and William Dickson. As a result the first motion picture demonstration took place in 1893. Into the 20th century camera development continues to move swiftly with Closed Circuit Television (CCTV) in Germany used for bomb monitoring in 1942. Charge-coupled device (CCD) technology in 1976 allowed for 24 hour surveillance because of its ability to work in low light. Skip forward to 1996 and you have the birth of the Internet Protocol (IP) camera. The IP cameras allow the sending and receiving of information across computer networks.

This ever-changing technology and various historic events, such as 9/11, have made video surveillance in public and private spaces ubiquitous worldwide. As pervasive and helpful as it can be in a protective sense it remains a controversial topic for some. The idea that government drones can stealthily record information on American citizens is a surveillance technique that does not sit well with some. What are your thoughts?

What are the benefits of video surveillance?

By installing a surveillance system you are adding a layer of protection for your business you can’t get anywhere else. We know you can’t be in more than one place at a time, but a surveillance system gives you eyes throughout your entire facility at all times. This helps curb issues such as employee theft. If employees know they’re being recorded, they’re less likely to misbehave. An economical benefit to a security system with surveillance is potentially saving money on your insurance. Many companies offer a discount for having a comprehensive security system (to figure out if you qualify contact your insurance provider directly). If you own a retail business you know shoplifting is an ongoing issue. The benefit of having recorded footage in retail is even if it doesn’t prevent the act of shoplifting, it can help catch the perpetrators. Surveillance can help prevent workplace violence by monitoring employee/customer behavior. Lastly, it’ll provide you with added peace of mind knowing you’re employees and business are being monitored.

Where is surveillance going?

As we’ve seen throughout history, technology has been a driving force in the development and advancement of video surveillance. Moving forward some industry professionals believe the next drive for security cameras is making their integration and functions easier for the end users. Some believe it’s all about upping the resolution factor. While higher megapixels would offer better and clearer images, it seems to be slow on the uptake because of the associated cost. Lastly, analytics is an emerging trend in surveillance systems, yet some still question it’s viability due to not only its cost but effectiveness. Aside from analytics that can people-count there is technology in the works that can supposedly detect individual aggression. How effective this feature can be is still up for debate among industry professionals. As technology pushes forward, camera development and integration will no doubt continue to change; how it will change us as a society, nobody knows.

If you own a business in Central or Northern New Jersey and are in need of a security system, looking to update your current situation, or unsure of where to begin do not hesitate to call on our team of professionals at Perfect Connections, Inc.. As security systems experts, our team has been providing service since 1992. We believe in providing comprehensive security systems that include video surveillance, access control, fire alarms, burglar alarms, and alarm monitoring. We are always keeping up with technology that is beneficial to our customers. System maintenance and installation should be seamless, as should updates and integration.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image By Christian Schnettelker-Flickr-Creative Commons

Using Cell Phones with Access Control Systems

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives. It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone. We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems. In particular as a means of access control and authentication in commercial applications using near field communication (NFC). According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…” This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey. We have been helping a wide range of businesses secure their facilities for over 20 years. As with any technology, progression in the realm of security components shows no signs of slowing. At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications. However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers. One of the many reasons being NFC technology has yet to become an innate feature in the spectrum of devices in circulation today.

In theory NFC access control would work by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential. The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control. This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord. Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access. Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike. Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night. It only makes sense that phones would become part of integrated security protocols. With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce. They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand. While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming. It also allows you to change credentials on and as needed basis. This would be helpful if you have a contract or temp worker who needs provisional access. You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials. Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification. So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user. If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving. Currently one of the major drawbacks is that it’s not universally integrated in mobile phones and access readers. Certain manufacturers like Apple and Google have yet to include NFC technology in their devices making the user purchase external accessories that can be bulky and unattractive. Then there are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons. The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

The world of security systems is constantly evolving. This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems. NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years. It will provide a new level of security and convenience that has yet to be fully realized. At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients. We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992. Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

What Makes Perfect Connections Different

Security-American Advisors GroupComprehensive security systems are what help maintain a safe and secure work environment or home. As a consumer it is in your best interest to hire a systems integrator with experience, knowledge, and know-how, but how do you tell the good from the “just okay” or bad? Any company can spout off how many years experience they have or jobs they’ve completed, that doesn’t really give you much insight into how they operate and solve problems.

At Perfect Connections, Inc. our integrators are licensed and provide a more individualized approach to any security problem you may have. Many competitors will offer standardized solutions that may not fit your specific needs. They do this simply to increase profits without considering “what is it potentially costing my client?” Our team at Perfect Connections puts the customer first and we do so through our client services, problem solving techniques, and determination to get the job done right. We have been providing comprehensive security system solutions to homes and a range of businesses throughout northern and central New Jersey for the past 23 years. Our customer loyalty means the world to us, so without inflating our egos let’s look at what makes us stand out.

Some of the larger security systems companies out there will use a “one size fits all” mentality when it comes to system design. This is not an effective way to protect your business or home. Every establishment and home is unique with extraneous factors that pose different risks. Designing a comprehensive security system takes a customized approach.

You likely wouldn’t implement the same system configuration in an assisted living facility as you would a manufacturing plant, right? Right! You may use similar system components like a means of access control and surveillance, but their applications would be different and specific to their respective locations. At Perfect Connections we believe in performing on site risk assessments and listening to our clients’ concerns to help determine the design, layout, and components necessary to provide adequate coverage.

As with any technology, security systems are susceptible to imperfections. This could be imperfections in system components or imperfections caused by an external factor, like existing infrastructure disturbances. Often times when there are obstructions or architectural issues alarm system equipment may not function optimally.

In the event a system isn’t operating properly our team of licensed integrators will run tests on the equipment and find the root of the actual problem. Other companies act in haste and often times don’t look for the actual cause of the issue. Instead they’ll assume it’s a total system malfunction and tear the whole thing out and start over. This is a costly and inefficient problem solving method. Our team does their due diligence to solve the problem accurately and efficiently, and we won’t give up until the issue is resolved.

At Perfect Connections we believe a comprehensive security system includes access control, video surveillance, fire and burglar alarms, smoke and carbon monoxide detectors, home automation, and a monitoring service. These individual components together create a system that provide unmatched coverage for your home or business. As an independent alarm company we’re not limited to one manufacturer’s offerings, which allows us to use the components that will work the best in your specific application and that are most cost effective.

As licensed security system integrators our team has been providing solutions to businesses and homes throughout northern and central New Jersey since 1992. Our experience and continued education has enabled us to evolve to meet the changing needs of our clients. If you’re looking for an alarm system for your home or business know that you won’t be just another number at Perfect Connections.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

How To Properly Store Surveillance Footage

Surveillance playSAN-Dennis van Zuijlekoms a vital role in any comprehensive security system. It helps authorities catch criminals and provides helpful insight into your business operations by collecting and analyzing data on a daily basis. Where and how is all of this visual and analytical data being “collected?” That is the ever pressing question for system integrators and end-users alike. Storing surveillance data can be as important to the efficiency of your security system as having the surveillance equipment itself. We are catapulting ourselves into the future with the constant evolution of technology in all aspects of life including security system components, and surveillance storage solutions are no exception, but not all are created equal.

At Perfect Connections, Inc. our licensed integrators are dedicated to providing comprehensive security system solutions that protect people and property. We have been installing security systems at business facilities throughout northern and central New Jersey for the past 23 years. Our team designs system solutions that meet the needs specific to your organization. Surveillance storage is a security system component that will vary project to project and should be treated with an individualized approach.

In the not so distant past, video recordings weren’t as advanced as they are today in terms of image resolution, clarity, and noise distortion. Recordings would often be deemed unusable due to their lack of clarity and they would typically be discarded freeing up storage space for new recordings. Today, with the advent of IP cameras (internet protocol) and more advanced camera technology the recordings have become critical data sources that are considered valuable. This means more and more end-users are interested in keeping recorded data for longer periods of time. The obvious consequence is the need for more storage space.

There are many factors that affect what kind of surveillance storage solutions can and should be implemented at a facility. The size of the project, existing infrastructure, and client budget are all critical determinants as to what type of storage should be implemented. The camera type, camera quantity, compression standards, frame rates, motion detection, desired length of storage, and overall estimate of desired resolution all should be taken into account as well.

When it comes to storing surveillance data it is paramount that the integrity of the footage is not lost. Traditionally surveillance footage would be stored on a DVR (digital video recorder), but it’s limitations within a networked system make it less than ideal. With so much of the surveillance world developing around IP and network solutions it’s only natural that network storage solutions should arise. NAS (network attached storage), SAN (storage area network), and DAS (direct attached storage) are all potential methods for storing surveillance data. All have different installation requirements. Some may call for extensive cabling and a large closet to store servers, but it all depends on the size and type of project. According to Justin Schorn, vice president of product management for Aimetis, “The critical decision is choosing between a storage area networks (SAN) and network attached storage (NAS).”

The different storage devices vary in how they present information to the user and how data is accessed. The NAS devices present data in a “file system” same with DAS, whereas SAN is presented in what is referred to as “block storage.” DAS and NAS either attach directly to an existing network or the NVR (network video recorder). SAN is essentially an extension of a DAS, but provides a higher storage capacity.

DAS is typically implemented in situations when expansion is not an option, the system performance requisites are static, and shared access is not necessary. The reason being is DAS devices are limited to singular DVR or NVR applications. SAN solutions are typically used in larger camera applications that may later require scalable options. According to Lee Caswell, founder and chief marketing officer at Pivot3, “Many archivers can share the storage and the SAN platform introduces more reliability over NVR/DVR systems because there is no single point of failure.” Common applications for SAN storage include airports, casinos, and prisons.

NAS devices are typically used in smaller surveillance applications as its performance isn’t as robust as SAN. One of the advantages to NAS solutions is data can be easily accessed by anyone on the same protected network. Lee says, “The advantage of the file system on the NAS platform is that it is easier to support a hybrid storage case as some storage occurs locally on self-contained NVRs/DVRs and extended storage is sent to a specific file on the NAS.”

Keeping high quality recorded data for longer periods of time can help local authorities with investigations and it can provide insight into your business that you otherwise wouldn’t observe. While storing recorded footage from your surveillance system is critical to your overall security, it’s important to remember that the type of storage necessary will vary depending on the project parameters. It is imperative to work with a licensed security system integrator to help evaluate security risks, the quantity of cameras needed, and how a surveillance storage system can be implemented to meet your requirements. At Perfect Connections, Inc. we are committed to providing security systems that suit your specific needs. We have been designing and installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Dennis van Zuijlekom-Flickr-Creative Commons

Alarm System Maintenance

So you bought an alarm system, what kind of maintenance and service should you do?

Really, not much. It should work flawlessly for quite some time. The first thing to go will be batteries. All systems will have to have their system battery replaced after 3 to 5 years. When the battery is low, the keypad will notify you as will the central station. The batteries for most alarm systems in service today are 12 volt and 4 to 7 amp hour. Newer graphic self-contained systems have different smaller batteries, the 2Gig GO! Control has a 7.2 volt back up battery. All batteries should give you 24 hour back up. It is not a bad idea to schedule replacement of your battery every 3 years to preempt any possible issues.

If you have a wireless alarm system, you will also need to replace the batteries in the various devices such as door and window transmitters, wireless motion detectors, wireless glass break detectors, wireless carbon monoxide detectors, wireless smoke detectors, key fobs, panic buttons, and other wireless devices. Most of the new devices use lithium batteries, from CR123 3 Volt lithium batteries to lithium watch sized batteries. The smaller the device, the smaller the battery. Typically the bigger batteries last longer, 3 years plus, while the watch type batteries last 2 years plus. Devices that are used most often, like entry doors, drain quicker. On the newer systems, the keypad tells you which transmitter has a low battery, making replacement easy.

Make sure your alarm company shows you how to change the batteries during the installation. You should also get a list of the batteries required for all the various devices you have so you don’t have to scramble to find out when they are low. If you choose not to replace your own batteries, the alarm company should be happy to replace them for you.

Older systems use typical alkaline batteries, 9 volt, AAA and AA are common. These need to be replaced more often. Many older systems don’t tell you when the batteries are low so regular replacement is necessary.

Other than changing batteries, not much else is necessary. Make sure devices such as motion detectors and smoke detectors are clear of spider webs and that’s about it.

If installed and programmed correctly, your alarm system should monitor all parts and devices on the system, as well as services it is connected to, like power, telephone, and cellular. If any of these systems go down, your alarm system should alert you to that fact. The first reaction is to think that there is something wrong with your alarm system, when in reality it is working correctly. It is supposed to tell you when it is compromised when a service it relies on is not working properly.

Even though the system monitors itself, testing the alarm system is something that you should regularly do. You depend on your alarm system and you should make sure that it is working properly all the time. The best way to test the system is as follows: Call the central station and put the system on test. Arm the system and then trip a zone. Reset the alarm and then call the central station to make sure they received the right signal. Next week put it back on test and trip the next zone. Go clockwise around your house and you will eventually check all your devices and then start again. It is worth the effort to protect your home and family.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, or if you would like us to perform a Home Safety and Security Audit, absolutely free, please call 800-369-3962 or simply click the link below.

Property Management and Security

Commercial BuildingAs a property manager you have a lot of people that depend on the safety and security of the real estate you oversee. Whether or not you own the properties you rent, or work with a landlord in managing their properties, a bulk of the responsibility lies on your shoulders. Your main goal is to attract responsible patrons, keep them, and build your brand. How can you do that if the property you oversee is publicly perceived to be too risky or unsafe? That’s the problem, if there has been an incident at a property that you own the public tends to remember and will likely steer clear of that address.

This negative reaction can be limited by implementing preventative security measures that meet the needs of your tenants and the risks associated with the surrounding area. One of the best preventative measures you can take as a property manager is to incorporate a comprehensive security system in combination with defined property protocols. At Perfect Connections, Inc. our licensed integrators provide comprehensive security system solutions that suit your specific needs. We have been installing security systems in facilities and residences throughout northern and central New Jersey for the past 23 years. Our team recognizes the challenges property managers face dealing with multiple properties both commercial and residential. We specialize in comprehensive security systems that include fire and burglar alarms, access control solutions, video surveillance, and system monitoring.

Trying to determine what type of security system is necessary for a specific property can be difficult that’s why it is important to involve a security professional from the start. This is especially true for new construction projects. Involving a security integrator from the start will ensure you are getting the coverage you need and create a seamless installation process.

One of the first and most important procedures to tackle is a risk assessment. A risk assessment should include a licensed security systems integrator and it should be performed as early on as possible. This will help determine where your greatest security threats are and how best to tackle them. The next step would be to design a custom security system that helps combat those threats.

While every security system application will be different dependent on the location there are some key components that will benefit most buildings. Video surveillance is a major security feature that is essential to any comprehensive system. The mere presence of a camera system is sometimes enough to deter potential criminals. It helps keep an eye on your property even when you can’t be there, it also gives your tenants a peace of mind knowing their public spaces are being looked after.

Access control is another important piece of the security system pie. It helps limit who and how people can gain entry and sometimes exit. Access control can be implemented in a number of ways. Often times a credential is issued to the approved users and they typically come in the form of a swipe card, a fob, or a proximity card. These credentials are used in conjunction with an electronic reader installed by the desired entry point. Using access control credentials instead of traditional keys helps prevent lost or stolen items from being duplicated. A similar type of idea can be used with parking lots and garages as well.

Fire and burglar alarms in combination with access control, video surveillance, and an alarm monitoring service make for a comprehensive security system. A security systems integrator helps ensure your fire alarm is installed and operates according to national and local codes. Having an alarm monitoring service will help alert you and the proper authorities at the first sign of a disturbance. With today’s technology there’s the potential to remotely monitor what is going on at your facilities through an app on your smartphone. Mobile apps typically have the capability to send you notifications if an alarm is triggered, or you can customize the type of notifications you want to receive. This could be particularly beneficial if you own multiple properties in different areas. A security system is meant to be a purveyor of safety and convenience. It helps protect your property investments and your patrons.

There is no “one-stop” security solution for any facility or residence. That is why it is imperative to involve a security systems integrator, they will assess the risks associated with your particular facility and design a system that suits your specific needs. As a property manager you have people that depend on you to maintain the facilities they utilize, and security should be a factor in that maintenance. Even if installing a security system isn’t your decision to make, it’s worth bringing up to whomever would make that choice. Having a comprehensive security system can be a good selling point to your clients and a way to keep them. Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992. We understand the value a security system can add to a facility and the sense of safety it instills in those it is meant to protect.

If you live, run a business, or manage properties in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ines Hegedus-Garcia-Flickr-Creative Commons