Dumpster Difficulties: How to Avoid Them

Most businesses and office buildings have a dumpster outside the building. While these are “accessible” to everyone, they are not for everyone to use. However, many people will throw their trash in dumpsters that they have such easy access to anyway, causing businesses to spend hundreds of additional dollars to get extra days of trash pickup. So how can you protect yourself from this expensive nuisance? Here are a few ways!

One way that you can prevent this from happening is to have your dumpster in an enclosed area. This will prevent people from dumping their trash in your dumpster because they will no longer have unrestricted access to it.

Another way to prevent this is to make sure that you keep your dumpster away from any high traffic areas. By keeping it out of plain sight, people often wont even know that it is there, and therefore wont use it to dump their trash. Something on the flip side of this that can help is to keep your dumpster in a well lit area. Doing this will often prevent people from illegally dumping in your dumpster because they know that they can then be seen.

Finally, a video surveillance system can be used to identify who is using your dumpster. Not only does the presence of a camera deter unwanted activities, but it can also help you to identify who is using your dumpster.

A combination of these options, or even just one of these, can be used to protect your dumpster from unwanted users, and save you hundreds of dollars in trash pickup.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image credit: Great Lakes Fence Co.

What should you look for in a video surveillance system?

Video surveillance systems can be beneficial for a number of reasons. They are often installed to prevent burglaries and vandalism, but can also be used to promote neighborhood or office safety, in addition to increasing peace of mind if used in a home environment. When installing a video surveillance system, whether it is for your home, your office, or for any other setting, there are a number of things to consider. First, you need to think about the area that you want to keep any eye on, as well as the type of surveillance system and cameras you want. All of these factors will help you to decide what kind of system is best for your situation.

The first question you want to consider is how many cameras do you think that you will need? Think about the size of the property you are looking to protect, and the perspective that a camera will you give you in various locations. Additionally, you need to consider what the areas are that you want to cover. If there are outdoor areas, you need cameras that can stand up to weather, whereas for an indoor setting you would not need to look for weatherproof options, which can often be more expensive. You also need to consider the time of day that you will be using your system: daytime, nighttime, or both. All of these factors play will play into your decision about what kind of camera you will need.

Security Camera

After deciding what types of cameras you need for your space, you will want to think about the specific places that you want to have your cameras to be that will give you the best and widest ranges of visibility. These places will likely be at entrances and exits to the building, near garage doors, and by exterior or unattached buildings. If the video surveillance system is for a place of business, you will likely want to consider what areas typically have high traffic, and target these areas for camera installation.

Something else to consider when thinking about a video surveillance system is how you want to set up your data storage system. There are many options where you can save video footage onto a hard drive, and other options that save to this data into a cloud for storage. Along with this you will want to consider how much storage you think you will need. This will depend on two factors that affect the amount of data your system will use: both the quality of videos, and how long you plan to save video footage for. One final thing to consider is whether you will want to have access to a camera’s live feed, or if you will only want to be able to go back and look at footage when necessary. This will also contribute to the amount of storage space you’ll need, as well as help you to determine if your system will need the capability to connect to the Internet. This will also help you to determine if you want to have an analog camera, or an IP camera.

Once you have thought through this criteria and made decisions about what you think will work best for you and your space, you will be ready to look for a video surveillance system!

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image credit: Ricco Security

How Perfect Connections Does Security Systems

Security-American Advisors GroupComprehensive security systems are what help maintain a safe and secure work environment or home.  As a consumer it is in your best interest to hire a systems integrator with experience, knowledge, and know-how, but how do you tell the good from the “just okay” or bad?  Any company can spout off how many years experience they have or jobs they’ve completed, that doesn’t really give you much insight into how they operate and solve problems.

At Perfect Connections, Inc. our integrators are licensed and provide a more individualized approach to any security problem you may have.  Many competitors will offer standardized solutions that may not fit your specific needs.  They do this simply to increase profits without considering “what is it potentially costing my client?”  Our team at Perfect Connections puts the customer first and we do so through our client services, problem solving techniques, and determination to get the job done right.  We have been providing comprehensive security system solutions to homes and a range of businesses throughout northern and central New Jersey for the past 23 years.  Our customer loyalty means the world to us, so without inflating our egos let’s look at what makes us stand out.

Some of the larger security systems companies out there will use a “one size fits all” mentality when it comes to system design.  This is not an effective way to protect your business or home.  Every establishment and home is unique with extraneous factors that pose different risks.  Designing a comprehensive security system takes a customized approach.

You likely wouldn’t implement the same system configuration in an assisted living facility as you would a manufacturing plant, right?  Right!  You may use similar system components like a means of access control and surveillance, but their applications would be different and specific to their respective locations.  At Perfect Connections we believe in performing on site risk assessments and listening to our clients’ concerns to help determine the design, layout, and components necessary to provide adequate coverage.

As with any technology, security systems are susceptible to imperfections.  This could be imperfections in system components or imperfections caused by an external factor, like existing infrastructure disturbances.  Often times when there are obstructions or architectural issues alarm system equipment may not function optimally.

In the event a system isn’t operating properly our team of licensed integrators will run tests on the equipment and find the root of the actual problem.  Other companies act in haste and often times don’t look for the actual cause of the issue.  Instead they’ll assume it’s a total system malfunction and tear the whole thing out and start over.  This is a costly and inefficient problem solving method.  Our team does their due diligence to solve the problem accurately and efficiently, and we won’t give up until the issue is resolved.

At Perfect Connections we believe a comprehensive security system includes access control, video surveillance, fire and burglar alarms, smoke and carbon monoxide detectors, home automation, and a monitoring service.  These individual components together create a system that provide unmatched coverage for your home or business.  As an independent alarm company we’re not limited to one manufacturer’s offerings, which allows us to use the components that will work the best in your specific application and that are most cost effective.

As licensed security system integrators our team has been providing solutions to businesses and homes throughout northern and central New Jersey since 1992.  Our experience and continued education has enabled us to evolve to meet the changing needs of our clients.  If you’re looking for an alarm system for your home or business know that you won’t be just another number at Perfect Connections.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Why Does an Assisted Living Facility Need a Security System?

Assisted Living FacilityAssisted living facilities are dynamic environments.  You have occupants with varying levels of medical needs alongside administrative, medical, and visiting personnel.  It’s a somewhat complex security issue because residents and staff need to be able to move throughout the facility freely, but unauthorized entrants must somehow be kept out.  The mental health and acuity of residents can also be a cause for concern.  In an aging population medical conditions like dementia and Alzheimer’s can cause residents to wander off or get lost which is a major concern for staff and resident relatives.  Thankfully by implementing security system solutions many of these concerns can be addressed.

At Perfect Connections, Inc. our licensed security system integrators have been providing comprehensive security solutions to healthcare facilities throughout northern and central New Jersey for the past 23 years.  Our team understands the importance of securing assisted living facilities isn’t solely about protecting physical assets, it’s about ensuring the safety and security of the people that live and work there.  It’s about providing a peace of mind to not only the staff and residents, but resident’s families as well.

Comprehensive security systems should include fire alarms, smoke and carbon monoxide detectors, burglar alarms, a surveillance system, access control, and a monitoring service.  One of the most important components that should concern assisted living facilities is access control.  Access control can be implemented in a number of ways and an assisted living facility may require more than one mode.

The on-site staff will likely need access to areas where medication is stored and administrative offices, supply rooms, and medical records etc.  Access not only has to be convenient, but limited to authorized staff.  The reason this can sometimes be challenging is because residents want to be able to roam throughout the facility freely as do visitors.  Fortunately with access control solutions the chances of a resident or visitor wandering into a restricted area are lowered significantly.

By installing readers at entries and distributing credentials (fobs, swipe cards, and proximity cards) to authorized users, access will be limited.  The benefit of using readers in conjunction with credentials vs traditional locks and keys is you don’t have to worry about lost or stolen keys.  Cards and fobs can be remotely disabled whereas a lost key may never be recovered which ultimately leads to changing out the locks and over time that can be costly.

According to Mark Jarman, President of Inovonics, “…the assisted living market has changed from one of simply providing clinical care, much like hospitals, to sprawling campuses which are often a blend of independent living, assisted living and skilled nursing services.”  This creates a more complex environment that requires increased safety and vigilance.  Assisted living facilities are full of activity, the constant coming and going of staff, residents, and visitors, it can be challenging to keep an eye on everything, that’s why having a surveillance system is vital.  It’s a helpful tool that allows staff to keep track of patients that might have the tendency to wander and it gives residents a peace of mind.  In the event an intruder is able to gain access to the facility, surveillance will help authorities catch the perpetrator and depending on the type of system, it can even be setup to send real-time alerts to staff members on their mobile devices.

Aside from surveillance and access control solutions it’s imperative and likely required by local and national laws to have a fire alarm system and smoke and carbon monoxide detectors.  Fire alarm systems and detectors are lifesaving components that when tied to a monitored security system become even more effective.  With a monitored system, when an alarm sounds, a signal is sent to the monitoring station which then immediately alerts emergency responders, and in unpredictable situations it is imperative to have the quickest response possible.  This is critical in an assisted living facility as residents are likely slower moving and may have impaired hearing or eyesight.  Some fire alarm systems can even indicate which detectors or alarms within the facility initiated the alert which is helpful to responders as they’ll have a better idea where to start when they arrive on site.

The reasons why an assisted living facility would need a security system are evident.  There is a need to protect residents, staff, visitors, medical records, physical assets, and facility property.  A comprehensive security system that includes access control, surveillance, fire alarms, smoke and carbon monoxide detectors, and a monitoring service is essential.  At Perfect Connections, Inc. our licensed integrators can help design a custom and comprehensive system that is tailored to the specific needs of your facility.  Every organization is unique and should be treated as such, especially when it comes to matters of security.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by U.S. Department of Agriculture-Flickr-Creative Commons

Can Central Monitoring be Replaced by Self-monitoring?

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response.  This system still exists today and is considered an effective means for preventing disaster and catching criminals.  However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device.  One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We have seen how technology can affect not only individual security devices but the system as a whole.  There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it.  This is where the idea of self-monitoring comes into play.  If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device.  This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act.  The same is true of a tripped alarm.  This all sounds great, right?  However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response.  This could happen for a number of reasons.  One being your mobile device is turned off or not on your person.  Another could be a missed notification.  As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times.  It’s a feat not likely met by any independent business owner, you have to sleep at some point.  Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day.  The constant interruption would be enough to drive anyone mad.  It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one.  In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage.  Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring.  There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors.  According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.”  It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location.  However, this doesn’t mean someone will be vigilant 24/7.  This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it.  Lastly, there’s professional remote video monitoring.  This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios.  These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities.  Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage.  As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it.  These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility.  An operator may notice  things like loose wires or a piece of equipment that looks out of place.  Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them.  Many industry professionals agree that having a professional monitoring service is still the preferable method of watching over your facility.  There’s simply too many holes in trying to self-monitor your own business.  According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.”  Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.”  With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years.  We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs.  If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t.  The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

Storing Surveillance

Surveillance playSAN-Dennis van Zuijlekoms a vital role in any comprehensive security system.  It helps authorities catch criminals and provides helpful insight into your business operations by collecting and analyzing data on a daily basis.  Where and how is all of this visual and analytical data being “collected?”  That is the ever pressing question for system integrators and end-users alike.  Storing surveillance data can be as important to the efficiency of your security system as having the surveillance equipment itself.  We are catapulting ourselves into the future with the constant evolution of technology in all aspects of life including security system components, and surveillance storage solutions are no exception, but not all are created equal.

At Perfect Connections, Inc. our licensed integrators are dedicated to providing comprehensive security system solutions that protect people and property.  We have been installing security systems at business facilities throughout northern and central New Jersey for the past 23 years.  Our team designs system solutions that meet the needs specific to your organization.  Surveillance storage is a security system component that will vary project to project and should be treated with an individualized approach.

In the not so distant past, video recordings weren’t as advanced as they are today in terms of image resolution, clarity, and noise distortion.  Recordings would often be deemed unusable due to their lack of clarity and they would typically be discarded freeing up storage space for new recordings.  Today, with the advent of IP cameras (internet protocol) and more advanced camera technology the recordings have become critical data sources that are considered valuable.  This means more and more end-users are interested in keeping recorded data for longer periods of time.  The obvious consequence is the need for more storage space.

There are many factors that affect what kind of surveillance storage solutions can and should be implemented at a facility.  The size of the project, existing infrastructure, and client budget are all critical determinants as to what type of storage should be implemented.  The camera type, camera quantity, compression standards, frame rates, motion detection, desired length of storage, and overall estimate of desired resolution all should be taken into account as well.

When it comes to storing surveillance data it is paramount that the integrity of the footage is not lost.  Traditionally surveillance footage would be stored on a DVR (digital video recorder), but it’s limitations within a networked system make it less than ideal.  With so much of the surveillance world developing around IP and network solutions it’s only natural that network storage solutions should arise.  NAS (network attached storage), SAN (storage area network), and DAS (direct attached storage) are all potential methods for storing surveillance data.  All have different installation requirements.  Some may call for extensive cabling and a large closet to store servers, but it all depends on the size and type of project.  According to Justin Schorn, vice president of product management for Aimetis, “The critical decision is choosing between a storage area networks (SAN) and network attached storage (NAS).”

The different storage devices vary in how they present information to the user and how data is accessed.  The NAS devices present data in a “file system” same with DAS, whereas SAN is presented in what is referred to as “block storage.”  DAS and NAS either attach directly to an existing network or the NVR (network video recorder).  SAN is essentially an extension of a DAS, but provides a higher storage capacity.

DAS is typically implemented in situations when expansion is not an option, the system performance requisites are static, and shared access is not necessary.  The reason being is DAS devices are limited to singular DVR or NVR applications.  SAN solutions are typically used in larger camera applications that may later require scalable options.  According to Lee Caswell, founder and chief marketing officer at Pivot3, “Many archivers can share the storage and the SAN platform introduces more reliability over NVR/DVR systems because there is no single point of failure.”  Common applications for SAN storage include airports, casinos, and prisons.

NAS devices are typically used in smaller surveillance applications as its performance isn’t as robust as SAN.  One of the advantages to NAS solutions is data can be easily accessed by anyone on the same protected network.  Lee says, “The advantage of the file system on the NAS platform is that it is easier to support a hybrid storage case as some storage occurs locally on self-contained NVRs/DVRs and extended storage is sent to a specific file on the NAS.”

Keeping high quality recorded data for longer periods of time can help local authorities with investigations and it can provide insight into your business that you otherwise wouldn’t observe.  While storing recorded footage from your surveillance system is critical to your overall security, it’s important to remember that the type of storage necessary will vary depending on the project parameters.  It is imperative to work with a licensed security system integrator to help evaluate security risks, the quantity of cameras needed, and how a surveillance storage system can be implemented to meet your requirements.  At Perfect Connections, Inc. we are committed to providing security systems that suit your specific needs.  We have been designing and installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Dennis van Zuijlekom-Flickr-Creative Commons

NFC Technology-How Mobile Are We?

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives.  It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone.  We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems.  In particular as a means of access control and authentication in commercial applications using near field communication (NFC).  According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…”  This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey.  We have been helping a wide range of businesses secure their facilities for over 20 years.  As with any technology, progression in the realm of security components shows no signs of slowing.  At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications.  However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers.  One of the many reasons being NFC technology has yet to become an innate feature in the spectrum of devices in circulation today.

In theory NFC access control would work by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential.  The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control.  This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord.  Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access.  Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike.  Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night.  It only makes sense that phones would become part of integrated security protocols.  With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce.  They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand.  While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming.  It also allows you to change credentials on and as needed basis.  This would be helpful if you have a contract or temp worker who needs provisional access.  You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials.  Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification.  So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user.  If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving.  Currently one of the major drawbacks is that it’s not universally integrated in mobile phones and access readers.  Certain manufacturers like Apple and Google have yet to include NFC technology in their devices making the user purchase external accessories that can be bulky and unattractive.  Then there are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons.  The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

The world of security systems is constantly evolving.  This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems.  NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years.  It will provide a new level of security and convenience that has yet to be fully realized.  At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients.  We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992.  Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

What Sets Us Apart

logoWhen you’re starting any kind of project, what’s one of the first things you do?  In all likelihood you go to your computer, smartphone, or mobile device and open up a search engine.  You run search after search to find what you’re looking for.  In our connected world of the IoT (Internet of Thing) we are, at least partially, reliant on what we can find online.  You can find information on virtually anything.  This includes anything from how to properly stain a deck to how to choose which security system integrator is the best.

Entering almost any search will draw up a slew of options, so how do you choose?  Any company can toot their own horn and sound good on paper, or online for that matter.  That’s where customer reviews, testimonials, a personal reference, and researching the business comes in handy.  When it comes to installing a security system at your home or business you want to feel confident that who you hire is experienced, licensed, knowledgeable, and trustworthy.  At Perfect Connections, Inc. our team of licensed integrators design and install comprehensive security systems in homes and businesses throughout northern and central New Jersey.  We’ve been providing detailed and professional service for the past 23 years.  We specialize in custom designed security systems that typically include fire and burglar alarms, video surveillance, access control, alarm monitoring, and interactive services.

As a commercial and residential security system company, our team at Perfect Connections prides itself in providing systems and service that exceed your expectations.  Unlike other security system providers we’re confident we can create solutions to almost any issue you may have.  This includes thinking outside the box, literally, when it comes to designing a comprehensive security system.  Many integrators will limit themselves to the specifications of a security component and won’t get creative to manufacture a solution.  The same is true about structural obstacles, some companies will not even attempt to solve an installation challenge if they perceive it to be too difficult.  At Perfect Connections we’re problem solvers.  We exhaust all options before accepting defeat, and more often than not come up with a creative solution.

With Perfect Connections you know what you’re getting.  When we quote a job for specified work the price you’re quoted is the price you will pay, no added fees or upcharges.  Typically the only time you would end up paying more is if additional work is requested after the fact, but that doesn’t mean you’ll be charged more because of an unanticipated structural or component issue.

While we can’t necessarily prove the authenticity of an internet comment, we can present the facts about our company.  As a commercial and residential security systems provider in northern and central New Jersey, our team at Perfect Connections has the expertise and customer loyalty to prove our professional status.  Aside from offering quality products and installation, we truly value our customers and their needs.  Our typical customer base covers a wide range including homeowners, hospital and healthcare facilities, assisted living facilities, recycling and salvage yards, office buildings, and manufacturing facilities.  Nobody, and nothing, is perfect, but we are constantly working our hardest to ensure our clients’ needs are being met.  What sets us apart from the competition is what we offer, our commitment to quality service, and our ability to problem solve designing customized systems.

Available ONLY at Perfect Connections

  • We offer a 30-day money back guarantee if you are at all dissatisfied, no questions asked
  • There is a one year warranty of EVERYTHING we offer
  • We have a 98% customer loyalty rating
  • Perfect Connections has been in business since 1992 with more than 1,200 customers in Central and Northern New Jersey

What Else Do We Offer?

Perfect Connections The Other Guys
Live 24/7/365 support available Most expect you to call during business hours
Technicians on call 24/7 There is no standard
Immediate response in case of emergency (typical response is 45 seconds) Typically respond within minutes
Service & maintenance contracts available Only available at large security companies
Leasing & financing available Standard for most
Customers save 10-20% on L & P insurance Standard for most

 

With the level of service and products we provide, our team of licensed professionals will ensure the security of your home or business.  Our specialty is comprehensive customized security systems that include fire and burglar alarms, access control, video surveillance, alarm monitoring and interactive services.  If you live or run a business in Northern or Central New Jersey, don’t hesitate to give us a call at 800-369-3962 and visit our website for more information HERE.  Let us help you connect and protect what matters most.

What is Hybrid Surveillance?

Mike Mozart-surveillanceAs a business owner protecting your facility is always a top concern.  Are you getting the coverage you need?  If you have a comprehensive security system you’re already in a good position.  However, a security system is only as good as the sum of its parts.  One of the most crucial parts of a security system is the surveillance aspect.  Surveillance systems are the eyes that keep watch over your business even when you can’t.

Like any other technology surveillance equipment is constantly evolving through research and development that is meant to improve its efficiency.  In today’s IoT (Internet of Things) IP-based (Internet Protocol) systems are a driving force that is changing the role of surveillance in comprehensive security.  But not everyone is so keen on the uptake.  Prior to the inception of IP cameras and network devices the world was and has been dominated by analog cameras and DVR devices (Digital Video Recording).  If you have existing surveillance equipment, chances are it’s a legacy analog system.

While the IP surveillance trend is picking up, there are still more than 40 million analog cameras in operation around the world today.  Making the switch from analog to IP isn’t an easy transition for everyone and integrators have become increasingly aware.  Fortunately there are hybrid solutions that allow you to work with your existing analog infrastructure and start your migration to an IP-based system.  At Perfect Connections, Inc. our team of licensed integrators work with you to provide comprehensive security solutions that meet your needs.  Our experts have been providing comprehensive security system solutions, including surveillance, to businesses throughout northern and central New Jersey for that past 23 years.  We recognize the value technology adds to the security systems we install and how they can benefit our customers.

Why replace an analog system?  To be fair, analog systems have filled a security need since the beginning of surveillance that would have otherwise gone unfulfilled.  But just like any technology, progress is always pushing the envelope of what is relevant and effective.  Look at smartphones, they are constantly evolving, every year a new model with new features that jettisons society forward.  While businesses aren’t necessarily turning over their surveillance systems at the same rate, the growing trend is leaning towards IP and network based solutions.

Hybrid solutions for companies that aren’t ready to make the full switch to IP just yet offer the benefits of a more effective system that will ease the transition when the time is right.  According to Mark Collett, general manager of Sony Security Systems Division, “With hybrid solutions, you can get the best of both worlds—the near-zero latency of analog plus IP’s HD imaging quality.”

Video encoders are the catalyst for the hybrid solution, replacing out of date and expensive DVRs.  DVRs were traditionally responsible for storing and recording footage captured by connected surveillance cameras.  According to James Marcella, a technologist in the security and IT industries, a video encoder is, “an open-platform technology that acts as a bridge between the analog and digital world by essentially turning an analog investment into IP cameras.”  Video encoders would allow you to make use of existing infrastructure by attaching to the coaxial cable from you analog system, transforming the analog signal into a digital stream.

Many industry experts consider DVRs to be one of the most expensive pieces of equipment the consumer will purchase, and they are typically outlived by the analog cameras.  Also, they are not dependable, if they go down so does the whole surveillance system, and this could happen at a critical moment.  Video encoders are capable of running on power over Ethernet that can be tied to a backup power supply, keeping you covered no matter what.  You can also employ redundancies like NAS devices (Network Attached Storage) and SD memory cards to help prevent recording loss.

DVRs lack the image resolution, edge intelligence, and network capabilities that a video encoder can offer.  The frames per second rate (fps) is what creates a smoother clearer image, the higher the better especially in high motion scenarios.  Video encoders are capable of capturing images at up to 60fps whereas DVRs only go up to 15fps.  DVR intelligence is typically limited to whatever the manufacturer specifications have been set to.  Video encoders open the door to third party intelligent applications which allow you to choose video management software from virtually any provider in the connected world.  This creates a platform for advanced video analytics.

There is a large storage and scalability disparity between DVRs and video encoders.  DVRs typically have a low tolerance for the quantity of cameras they can accommodate which can leave a business vulnerable by not being able to cover risky areas.  On the other hand video encoders offer virtually limitless retention by being highly scalable.  Video encoders have the ability to accommodate single cameras and there are some units that can accommodate up to 84 cameras making them a highly flexible and effective solution for a large or small facility.

The hybrid solution allows you to keep existing analog cameras and infrastructure and as the cameras die or warrant replacement, they can easily be swapped out for IP creating a smoother transition.  Remote monitoring is another benefit to opting for a hybrid solution.  This adds a level of security you can’t obtain from an analog system, being able to login to your surveillance system to see what is going on at your facility when you can’t be there.

Hybrid solutions are an economic and less disruptive option if you’re not fully committed to taking the IP plunge, even though progress will continue to push us in that direction.  If you opt for a hybrid solution or aren’t sure what to do always consult a licensed professional to ensure proper application and installation.  At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992.  We can guide you through the process of creating a system that meets your specific needs, from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Mike Mozart-Flickr-Creative Commons

False Alarms

False alarm may cost a life-Shannon ClarkIf you have a security system you might already understand the consequences of a false alarm.  It is not something to be taken lightly and can have serious implications.  False alarms can happen for any number of reasons and it’s important to understand why and how best to avoid them.  No security system is perfect, and false alarms are bound to happen, but as end users and integrators it is our duty to try to minimize them.  At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  They are knowledgeable about the products they install and can provide useful information on system function and upkeep to help avoid any mishaps.

As technology progresses and advancements in security manufacturing lead to better products it’s likely the instance of a false alarm or dispatch will be lessened.  According to Ron Walters, director with the Security Industry Alarm Coalition (SIAC), prior to the 90’s false alarms were typically attributed to faulty security products.  Since then manufacturers have been and continue to produce quality products, however that doesn’t guarantee proper application and use.  Accurate installation and usage lies the hands of the security integrator and the end user.  That is why it is critical to hire a licensed security expert for system installation and user specifications.  It is also important that the end user has an understanding of what is expected of them in order to avoid false dispatches.  Unfortunately, approximately 15% of false alarms are considered to be caused by user error.

In a world where there are an estimated 35-36 million alarms in use, according to Stan Martin who is the executive director of the SIAC, false alarms are an unavoidable evil. False alarms and dispatches are an annoyance for end users, but their ramifications don’t end there.  They take valuable time and resources away from emergency responders that might otherwise be needed at an actual crisis.  If you have too many false alarms it can create a “boy cried wolf” situation where authorities might be more hesitant to respond.  On top of all that you could end up paying substantial fines for repeat offenses.  Recurring false alarms that go unchecked can create tension between local authorities, end users, and security integrators.  But negative impacts aside, the SIAC reports that 90% of law enforcement still consider alarm industry professionals valuable allies.

Sometimes it’s difficult to pinpoint the cause of a false alarm as it could have been a situation where an intruder was attempting a break-in and escaped before authorities arrived making it appear like a false alarm.  This is where video surveillance, alarm monitoring, and remote system access come in handy.  Being able to tap into your facility’s surveillance system and visually verify whether or not an intruder is or was present, is a critical time and resources saver.  With remote access via an app on your smartphone or mobile device you can do just that.  The beauty of remote access is you don’t have to physically be on site to see what is going on at your facility.  Having a monitoring service will also help determine whether or not there is an actual emergency and whether or not authorities should be dispatched.  An added benefit to having video surveillance is even if the perpetrator escapes before authorities arrive, the recorded footage can be used to aid an investigation and hopefully identify the intruder.

Aside from having proper security equipment installed there are some helpful tips for end users to keep in mind that will help avoid pesky false alarms.  One, always know your alarm code and be sure all windows and doors are secured before arming your system.  Two, be sure you get your system tested regularly, it’s typical to have an annual inspection but some situations might require quarterly or more frequent tests.  Be sure critical sensors and smoke detectors are adequately covered during any construction or building modification to avoid disruptions caused by debris.  Lastly, always consult a licensed security system provider with any maintenance or care questions.

While false alarms aren’t completely avoidable, you can lessen the chances of them happening to you.  Hiring a licensed security system integrator who is knowledgeable and has extensive installation experience is key.  Installing a comprehensive security system that includes video surveillance, fire and burglar alarms, access control, and a monitoring service will provide complete coverage and reduce the risk of false dispatches and alarms.  At Perfect Connections, Inc. our licensed professionals have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years.  Our technicians have the experience and expertise to install security devices and can help educate you on proper usage.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Shannon Clark-Flickr-Creative Commons