NFC Technology-How Mobile Are We?

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives.  It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone.  We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems.  In particular as a means of access control and authentication in commercial applications using near field communication (NFC).  According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…”  This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey.  We have been helping a wide range of businesses secure their facilities for over 20 years.  As with any technology, progression in the realm of security components shows no signs of slowing.  At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications.  However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers.  One of the many reasons being NFC technology has yet to become an innate feature in the spectrum of devices in circulation today.

In theory NFC access control would work by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential.  The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control.  This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord.  Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access.  Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike.  Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night.  It only makes sense that phones would become part of integrated security protocols.  With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce.  They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand.  While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming.  It also allows you to change credentials on and as needed basis.  This would be helpful if you have a contract or temp worker who needs provisional access.  You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials.  Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification.  So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user.  If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving.  Currently one of the major drawbacks is that it’s not universally integrated in mobile phones and access readers.  Certain manufacturers like Apple and Google have yet to include NFC technology in their devices making the user purchase external accessories that can be bulky and unattractive.  Then there are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons.  The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

The world of security systems is constantly evolving.  This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems.  NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years.  It will provide a new level of security and convenience that has yet to be fully realized.  At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients.  We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992.  Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

How to Secure a Parking Garage

Parking Garage-David HilowitzThere are many architectural components to a business facility sometimes that includes a parking lot or garage.  Whether it is attached or detached, near or far from the main building it can be a convenient asset to any business.  It’s likely the place where you and your employees park in the morning and leave in the evening.  At some point in your life, whether you were at work or another establishment, you’ve probably had an uneasy feeling walking to your car.  But why?  Perhaps it had something to do with a perceived lack of security.

A parking lot or garage can often go overlooked when it comes to the security of an organization as it is not necessarily looked at as an actual part of the main building.  Often times organizations focus on protecting the areas people spend most of their time in, their office or interior work destination.  Sometimes a parking lot or garage isn’t even owned by the business it serves but rather an outside property manager.  However, parking destinations can often be high risk areas especially at night.  As a licensed security systems company our experts at Perfect Connections, Inc. assess the security risks of an organization as a whole.  We have been offering comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We understand not every business or location is the same, and with different locations comes different security risks.  Our team helps minimize risk by offering tailored security system solutions.

The risks associated with an unprotected parking lot or garage can be mitigated once brought to light.  Speaking of light, it is one of the most important safety factors in parking lots and garages.  As you’ve probably experienced at one point or another not all parking areas have adequate lighting, thus creating dark corners and easy hiding spots for potential criminals.  According to James Marcella, Director of Technical Services for Axis Communications, “The most effective deterrent to criminal activity is a well-lit area, because not only does it increase the ability for natural surveillance, it also improves the quality of recorded images from security cameras.”

Not only is it imperative for patrons to be able to see, but if something were to happen it’s crucial that security cameras record useable footage.  Lighting and surveillance tend to go hand-in-hand.  This means installing light fixtures that will provide ample illumination and an adequate CRI (Color Rendition Index) rating.  CRI ratings quantify the precision a light source has when it comes to reproducing color.  One of the best and overall cost effective options is LED (Light Emitting Diode) lighting.

While lighting is paramount, surveillance is key when it comes to catching criminal behavior, especially in parking lots and garages.  In our current technological environment surveillance cameras and equipment are becoming more efficient and advanced.  For instance, garage and parking lot environments are not exactly the cleanest or protected areas, therefore surveillance equipment has to be able to withstand harsher elements.

Fortunately there are cameras built specifically for such vulnerable settings.  Vandal-resistant cameras happen to be a surveillance solution in volatile areas, providing protection from both human and environmental elements.  They typically come sealed from dust and moisture right out of the box making them durable and increasing their longevity.  This helps cut down on long term costs of repairs or replacements.

Aside from being durable, ease of integration is becoming a pervasive quality in cameras and security equipment.  Today, end-users are starting to migrate from analog camera systems to IP (Internet Protocol) for their image quality, coverage, and scalability.  This opens the door to whole system integration where a garage surveillance system can be on the same network as the business it services, or at least that’s the idea.  With IP and cloud-based surveillance systems becoming more ubiquitous, clearer images and video analytics are sure to play an important role in the security of any infrastructure, including parking lots and garages.  It would help cut down on the need for physical monitoring services as well provide a platform for remote access via a mobile device or computer.

When enhancing the safety of your parking lot or garage it’s important to consider landscaping, signage, cashier booths and pay stations, and alert systems for the patrons.  Landscaping around a garage or lot should be well kept and vegetation should be trimmed low to maintain a clear line of sight.  There should be clear signage that improves way-finding and some that indicates the area is under surveillance.  Sometimes seeing signage is enough to deter criminal activity.  Cashier booths and pay stations are crime targets for obvious reasons, therefore they should be well-lit and have adequate surveillance coverage.  Alert systems can be a helpful added security feature that would notify patrons by text message of any issues or disturbances while they are away.

Whether you are the owner of a parking lot/garage or a patron it is critical to ensure its security.  It’s not just about being vigilant of your property, it’s about protecting you, your employees, and your patrons.  As every location has different risks you should always call on a licensed security systems professional to perform an in-person security assessment.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992.  Our team is skilled at providing custom solutions tailored specifically to your needs.  We appreciate the complexities involved in protecting an organization as a whole.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by David Hilowitz-Flickr-Creative Commons

Should I Move To The Cloud?

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds.  These natural wonders are not the clouds we’ll be investigating here.  Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it.  Think about your everyday, do you use an internet based e-mail account, like Gmail?  If so, then you use a cloud based service.  So what is the “cloud”?  Basically, the cloud takes recorded information and stores it on internet servers.  Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet.  In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that.  While it is an exciting technology with seemingly endless applications, it is not without flaw.  That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry?  In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions.  As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some.  As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network setup and what are the benefits?  In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service.  Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced.  According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.”  Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers.  If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device.  Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency.  As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com).  It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department.  This could help cut down on unnecessary manpower costs.  And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology.  Systems that rely solely on the cloud for recording and storage face some obvious risks.  For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud.  However, these outages are estimated to be no more than 4 hours per year.  Fortunately there are inexpensive solutions to such an issue.  To avoid losing any data a local recording device can be set up to operate for more than 4 hours.  Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users.  However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems.  Business size is also a factor in the cost.  Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required.  So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations.  Cloud access is another major concern for end-users.  The question remains, what is stopping someone from hacking into my network?  Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future.  The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking.  Once the dialogue becomes clearer the cloud has potential to become standard protocol.  If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional.  Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons