Alarm System Maintenance

So you bought an alarm system, what kind of maintenance and service should you do?

Really, not much. It should work flawlessly for quite some time. The first thing to go will be batteries. All systems will have to have their system battery replaced after 3 to 5 years. When the battery is low, the keypad will notify you as will the central station. The batteries for most alarm systems in service today are 12 volt and 4 to 7 amp hour. Newer graphic self-contained systems have different smaller batteries, the 2Gig GO! Control has a 7.2 volt back up battery. All batteries should give you 24 hour back up. It is not a bad idea to schedule replacement of your battery every 3 years to preempt any possible issues.

If you have a wireless alarm system, you will also need to replace the batteries in the various devices such as door and window transmitters, wireless motion detectors, wireless glass break detectors, wireless carbon monoxide detectors, wireless smoke detectors, key fobs, panic buttons, and other wireless devices. Most of the new devices use lithium batteries, from CR123 3 Volt lithium batteries to lithium watch sized batteries. The smaller the device, the smaller the battery. Typically the bigger batteries last longer, 3 years plus, while the watch type batteries last 2 years plus. Devices that are used most often, like entry doors, drain quicker. On the newer systems, the keypad tells you which transmitter has a low battery, making replacement easy.

Make sure your alarm company shows you how to change the batteries during the installation. You should also get a list of the batteries required for all the various devices you have so you don’t have to scramble to find out when they are low. If you choose not to replace your own batteries, the alarm company should be happy to replace them for you.

Older systems use typical alkaline batteries, 9 volt, AAA and AA are common. These need to be replaced more often. Many older systems don’t tell you when the batteries are low so regular replacement is necessary.

Other than changing batteries, not much else is necessary. Make sure devices such as motion detectors and smoke detectors are clear of spider webs and that’s about it.

If installed and programmed correctly, your alarm system should monitor all parts and devices on the system, as well as services it is connected to, like power, telephone, and cellular. If any of these systems go down, your alarm system should alert you to that fact. The first reaction is to think that there is something wrong with your alarm system, when in reality it is working correctly. It is supposed to tell you when it is compromised when a service it relies on is not working properly.

Even though the system monitors itself, testing the alarm system is something that you should regularly do. You depend on your alarm system and you should make sure that it is working properly all the time. The best way to test the system is as follows: Call the central station and put the system on test. Arm the system and then trip a zone. Reset the alarm and then call the central station to make sure they received the right signal. Next week put it back on test and trip the next zone. Go clockwise around your house and you will eventually check all your devices and then start again. It is worth the effort to protect your home and family.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, or if you would like us to perform a Home Safety and Security Audit, absolutely free, please call 800-369-3962 or simply click the link below.

Smart Homes and Z-Wave Technology

Smart home AccessIn the wake of home automation, smart home, or connected home technology you may have come across the term Z-Wave technology. What is it? Z-Wave technology is, “a wireless technology that makes regular household products, like lights, door locks and thermostats ‘smart’.” It’s what allows your home devices to “talk” to each other and be controlled remotely via your mobile device. Why is this important? Well, if you have home automation or been considering it, it’s all about ease of integration, flexibility, and interoperability. Home automation and its perspective devices are an integral part of a comprehensive home security system. At Perfect Connections, Inc. our licensed integrators have been providing comprehensive home security solutions for the past 24 years. We believe in making your life easier and more convenient by providing technologies that not only operate effectively but help provide superior protection.

Having strong communication between devices is crucial to the efficacy of your system. It seems Z-Wave technology has the majority grip on the market as it stand today, one of the main reasons being it boasts communication capabilities for more than 1,100 products from over 300 different manufacturers. This is beneficial to integrators and end-users alike. The quantity of smart products that operate on Z-Wave technology opens the door to highly flexible smart home applications. This means you can outfit your entire house with automation devices that can be controlled from your central control panel or a single application on your mobile device versus having to control devices piecemeal because they don’t operate on the same technology.

According to Mark Walters, chairman of the Z-Wave Alliance, “…greater than 80 percent of the North American security company-based lifestyle solutions are powered by Z-Wave.” The wide breadth of automation product availability within the Z-Wave family provides immense system scalability for homeowners and integrators. Meaning your initial product installations are not finite. Security and automation devices can be added on an as needed basis. For example, you may start with automated door locks, lighting, and garage door control but you may find that with time your needs expand to temperature management, skylight controls, and/or guarding against potential water damage; it’s always nice to only have to go through the installation process once, but it’s comforting to know you have options after the fact. While most homeowners rely on the experts to properly install devices in their home, the range of Z-Wave technology products does open the door to a more DIY approach. However, it is important to note that it is always wise to consult a licensed security system integrator to ensure proper product installation and operation. This technology also provides an open platform for integrators and consumers who prefer products from a specific manufacturer, making it easier to get exactly what you want.

What about existing household technologies, will they be affected by Z-Wave home automation devices? Today our lives are inundated with technology, your home probably has a slew of devices that operate on Wi-Fi or Bluetooth. The potential issue with a house full of devices operating simultaneously is the communication disruption they can incur on one another. Luckily with Z-Wave technology you don’t have to worry about interference with or from other household devices. Its operational capabilities were designed specifically for home control. It’s a low energy consumption, bandwidth efficient technology that won’t inhibit other home devices. Z-Wave technology also has a vast international presence throughout Europe further expanding their territory for consistency, device compatibility, and home automation integration.

Home automation is a facet of comprehensive security systems that improves a homeowners posture in security. It is meant to improve lives through convenience and seamless integration. With home automation you can turn lights on and off remotely with the tap of your finger on your mobile device. You can arm or disarm your alarm system while on vacation. You can monitor an aging loved one who wants to maintain a level of independence by tracking their activity on your smartphone. Or you can use it to receive instant notifications of real time events like your kids arrival home from school. Like any system, home automation is only as good as the sum of its parts and the technology it operates on.

Z-Wave technology is the means by which many automation devices communicate with each other and the system as a whole. The strong hold it has on the market today seems to prove it’s effectiveness and dependability. It creates flexibility in product selection and system integration without interfering with existing household devices. Chances are if you already have home automation as part of your security system your devices operate on Z-Wave technology. This technology and the devices it encompasses show no signs of slowing down in our age of technological progression.

Our licensed integrators at Perfect Connections, Inc. have been providing custom and comprehensive security system solutions to homes throughout northern and central New Jersey since 1992. We believe in providing technologies that enhance your home’s security and home automation devices do just that. Home automation is part of a comprehensive security system which should include fire and burglar alarms, video surveillance, access control, and a monitoring service. We help your home security stay relevant and provide technology that improves your quality of life.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Domoalert Smart Life Quality’s photostream-Flickr-Creative Commons

Understanding False Alarms

False alarm may cost a life-Shannon ClarkIf you have a security system you might already understand the consequences of a false alarm. It is not something to be taken lightly and can have serious implications. False alarms can happen for any number of reasons and it’s important to understand why and how best to avoid them. No security system is perfect, and false alarms are bound to happen, but as end users and integrators it is our duty to try to minimize them. At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. They are knowledgeable about the products they install and can provide useful information on system function and upkeep to help avoid any mishaps.

As technology progresses and advancements in security manufacturing lead to better products it’s likely the instance of a false alarm or dispatch will be lessened. According to Ron Walters, director with the Security Industry Alarm Coalition (SIAC), prior to the 90’s false alarms were typically attributed to faulty security products. Since then manufacturers have been and continue to produce quality products, however that doesn’t guarantee proper application and use. Accurate installation and usage lies the hands of the security integrator and the end user. That is why it is critical to hire a licensed security expert for system installation and user specifications. It is also important that the end user has an understanding of what is expected of them in order to avoid false dispatches. Unfortunately, approximately 15% of false alarms are considered to be caused by user error.

In a world where there are an estimated 35-36 million alarms in use, according to Stan Martin who is the executive director of the SIAC, false alarms are an unavoidable evil. False alarms and dispatches are an annoyance for end users, but their ramifications don’t end there. They take valuable time and resources away from emergency responders that might otherwise be needed at an actual crisis. If you have too many false alarms it can create a “boy cried wolf” situation where authorities might be more hesitant to respond. On top of all that you could end up paying substantial fines for repeat offenses. Recurring false alarms that go unchecked can create tension between local authorities, end users, and security integrators. But negative impacts aside, the SIAC reports that 90% of law enforcement still consider alarm industry professionals valuable allies.

Sometimes it’s difficult to pinpoint the cause of a false alarm as it could have been a situation where an intruder was attempting a break-in and escaped before authorities arrived making it appear like a false alarm. This is where video surveillance, alarm monitoring, and remote system access come in handy. Being able to tap into your facility’s surveillance system and visually verify whether or not an intruder is or was present, is a critical time and resources saver. With remote access via an app on your smartphone or mobile device you can do just that. The beauty of remote access is you don’t have to physically be on site to see what is going on at your facility. Having a monitoring service will also help determine whether or not there is an actual emergency and whether or not authorities should be dispatched. An added benefit to having video surveillance is even if the perpetrator escapes before authorities arrive, the recorded footage can be used to aid an investigation and hopefully identify the intruder.

Aside from having proper security equipment installed there are some helpful tips for end users to keep in mind that will help avoid pesky false alarms. One, always know your alarm code and be sure all windows and doors are secured before arming your system. Two, be sure you get your system tested regularly, it’s typical to have an annual inspection but some situations might require quarterly or more frequent tests. Be sure critical sensors and smoke detectors are adequately covered during any construction or building modification to avoid disruptions caused by debris. Lastly, always consult a licensed security system provider with any maintenance or care questions.

While false alarms aren’t completely avoidable, you can lessen the chances of them happening to you. Hiring a licensed security system integrator who is knowledgeable and has extensive installation experience is key. Installing a comprehensive security system that includes video surveillance, fire and burglar alarms, access control, and a monitoring service will provide complete coverage and reduce the risk of false dispatches and alarms. At Perfect Connections, Inc. our licensed professionals have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years. Our technicians have the experience and expertise to install security devices and can help educate you on proper usage.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Shannon Clark-Flickr-Creative Commons

Property Management and Security

Commercial BuildingAs a property manager you have a lot of people that depend on the safety and security of the real estate you oversee. Whether or not you own the properties you rent, or work with a landlord in managing their properties, a bulk of the responsibility lies on your shoulders. Your main goal is to attract responsible patrons, keep them, and build your brand. How can you do that if the property you oversee is publicly perceived to be too risky or unsafe? That’s the problem, if there has been an incident at a property that you own the public tends to remember and will likely steer clear of that address.

This negative reaction can be limited by implementing preventative security measures that meet the needs of your tenants and the risks associated with the surrounding area. One of the best preventative measures you can take as a property manager is to incorporate a comprehensive security system in combination with defined property protocols. At Perfect Connections, Inc. our licensed integrators provide comprehensive security system solutions that suit your specific needs. We have been installing security systems in facilities and residences throughout northern and central New Jersey for the past 23 years. Our team recognizes the challenges property managers face dealing with multiple properties both commercial and residential. We specialize in comprehensive security systems that include fire and burglar alarms, access control solutions, video surveillance, and system monitoring.

Trying to determine what type of security system is necessary for a specific property can be difficult that’s why it is important to involve a security professional from the start. This is especially true for new construction projects. Involving a security integrator from the start will ensure you are getting the coverage you need and create a seamless installation process.

One of the first and most important procedures to tackle is a risk assessment. A risk assessment should include a licensed security systems integrator and it should be performed as early on as possible. This will help determine where your greatest security threats are and how best to tackle them. The next step would be to design a custom security system that helps combat those threats.

While every security system application will be different dependent on the location there are some key components that will benefit most buildings. Video surveillance is a major security feature that is essential to any comprehensive system. The mere presence of a camera system is sometimes enough to deter potential criminals. It helps keep an eye on your property even when you can’t be there, it also gives your tenants a peace of mind knowing their public spaces are being looked after.

Access control is another important piece of the security system pie. It helps limit who and how people can gain entry and sometimes exit. Access control can be implemented in a number of ways. Often times a credential is issued to the approved users and they typically come in the form of a swipe card, a fob, or a proximity card. These credentials are used in conjunction with an electronic reader installed by the desired entry point. Using access control credentials instead of traditional keys helps prevent lost or stolen items from being duplicated. A similar type of idea can be used with parking lots and garages as well.

Fire and burglar alarms in combination with access control, video surveillance, and an alarm monitoring service make for a comprehensive security system. A security systems integrator helps ensure your fire alarm is installed and operates according to national and local codes. Having an alarm monitoring service will help alert you and the proper authorities at the first sign of a disturbance. With today’s technology there’s the potential to remotely monitor what is going on at your facilities through an app on your smartphone. Mobile apps typically have the capability to send you notifications if an alarm is triggered, or you can customize the type of notifications you want to receive. This could be particularly beneficial if you own multiple properties in different areas. A security system is meant to be a purveyor of safety and convenience. It helps protect your property investments and your patrons.

There is no “one-stop” security solution for any facility or residence. That is why it is imperative to involve a security systems integrator, they will assess the risks associated with your particular facility and design a system that suits your specific needs. As a property manager you have people that depend on you to maintain the facilities they utilize, and security should be a factor in that maintenance. Even if installing a security system isn’t your decision to make, it’s worth bringing up to whomever would make that choice. Having a comprehensive security system can be a good selling point to your clients and a way to keep them. Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to facilities throughout northern and central New Jersey since 1992. We understand the value a security system can add to a facility and the sense of safety it instills in those it is meant to protect.

If you live, run a business, or manage properties in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ines Hegedus-Garcia-Flickr-Creative Commons

Protect Your Alarm System As Well

For those who own alarm systems, whether they are video surveillance, access control, burglary, or fire protection, our systems watch over us and protect us around the clock.

But in today’s day and age, just about everything is connected to the internet. In many cases, this includes our alarm system. And like any device that is connected to the internet, if not taken care of properly, it can be at risk of attack from hackers.

“Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks” said a recent news piece by the Wall Street Journal. Many times, these cameras were infected by pre-compromised routers that already existed.

Here are some tips about how to protect your alarm system as well

Router security:
We recommend using WPA2 security for your router. Most routers, unless they are fairly old, are capable of this type of security. For more information on this, check out your router’s brand’s website – Belkin, Linksys, and Netgear are common brands.

Firmware updates: It is very important that any device that connects to the internet, from thermostats to alarm systems to routers to televisions to computers, always has the most up to date firmware. Each device’s manual or website will have instructions on how to do those, and if there is a phone application that interfaces with the device, you can often do it through the application.

Password protection: Many devices come with generic user names and passwords. These are easy targets for hackers. Make sure you change any default passwords, and try not to use the same password on multiple devices. It is most important that this is done on the router.

New hardware:
According to Kenneth White, a security researcher and director of the Open Crypto Audit Project, “If the company that made your [device] isn’t selling that model anymore or offering security updates, that’s a good sign for you to throw it in the trash.”

Why Monitoring Is Important

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response. This system still exists today and is considered an effective means for preventing disaster and catching criminals. However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device. One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We have seen how technology can affect not only individual security devices but the system as a whole. There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it. This is where the idea of self-monitoring comes into play. If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device. This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act. The same is true of a tripped alarm. This all sounds great, right? However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response. This could happen for a number of reasons. One being your mobile device is turned off or not on your person. Another could be a missed notification. As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times. It’s a feat not likely met by any independent business owner, you have to sleep at some point. Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day. The constant interruption would be enough to drive anyone mad. It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one. In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage. Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring. There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors. According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.” It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location. However, this doesn’t mean someone will be vigilant 24/7. This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it. Lastly, there’s professional remote video monitoring. This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios. These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities. Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage. As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it. These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility. An operator may notice things like loose wires or a piece of equipment that looks out of place. Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them. Many industry professionals agree that having a professional monitoring service is still the preferable method of watching over your facility. There’s simply too many holes in trying to self-monitor your own business. According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.” Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.” With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years. We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs. If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t. The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

Video Surveillance For Your Business

Video surveillance systems can be beneficial for a number of reasons. They are often installed to prevent burglaries and vandalism, but can also be used to promote neighborhood or office safety, in addition to increasing peace of mind if used in a home environment. When installing a video surveillance system, whether it is for your home, your office, or for any other setting, there are a number of things to consider. First, you need to think about the area that you want to keep any eye on, as well as the type of surveillance system and cameras you want. All of these factors will help you to decide what kind of system is best for your situation.

The first question you want to consider is how many cameras do you think that you will need? Think about the size of the property you are looking to protect, and the perspective that a camera will you give you in various locations. Additionally, you need to consider what the areas are that you want to cover. If there are outdoor areas, you need cameras that can stand up to weather, whereas for an indoor setting you would not need to look for weatherproof options, which can often be more expensive. You also need to consider the time of day that you will be using your system: daytime, nighttime, or both. All of these factors play will play into your decision about what kind of camera you will need.

Security Camera

After deciding what types of cameras you need for your space, you will want to think about the specific places that you want to have your cameras to be that will give you the best and widest ranges of visibility. These places will likely be at entrances and exits to the building, near garage doors, and by exterior or unattached buildings. If the video surveillance system is for a place of business, you will likely want to consider what areas typically have high traffic, and target these areas for camera installation.

Something else to consider when thinking about a video surveillance system is how you want to set up your data storage system. There are many options where you can save video footage onto a hard drive, and other options that save to this data into a cloud for storage. Along with this you will want to consider how much storage you think you will need. This will depend on two factors that affect the amount of data your system will use: both the quality of videos, and how long you plan to save video footage for. One final thing to consider is whether you will want to have access to a camera’s live feed, or if you will only want to be able to go back and look at footage when necessary. This will also contribute to the amount of storage space you’ll need, as well as help you to determine if your system will need the capability to connect to the Internet. This will also help you to determine if you want to have an analog camera, or an IP camera.

Once you have thought through this criteria and made decisions about what you think will work best for you and your space, you will be ready to look for a video surveillance system!

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image credit: Ricco Security

VoIP And Your Business

Telephone-Billy BrownWe live in an exciting time where it seems every day a new technology is being born. Everything from our computers to our phones to our everyday accessories are advancing at a rapid pace. The implications of a technology may not be fully realized until after the fact, and it may not always be an issue with the technology itself, but how it interacts with existing components of our already complex systems. This is especially true of security system components.

In a comprehensive security system there are access controls, burglar and fire alarms, video surveillance, a monitoring service, and sometimes motion/glass break detectors. With all of these moving parts security integrators have to understand the functions of each component and how they will affect one another. As licensed security systems integrators our professionals at Perfect Connections, Inc. we deal with the changing technological environment by being educated and thoroughly evaluating what technologies will actually benefit our clients. Our integrators have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey for the past 23 years.

Many, if not most, security systems are migrating to a network based solution where system components are tied to an internet network. This is where VoIP technology may come into play. What is VoIP? It stands for Voice over Internet Protocol. Essentially VoIP technology allows voice signals to be transferred over a network versus the traditional POTS (plain old telephone service). How does this tie into security systems? In the not so distant past security system components were hardwired and heavily relied on traditional phone lines for communication capabilities. Even with the surge of wireless components available there are still many hardwired systems that rely on the dependability of a phone line connection. VoIP technology essentially replaces the traditional phone line and can be used to bundle all communications, like cable and internet, into one service.

Sounds convenient, but like any technology there are bound to be issues, particularly with how it can potentially interfere with security systems. Where you might run into trouble is when an alarm is triggered. Typically, when an alarm is triggered a signal is sent to the monitoring station prompting them to alert the proper authorities. Depending on the installation and the service, it could cause unpredictable or failed communication of alarm signals to the central monitoring station. Some VoIP services can’t connect directly to 911 and on the dispatchers end they might not be able to see your phone number or address when you call, which is problematic when a response is needed.

The reasons why VoIP can cause unreliability are not always obvious especially to the end user. According to Kenneth L. Gentile, a senior consulting engineer for Rolf Jensen & Associates Inc., “Digital alarm communication transmitters (DACTs) and other alarm transmitters initiate tones designed for transmission over POTS.” Sometimes these tones meant for the monitoring station do not translate properly over VoIP lines due to signal distortion.

Installation error can be a factor in the reliability, or lack thereof, in VoIP services as well. If the initial alarm wiring was installed on the existing telephone service it could prevent the alarm from transmitting properly and it’s up to your security systems integrator to recognize that. Alarm system tests can typically be run to ensure its operability, but according to Gentile, an on-site test with a VoIP service can’t always determine proper function or what the problem may be. Instead he suggests VoIP service providers and the alarm monitoring service should be asked to conjointly demonstrate transmission of alarm signals under normal circumstances, when there is a power failure, and when VoIP is in use. Doing so should help point out any potential issues with alarm signal transmission. Gentile says, “VoIP service must be engineered so as not to jeopardize the essential emergency communications upon which public safety depends.”

Issues aside, VoIP service promises to be a beneficial technology. Apparently it comes with great cost savings. According to Eduard L. Telders, director of enterprise information security at T-Mobile, “VoIP can eliminate the entire expense stream of establishing and maintaining a circuit-switched network for telephone connections.” Being able to bundle all communications into one service is appealing to end users and vendors alike. It makes maintenance and service calls more convenient, having to call only one provider versus one for each service. Facilities that employ VoIP technologies in conjunction with their security systems have the advantage of real-time response to criminal activity. With VoIP, central monitoring stations can actually speak directly to an intruder caught on camera, transmitting a voice message through speakers installed at the subscribers on site location.

While it may have yet to be perfected VoIP technology seems to be a leading change in communication capabilities. The implications it may have on security system transmissions and emergency responses are critical issues that need to be addressed by VoIP providers, security system integrators, monitoring services, emergency responders, and industry professionals. Keep in mind that just because something is available, doesn’t make it the best option for your specific needs. At Perfect Connections, Inc. our licensed integrators believe in providing comprehensive security solutions that will enhance the safety and security of your facility, not hinder it. We have been installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992, we have the experience and knowledge to design a system that will work best for you.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Billy Brown-Flickr-Creative Commons

Investing in Access Control

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons

Questions to Ask When Searching for the Right Security System


 

Picking the right security system for you business or your home can be difficult. There are so many different options from brands to levels of protection that a system offers, and it can be hard to figure out which security system will be right for you. So what kind of things should you ask when deciding on a system? Here are a few:Robber-Cartoon

  1. What is it that I want to protect?
  2. What level of security will I need for what I am trying to protect?
  3. Will just an alarm system suffice? Or do I want to have a camera system as well?
  4. How much do I want to spend on a security system?
  5. How many people will need to have access to the system?

 

These are just some of the things that you will want to consider when looking into a security system. Another thing to look for when installing a system is a company that offers the things you are looking for. Perfect Connections, Inc. provides many different types of systems and can help you answer these questions to decide what system would be best for you! So, if you live or run a business in Central or Northern New Jersey and would like to find out more about what system would be right for you, please call 800-369-3962 or simply CLICK HERE.


Image from CheckPoint Security