NFC Technology-How Mobile Are We?

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives.  It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone.  We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems.  In particular as a means of access control and authentication in commercial applications using near field communication (NFC).  According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…”  This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey.  We have been helping a wide range of businesses secure their facilities for over 20 years.  As with any technology, progression in the realm of security components shows no signs of slowing.  At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications.  However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers.  One of the many reasons being NFC technology has yet to become an innate feature in the spectrum of devices in circulation today.

In theory NFC access control would work by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential.  The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control.  This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord.  Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access.  Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike.  Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night.  It only makes sense that phones would become part of integrated security protocols.  With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce.  They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand.  While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming.  It also allows you to change credentials on and as needed basis.  This would be helpful if you have a contract or temp worker who needs provisional access.  You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials.  Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification.  So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user.  If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving.  Currently one of the major drawbacks is that it’s not universally integrated in mobile phones and access readers.  Certain manufacturers like Apple and Google have yet to include NFC technology in their devices making the user purchase external accessories that can be bulky and unattractive.  Then there are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons.  The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

The world of security systems is constantly evolving.  This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems.  NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years.  It will provide a new level of security and convenience that has yet to be fully realized.  At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients.  We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992.  Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

What is Z-Wave Technology?

Smart home AccessIn the wake of home automation, smart home, or connected home technology you may have come across the term Z-Wave technology.  What is it?  Z-Wave technology is, “a wireless technology that makes regular household products, like lights, door locks and thermostats ‘smart’.”  It’s what allows your home devices to “talk” to each other and be controlled remotely via your mobile device.  Why is this important?  Well, if you have home automation or been considering it, it’s all about ease of integration, flexibility, and interoperability.  Home automation and its perspective devices are an integral part of a comprehensive home security system.  At Perfect Connections, Inc. our licensed integrators have been providing comprehensive home security solutions for the past 23 years.  We believe in making your life easier and more convenient by providing technologies that not only operate effectively but help provide superior protection.

Having strong communication between devices is crucial to the efficacy of your system.  It seems Z-Wave technology has the majority grip on the market as it stand today, one of the main reasons being it boasts communication capabilities for more than 1,100 products from over 300 different manufacturers.  This is beneficial to integrators and end-users alike.  The quantity of smart products that operate on Z-Wave technology opens the door to highly flexible smart home applications.  This means you can outfit your entire house with automation devices that can be controlled from your central control panel or a single application on your mobile device versus having to control devices piecemeal because they don’t operate on the same technology.

According to Mark Walters, chairman of the Z-Wave Alliance, “…greater than 80 percent of the North American security company-based lifestyle solutions are powered by Z-Wave.”  The wide breadth of automation product availability within the Z-Wave family provides immense system scalability for homeowners and integrators.  Meaning your initial product installations are not finite.  Security and automation devices can be added on an as needed basis.  For example, you may start with automated door locks, lighting, and garage door control but you may find that with time your needs expand to temperature management, skylight controls, and/or guarding against potential water damage; it’s always nice to only have to go through the installation process once, but it’s comforting to know you have options after the fact.  While most homeowners rely on the experts to properly install devices in their home, the range of Z-Wave technology products does open the door to a more DIY approach.  However, it is important to note that it is always wise to consult a licensed security system integrator to ensure proper product installation and operation.  This technology also provides an open platform for integrators and consumers who prefer products from a specific manufacturer, making it easier to get exactly what you want.

What about existing household technologies, will they be affected by Z-Wave home automation devices?  Today our lives are inundated with technology, your home probably has a slew of devices that operate on Wi-Fi or Bluetooth.  The potential issue with a house full of devices operating simultaneously is the communication disruption they can incur on one another.  Luckily with Z-Wave technology you don’t have to worry about interference with or from other household devices.  Its operational capabilities were designed specifically for home control.  It’s a low energy consumption, bandwidth efficient technology that won’t inhibit other home devices.  Z-Wave technology also has a vast international presence throughout Europe further expanding their territory for consistency, device compatibility, and home automation integration.

Home automation is a facet of comprehensive security systems that improves a homeowners posture in security.  It is meant to improve lives through convenience and seamless integration.  With home automation you can turn lights on and off remotely with the tap of your finger on your mobile device.  You can arm or disarm your alarm system while on vacation.  You can monitor an aging loved one who wants to maintain a level of independence by tracking their activity on your smartphone.  Or you can use it to receive instant notifications of real time events like your kids arrival home from school.  Like any system, home automation is only as good as the sum of its parts and the technology it operates on.

Z-Wave technology is the means by which many automation devices communicate with each other and the system as a whole.  The strong hold it has on the market today seems to prove it’s effectiveness and dependability.  It creates flexibility in product selection and system integration without interfering with existing household devices.  Chances are if you already have home automation as part of your security system your devices operate on Z-Wave technology.  This technology and the devices it encompasses show no signs of slowing down in our age of technological progression.

Our licensed integrators at Perfect Connections, Inc. have been providing custom and comprehensive security system solutions to homes throughout northern and central New Jersey since 1992.  We believe in providing technologies that enhance your home’s security and home automation devices do just that.  Home automation is part of a comprehensive security system which should include fire and burglar alarms, video surveillance, access control, and a monitoring service.  We help your home security stay relevant and provide technology that improves your quality of life.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Domoalert Smart Life Quality’s photostream-Flickr-Creative Commons

How Does Home Automation Affect Home Security?

Smartphone-Phil CampbellAs the technology driven world continues to evolve, our lives are becoming more and more connected.  Virtual distances are shrinking.  This has been happening since the inception of the internet.  You no longer have to fly across the world to have a meeting, you simply login to a virtual meeting where you can talk “in-person” via video chat.  Although it may be imperfect, technology has certainly had an impact on all of our lives in one way or another.

Our lives are saturated in advanced technological gadgets, everything from our cars to our smartphones, why should our homes be any different?  It used to be enough having a home security system that would alert the authorities in an emergency, but why stop there?  Home automation, or the “connected home,” is quickly becoming an integral part of a comprehensive home security system.  It’s a driving force that is changing the way homeowners and system integrators perceive “home security.”

As a licensed security system provider, our professionals at Perfect Connections, Inc. are always looking for the best ways to protect your home.  We have been providing comprehensive security system solutions to residences throughout northern and central New Jersey for the past 23 years.  Technological advancement means we are constantly learning and adapting our solutions to best suit client needs.  That’s not to say just because something is new that it should be implemented, we do our due diligence before installation of any product including home automation devices.

Home automation products aren’t exclusively linked to home security.  In fact there is a plethora of automation devices that can be installed separate from a security system, often requiring a DIY (do it yourself) approach.  For example there are devices that can be attached to kitchen appliances that can be controlled by logging into apps on your smartphone.  However, rather than complicating our daily lives by having to download separate apps for everything in our homes, we have steadily been adopting technology in an effort to streamline and simplify.  When it comes to home security, with DIY solutions you’re likely not getting full coverage while simultaneously complicating processes.  Plus they often lack continuity and one of the most important aspects of a security system, monitoring.  Rather than separating the functions of a home security system and home automation, integrators and homeowners are combining the two creating more efficient and effective life safety and lifestyle systems.

One of the top benefits of home automation is convenience.  Capabilities include remote interaction with home devices and your security system.  Imagine being able to know the exact moment your kids walk through the front door while you’re at work or on your way home.  With home automation you’re able to set up custom notifications that will be sent to your smartphone, mobile device, or computer.  This means you can go on vacation and be notified of temperature drops in your home, package deliveries, or close the open garage doors you forgot about before you left.

Depending on your home automation application, often times you can log-in to your surveillance cameras, turn lights on and off, lock and unlock doors, control media (audio and video), arm and disarm your alarm system, all from the convenience of your mobile device.  When integrated with your home’s security system a singular control panel can be centralized to help avoid confusion that can result from having too many different operating mechanisms.

As a homeowner you might be asking yourself “how will home automation affect my security system?”  For the most part home automation is considered a promising and revolutionary approach to added home safety and efficiency, but as with anything, it isn’t perfect.  Any technology that operates over the internet inherently comes with the looming threat of hackers.  Why would someone want to hack a home automation or security system?  To state the most obvious, they’re likely interested in disabling your alarm system so they can break-in.  Other reasons could include wanting to cause general havoc by tampering with your lights or HVAC system, wasting energy for no other reason than driving up your utilities bill; for “fun.”

Fortunately there are ways to decrease the chances of being hacked, both on the user and integrator end.  In many cases home automation operates wirelessly over a home Wi-Fi network.  No matter how protected you think your network may be it should always be protected with encryptions and user authentication.  The same holds true for connected security devices and any device that transmits a signal.  There must be authentication between home automation devices, the security system, and whatever mobile device you are using to access them.  Otherwise your system is susceptible to third party hackers.

Take the case of Insteon home automation systems back in 2013.  Kashmir Hill, a Forbes Staff Writer, highlights the findings of David Bryan and Daniel Crowley, security researchers at Trustwave, and what they discovered is alarming (for lack of a better word).  They found that not only was there a lack of password protection on the consumer end, but that the Insteon products (now discontinued, for obvious reasons) themselves did not require usernames and passwords and were “crawl-able” (searchable) on the web.  This meant that anyone with a little know-how could access and mess with the connected Insteon products; unnerving to say the least.  Be sure to hire licensed professionals that fully understand the products they are installing and how they will interact with your home network.

While technology is imperfect and constantly transforming you can be sure if you hire a licensed security integrator with product knowledge and experience you’ll be setting yourself up for success.  A professional with industry knowledge will be able to ensure your system is as secure as it can be by using products that require authentication and that your network is encrypted.  As a licensed security system provider, our team at Perfect Connections, Inc. understands that securing a home and improving the lives of others doesn’t mean haphazardly throwing random products together just to get a job done.  We have been providing security solutions to homes throughout northern and central New Jersey since 1992.  Technological evolution is never-ending as is our commitment to providing the safest products and security systems available.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Phil Campbell-Flickr-Creative Commons

Changing Residential Access

Alan Cleaver-Key in doorThe days of struggling to carry 50 pounds of groceries while simultaneously trying to dig your house keys out of your pocket or purse, might be coming to an end.  As a homeowner your door locks have always been an essential line of defense when it comes to protecting your home.  While our everyday lives are saturated with technological advancement, it only makes sense that our physical structures should follow suit.  That being said, using a key to unlock your doors may be a thing of the past with wireless access control on the rise.

What is wireless access control?  Essentially, wireless access control in a residential setting means replacing the standard lock and key with a keypad, remote control, biometric reader, card reader, or Wi-Fi access.  Keys are no longer the only method for unlocking your doors, in fact, they become the back-up.  At Perfect Connections, Inc. our team of licensed experts have been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992.  We stay in touch with current technologies and how they might benefit our customers.  Protecting entrances is key (no pun intended) to the safety and security of any home, and we aim to provide the best solutions to each individual residence.

How does a wireless lock work?  Most traditional locks operate on some form of a “pin and tumbler” method.  This is when the serrated edge of an inserted key moves pins on the interior of the lock a certain distance allowing you turn the lock cylinder and open the door.  With a wireless lock (which typically operates on electricity or battery power) has “actuators,” which connect the cylinder or bolt to a motor within the door or frame.  The motor is electrically activated by a keypad, card reader, or wireless remote controller.  On top of that there are locks that work on Wi-Fi signals used in conjunction with your smartphone or mobile device, sometimes referred to as smart or automated locks.  Lastly, biometrics are sometimes used to control home access.  Typically a fingerprint or hand print is the credential required for such a system.

There are many advantages to a wireless locking system.  For one, you never have to worry about losing or forgetting your keys.  This eliminates having to leave spare keys outside or giving them to people who need access to your home.  Instead of using a key you can, depending on the type of wireless lock, give your visitor the access code or with an automated system you can unlock the door from your smartphone.  With a wireless lock there are no wires.  Typically this means an easier and seamless installation.  It’s a technology that would allow for a more ubiquitous integration that includes old and new construction homes.  Wireless locks offer a convenience and extra layer of security you can’t get from a standard door lock.

While there are multiple benefits to a wireless locking system, none of them are perfect.  With a regular lock you might lose your keys, with a wireless keypad lock you could forget your access code or the code could be hacked by a savvy burglar.  Fortunately, if you forget your code many keypad locks come with a physical key as a backup.  As for code hacking, it’s usually best practice to pick a random code, so don’t use a birthday or something easily guessed.  It’s also prudent- and some systems may require it anyway-to change the code every few months or after you’ve let an outsider use it.

The main drawback with a remote controlled lock is, just as with keys, you could lose the remote.  Unlike keys, a remote is usually programed by a computer.  Therefore, in the event that you lose the remote you can deactivate it from the convenience of a computer.  With a smart or automated lock you run into the issue of not always having a reliable Wi-Fi signal.  Then there’s the dreaded question of what happens when the power goes out?  As some of the wireless locks run on electricity, a power outage could be an issue.  However, many of these locks tend to have multiple redundancies in place including backup battery power.  The main deterrent when it comes to biometric locks is the price as they tend to be a fairly complex system that isn’t as pervasive in the residential market as the other technologies.

Whether you are building a new home or want to enhance the security of your current residence, wireless locks can reinforce your first line of defense and provide a convenience you can’t obtain with conventional locks.  As with any security device or installation you should always consult a licensed security systems professional, especially if you’re looking for full system integration.  At Perfect Connections, Inc. our team has been providing comprehensive security system solutions to homes throughout northern and central New Jersey for the past 23 years.  We help you connect and protect what matters most, offering a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alan Cleaver-Flickr-Creative Commons