Wired Or Wireless?

Wires-Windell OskayThe process of researching home security systems can seem daunting. There are many factors you must take into consideration. You have to choose which company you trust to perform the work, how much you’re willing to spend, and what type of system to have installed, to name a few. The type of system you opt for can seem like a tricky decision, that’s why it is imperative to hire a licensed security professional to advise you on the best solution for your home. There are two types of systems in terms of how they are installed, hardwired and wireless. Sometimes a combination of both are implemented, it really depends on your specific needs. Here at Perfect Connections, Inc. we provide security system solutions to Northern and Central New Jersey, and can assess an individual homeowners needs for either a hardwired or wireless installation.

According to safewise.com, “The network of sensors, plus the control panel, make up a self-contained system that may be wired or wireless.” So what’s the difference between hardwired and wireless? A hardwired system involves installing physical wires from the various alarm components (i.e. motion detectors, sensors, etc) to the central control panel. The wires are typically hidden behind walls, which is why it’s beneficial to install this type of system in the construction phase of a home, if possible. According to asecurelife.com, “most older home alarm systems rely on hard wiring where most new systems are gravitating towards wireless or hybrid alarm systems.”

A wireless system relies on radio frequencies to transmit and receive signals between the alarm devices and the control panel; kind of like how a cell phone works. In fact, one of the major benefits of a wireless system is you have the ability to remotely control different aspects of your home via your mobile phone/device. A hardwired system may require a landline to communicate with the monitoring service, whereas a wireless system doesn’t. In this day and age, many homeowners are moving away from landlines all together, making a wireless system almost an indisputable choice. An interesting article about the seaside New Jersey town of Mantokoling describes how the phone lines destroyed by Hurricane Sandy were not rebuilt at all. Instead a wireless option was offered by Verizon. Whether by choice or natural causes, wireless technology seems to be the trend of the future.

While the decision between wireless or hardwired might seem difficult, a specialist will be able to help you figure it out, and in some cases you may not have to choose; it might be dictated by the structure of your home or the area you live in. Hiring an expert will not only save you time and aggravation, but provide you with a peace of mind knowing your system is appropriate for your home and that it was installed correctly. If you live in Central or Northern New Jersey, don’t hesitate to contact our team of licensed professionals at Perfect Connections, Inc.. We’ve been providing residential security systems services for the past 22 years. Our team is knowledgeable about the systems we install and the ever changing technology in the security systems industry.

Check out this brief list of the pros and cons of hardwired and wireless systems:

Hardwired Security System

Pros:

  • It’s a reliable system
  • Can be integrated seamlessly with new construction projects
  • They typically have backup batteries in case of power outages
  • Hardwired systems are less susceptible to electrical interferences from other devices
  • Alarm will sound if any wiring is cut
  • Will likely be installed by a licensed professional ensuring smoother integration

Cons:

  • Can sometimes be more expensive
  • May require tougher installation (drilling holes in walls etc.)
  • Makes relocation of system devices more difficult
  • Typically have longer more intensive installation
  • Can’t bring the system with you when/if you move

Wireless Security System

Pros:

  • Installation is fairly easy and quick
  • Devices can easily be moved, replaced, or updated
  • Can control parts of your home remotely from your mobile device (thermostats, lighting, etc.)
  • System maintenance is typically easy, in most cases systems will require battery replacement
  • Device software can be updated as it evolves
  • May be a more economical system
  • Devices are portable, making moving less of an issue

Cons:

  • Can sometimes be interfered with by exterior electronic devices (baby monitors, microwaves etc.)
  • Can sometimes be more susceptible to interference than a hardwired system
  • Technology evolves quickly making installed devices obsolete quicker
  • Devices can sometimes have sensory issues
  • Structural interferences can be an issue (brick walls, old construction etc.)

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credits: Image by Winell Oskay-Flickr-Creative Commons

Making Sure Your Fire Alarm Works

Fire Strobe-Alfonso PierantonioFire is an unpredictable force that can wreak havoc on any business. It is imperative as a business owner, facility manager, or building owner that the proper precautions are in place to help prevent catastrophe. The NFPA (National Fire Protection Association) is a leading advocate in fire prevention and safety. They’ve written numerous codes and standards that have been implemented nationwide. These standards are designed to help reduce the risk and effects of fire. In combination with local regulations, NFPA codes and regulations are what system integrators and contractors have to follow in order to pass inspection from local authorities.

While you no doubt have some sort of fire detection and/or suppression system in operation it’s important to maintain it in accordance with national and local requirements. As a security systems integrator, our team at Perfect Connections, Inc. has been installing fire alarm systems in business facilities throughout northern and central New Jersey for that past 23 years. We specialize in comprehensive security systems that include fire alarms as a major component to a fully functioning system. We do offer maintenance and service contracts helping you preserve a system that will continue to pass annual inspections and work efficiently in the event of a fire.

What goes into fire alarm maintenance? First off, unless you or your staff is trained and licensed, you must hire a licensed technician. This will help avoid accidentally setting off any false alarms which can result in substantial fines. A common starting point, whether the system is fairly new or if you moved into a space with an existing system, is to find out the systems age and maintenance history. The age of a fire alarm system will help determine whether or not components need to be replaced and what type of maintenance might be required.

According to Mike Lohr, director of service marketing for SimplexGrinnell LP, “Systems between five and ten years old may experience component breakdown caused by harsh, but normal, environmental factors. Voltage fluctuations, temperature, and humidity may cause system failure or nuisance alarm problems.” He notes that systems between 5-10 and 10-15 years can provide adequate “life-safety” responses, but those within the 10-15 year marks should be watched carefully. This is even more important if you have a shoddy record of maintenance history as it could have been poorly taken care of in the past.

Aside from knowing the age of your system you have to take any specific regulations the local authority having jurisdiction (AHJ) might have into consideration. While the NFPA provides codes and standards for the nation, the AHJ will likely have their own set of rules that are specific to the area they preside. This means that even if your system meets NFPA standards it may not pass local inspection because of AHJ specifications. For this reason it is imperative to hire experts that are licensed and educated not only in maintenance specific to your system, but national and local requirements as well.

In most cases fire alarm systems must be inspected at least once a year some may require a more frequent assessment. It really all depends on the type of business. During an inspection all components of the system will be tested so if something is not functioning properly, it will likely be taken care of at that time. Before an inspection you should notify the building occupants as the alarms will be tested and it gets noisy. Your alarm system company is the one who should contact the alarm monitoring station and local authorities in advance to avoid false emergencies.

Maintaining a functional fire alarm system is key to preventing potential catastrophe. It helps protect not only the physicality of your business, but everything that goes into running your business, i.e. you, your employees, company records, and equipment. If you ever consider cutting corners when it comes to fire alarm maintenance carefully consider the extent of what it might cost you if you do.

While as a business owner you may not need to know all the fine details of what goes into fire alarm maintenance, it is important to have a basic understanding of what you can expect when the time comes. For further information on fire alarm maintenance and inspections check out our related blog post HERE. If you run a business in northern or central New Jersey do not hesitate to call on our licensed technicians at Perfect Connections, Inc.. We have been providing comprehensive security system solutions including fire alarm installation and maintenance since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alfonso Pierantonio-Flickr-Creative Commons

Investing In Safety

Burglar-JohnImplementing a home security system can seem like a daunting task, but it’s an investment you won’t regret. People typically visualize the home break-in scenario where the masked intruder breaks a window setting off an alarm, ultimately sending the perpetrator on the run. A home security system is so much more than a triggered alarm, it’s a potential life saver in a variety of situations. We all like to imagine our homes are impervious fortresses of safety, but the reality is there are too many uncontrollable factors that could affect our daily lives. Home security allows you to be more prepared for those unpredictable situations.

Our licensed integrators at Perfect Connections, Inc. design and install comprehensive home security systems. We have been providing custom security solutions to residents in northern and central New Jersey for the past 25 years. Our systems protect people and property, offering a peace of mind that can’t be obtained from anything else. It is our belief that a comprehensive home security system should include a burglar alarm, video surveillance, home automation, smoke and carbon monoxide detectors, and a monitoring service.

Burglar alarms are likely the first thing that come to mind when thinking about home security. This is because they are a vital system component that helps keep you and your family safe from intruders. Not only do burglar alarms alert you and your monitoring station of a potential disturbance, they can deter would be thieves from even attempting a break-in or burglary. In a study by the Alarm Industry Research and Education Foundation (AIREF) 422 convicted burglars were asked about their decisions to burglarize. They found that approximately 60% would not make an attempt on a home or commercial property that they knew had and alarm system.

Having a surveillance system is an essential component of a comprehensive home security system. Cameras keep eyes on your property even while you can’t. The recordings can also help during an investigation after the fact if necessary. In the burglar study conducted by AIREF approximately 60% said cameras would be factor in their target selection with more than 40% reporting they would choose an alternative if cameras were present. Aside from being a deterrent and a forensics tool, home surveillance systems can often be remotely accessed via an app on your mobile device. This would allow you to check-in on specific parts of your home, see that your pets are okay during the day, or check-in on a loved one.

Remote access to your home security system is part of the abilities you are afforded when you have home automation. With home automation you can setup customized alerts so you receive notifications to your mobile device when your children arrive home from school, when an alarm is triggered, you receive a package, or there is a drastic temperature change in your home. Having remote access to your system helps you control certain parts of you home as well. Maybe you go on vacation and you forget to close your garage doors, if you have home automation it’s not a problem, you simply login to the app on your mobile device and close the doors. Depending on your system configuration you can arm or disarm your system, lock or unlock doors, control the temperature, turn lights on and off, and sometimes control appliances. Home automation offers convenience and connectivity you can’t get from anything else.

Smoke and carbon monoxide detectors are two of the most important life safety devices every home should have. The Centers for Disease Control and Prevention (CDC) estimate that every year more than 400 Americans die from carbon monoxide (CO) poisoning unrelated to fires. Carbon monoxide is a “silent killer” that is colorless and odorless, that is why it is so important to have working detectors in the home. Based on past data, in 2014, The National Fire Protection Association (NFPA) found that three out of five home fire deaths were caused by fires in homes that didn’t have working smoke alarms.

Statistics alone should be enough to convince any home owner to invest in these life saving devices. What makes them even more effective is if they are tied into your security system. That way when they go off or CO levels rise the central monitoring station will be alerted and if necessary they can send help right away. In situations where you might not be home or a loved one is home alone, it’s nice to know someone is still vigilant.

Monitoring services are the catalyst in security systems that initiate emergency responses. They are a key component that shouldn’t be passed up because of cost. You can’t put a cost on the lives of the ones you love or yourself for that matter. What good is an alarm if no one is alerted when it goes off? It might scare off an intruder, but do you really want to take that chance? During a fire or unpredictable disaster you want the fastest response you can get, right? That is where having a monitoring service proves its worth. It provides quick response times even when you are not home or incapable of responding.

Whether you’re new to the world of home security systems or have been considering one for a long time, it’s always a worthy investment. A comprehensive system will help protect not only your property but your life and the lives of your loved ones. Our team of licensed integrators at Perfect Connections, Inc. has been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992. We realize no two homes are identical and each one has individual security risks and concerns, which is why we custom design our systems to fit your needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by John-Flickr-Creative Commons

Hybrid Surveillance

Mike Mozart-surveillanceAs a business owner protecting your facility is always a top concern. Are you getting the coverage you need? If you have a comprehensive security system you’re already in a good position. However, a security system is only as good as the sum of its parts. One of the most crucial parts of a security system is the surveillance aspect. Surveillance systems are the eyes that keep watch over your business even when you can’t.

Like any other technology surveillance equipment is constantly evolving through research and development that is meant to improve its efficiency. In today’s IoT (Internet of Things) IP-based (Internet Protocol) systems are a driving force that is changing the role of surveillance in comprehensive security. But not everyone is so keen on the uptake. Prior to the inception of IP cameras and network devices the world was and has been dominated by analog cameras and DVR devices (Digital Video Recording). If you have existing surveillance equipment, chances are it’s a legacy analog system.

While the IP surveillance trend is picking up, there are still more than 40 million analog cameras in operation around the world today. Making the switch from analog to IP isn’t an easy transition for everyone and integrators have become increasingly aware. Fortunately there are hybrid solutions that allow you to work with your existing analog infrastructure and start your migration to an IP-based system. At Perfect Connections, Inc. our team of licensed integrators work with you to provide comprehensive security solutions that meet your needs. Our experts have been providing comprehensive security system solutions, including surveillance, to businesses throughout northern and central New Jersey for that past 23 years. We recognize the value technology adds to the security systems we install and how they can benefit our customers.

Why replace an analog system? To be fair, analog systems have filled a security need since the beginning of surveillance that would have otherwise gone unfulfilled. But just like any technology, progress is always pushing the envelope of what is relevant and effective. Look at smartphones, they are constantly evolving, every year a new model with new features that jettisons society forward. While businesses aren’t necessarily turning over their surveillance systems at the same rate, the growing trend is leaning towards IP and network based solutions.

Hybrid solutions for companies that aren’t ready to make the full switch to IP just yet offer the benefits of a more effective system that will ease the transition when the time is right. According to Mark Collett, general manager of Sony Security Systems Division, “With hybrid solutions, you can get the best of both worlds—the near-zero latency of analog plus IP’s HD imaging quality.”

Video encoders are the catalyst for the hybrid solution, replacing out of date and expensive DVRs. DVRs were traditionally responsible for storing and recording footage captured by connected surveillance cameras. According to James Marcella, a technologist in the security and IT industries, a video encoder is, “an open-platform technology that acts as a bridge between the analog and digital world by essentially turning an analog investment into IP cameras.” Video encoders would allow you to make use of existing infrastructure by attaching to the coaxial cable from you analog system, transforming the analog signal into a digital stream.

Many industry experts consider DVRs to be one of the most expensive pieces of equipment the consumer will purchase, and they are typically outlived by the analog cameras. Also, they are not dependable, if they go down so does the whole surveillance system, and this could happen at a critical moment. Video encoders are capable of running on power over Ethernet that can be tied to a backup power supply, keeping you covered no matter what. You can also employ redundancies like NAS devices (Network Attached Storage) and SD memory cards to help prevent recording loss.

DVRs lack the image resolution, edge intelligence, and network capabilities that a video encoder can offer. The frames per second rate (fps) is what creates a smoother clearer image, the higher the better especially in high motion scenarios. Video encoders are capable of capturing images at up to 60fps whereas DVRs only go up to 15fps. DVR intelligence is typically limited to whatever the manufacturer specifications have been set to. Video encoders open the door to third party intelligent applications which allow you to choose video management software from virtually any provider in the connected world. This creates a platform for advanced video analytics.

There is a large storage and scalability disparity between DVRs and video encoders. DVRs typically have a low tolerance for the quantity of cameras they can accommodate which can leave a business vulnerable by not being able to cover risky areas. On the other hand video encoders offer virtually limitless retention by being highly scalable. Video encoders have the ability to accommodate single cameras and there are some units that can accommodate up to 84 cameras making them a highly flexible and effective solution for a large or small facility.

The hybrid solution allows you to keep existing analog cameras and infrastructure and as the cameras die or warrant replacement, they can easily be swapped out for IP creating a smoother transition. Remote monitoring is another benefit to opting for a hybrid solution. This adds a level of security you can’t obtain from an analog system, being able to login to your surveillance system to see what is going on at your facility when you can’t be there.

Hybrid solutions are an economic and less disruptive option if you’re not fully committed to taking the IP plunge, even though progress will continue to push us in that direction. If you opt for a hybrid solution or aren’t sure what to do always consult a licensed professional to ensure proper application and installation. At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992. We can guide you through the process of creating a system that meets your specific needs, from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Mike Mozart-Flickr-Creative Commons

Moving To The Cloud

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds. These natural wonders are not the clouds we’ll be investigating here. Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it. Think about your everyday, do you use an internet based e-mail account, like Gmail? If so, then you use a cloud based service. So what is the “cloud”? Basically, the cloud takes recorded information and stores it on internet servers. Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet. In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that. While it is an exciting technology with seemingly endless applications, it is not without flaw. That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry? In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions. As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some. As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget. We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network set up and what are the benefits? In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service. Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced. According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.” Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers. If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device. Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency. As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com). It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department. This could help cut down on unnecessary manpower costs. And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology. Systems that rely solely on the cloud for recording and storage face some obvious risks. For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud. However, these outages are estimated to be no more than 4 hours per year. Fortunately there are inexpensive solutions to such an issue. To avoid losing any data a local recording device can be set up to operate for more than 4 hours. Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users. However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems. Business size is also a factor in the cost. Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required. So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations. Cloud access is another major concern for end-users. The question remains, what is stopping someone from hacking into my network? Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future. The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking. Once the dialogue becomes clearer the cloud has potential to become standard protocol. If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional. Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation. We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons

How Do Criminals Break Into A Home?

home-alone-marv & harryWhen you’re a homeowner one of your top priorities is ensuring the safety of your home. Your home is what protects you and your family. Nobody wants to deal with a home break-in but they are a sad reality in our everyday lives. Fortunately there are many ways you can safeguard your home from such devastation. The best way to deter crime is to be prepared for it. If you want to prevent a home invasion you must first understand how and when burglars are likely to attempt them. At Perfect Connections, Inc. our team of highly skilled professionals can assess the security risks specific to your home to help you avoid break-ins and other disasters. We have been providing security system services to homes throughout northern and central New Jersey for the past 23 years. Our experts assess the security risks of an individual home and come up with a customized security system solution to fit its specific needs.

What are some of the most common break-in methods used by criminals? Have you ever heard of the path of least resistance? That’s usually the route they will take when it comes to breaking into homes. There are many factors that can make their job easier, and you might be unknowingly aiding their attempts. Leaving windows and doors unlocked or open are a surprisingly common way burglars get into homes. In fact 30 percent of burglars enter homes without having to use force. Spare keys left in indiscrete locations are another favorite of the home invader. It’s tempting to have a spare key for family members or friends, but if you’re going to do so don’t leave it under the door mat or in other obvious and easily accessed spots.

Some crooks will walk right up to your front door, ring the bell, and if you answer they will pretend to be selling something. They’ll probably make up a bogus story about who they work for. Whatever you do, do not let them in and ask for identification or find the company number to call and verify their identity. Do not use a number they provide as it could be a ruse. When they’re putting on this act they’re trying to get a better view into your home to see if you might have a security system and what goodies they might come back for.

Sometimes criminals will ring the doorbell and if no one answers they might go to the back of the house to try to enter through a back door or window. Even if the doors and windows are locked burglars often carry tools like crowbars to aid their break-ins. However, if it takes them longer than a minute to get in they’ll likely move on to the next target. The harder you can make it for someone to break-in the better.

How can you make it harder or less appealing for criminals to break-in to your home? One of the best lines of defense is installing a comprehensive home security system. Burglars are less likely to attempt a break-in if the targeted house has a security system, it gives them less time to escape and a higher chance of being caught. In fact 90 percent of convicted burglars said they would avoid homes with alarm systems. Keeping vegetation trimmed is important in preventing a break-in. Burglars often use unkempt bushes, trees, or flora close to the home as hiding spots where they can sit and wait for an opportune moment.

Lighting is a great deterrent as well. Motion activated exterior lights are helpful because they somewhat eliminate the sneaky element by exposing whatever moves in their path. Using light timers or home automation to control your interior lights will help prevent an intruder from attempting a break-in. It’ll help create the illusion that someone is home even if they aren’t and burglars tend to avoid break-in attempts if someone is there. Installing deadbolts is another way to at least slow down an attempted break-in. Having a single door knob lock leaves you vulnerable to thieves who use things like bump keys. Bump keys are essentially master keys used by locks smiths, they can supposedly open up to 90 percent of traditional locks.

With a burglary occurring every 15 seconds in the United States, you can never be too cautious when it comes to protecting your home. At Perfect Connections, Inc. our experts provide customized comprehensive security systems that fit your specific needs. It’s not just about protecting the physical property, it’s about protecting that peace of mind that is so hard to get back after a break-in. Don’t fall victim to the mentality that it could never happen in your neighborhood, no community is immune. Instead be prepared and don’t be a victim.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Dexter Company-Google-Creative Commons

Video Surveillance Trends To Know

Video Surveillance-Christian SchnettelkerThe key components to a comprehensive business security system includes fire alarms, burglar alarms, access control, alarm monitoring, and last but not least video surveillance. That’s what this post will be focusing on. The development of video surveillance, its benefits, and where is it going in the near future. At Perfect Connections, Inc. we provide comprehensive security systems to businesses in Northern and Central New Jersey. Our experts understand the benefits of solid surveillance equipment, and always keep abreast the technological advancements being made in that arena.

Where did it all start?

It may not be on everyone’s mind on a daily basis, but in today’s society video surveillance is actually an integral part of our everyday lives. From ATM machines, to traffic lights, to drones, cameras seem to be everywhere. To understand where the concept for video surveillance came from, we have to look at the history and development of video cameras. Traveling back in time the first movie cameras were developed in 1880 by Thomas Edison and William Dickson. As a result the first motion picture demonstration took place in 1893. Into the 20th century camera development continues to move swiftly with Closed Circuit Television (CCTV) in Germany used for bomb monitoring in 1942. Charge-coupled device (CCD) technology in 1976 allowed for 24 hour surveillance because of its ability to work in low light. Skip forward to 1996 and you have the birth of the Internet Protocol (IP) camera. The IP cameras allow the sending and receiving of information across computer networks.

This ever-changing technology and various historic events, such as 9/11, have made video surveillance in public and private spaces ubiquitous worldwide. As pervasive and helpful as it can be in a protective sense it remains a controversial topic for some. The idea that government drones can stealthily record information on American citizens is a surveillance technique that does not sit well with some. What are your thoughts?

What are the benefits of video surveillance?

By installing a surveillance system you are adding a layer of protection for your business you can’t get anywhere else. We know you can’t be in more than one place at a time, but a surveillance system gives you eyes throughout your entire facility at all times. This helps curb issues such as employee theft. If employees know they’re being recorded, they’re less likely to misbehave. An economical benefit to a security system with surveillance is potentially saving money on your insurance. Many companies offer a discount for having a comprehensive security system (to figure out if you qualify contact your insurance provider directly). If you own a retail business you know shoplifting is an ongoing issue. The benefit of having recorded footage in retail is even if it doesn’t prevent the act of shoplifting, it can help catch the perpetrators. Surveillance can help prevent workplace violence by monitoring employee/customer behavior. Lastly, it’ll provide you with added peace of mind knowing you’re employees and business are being monitored.

Where is surveillance going?

As we’ve seen throughout history, technology has been a driving force in the development and advancement of video surveillance. Moving forward some industry professionals believe the next drive for security cameras is making their integration and functions easier for the end users. Some believe it’s all about upping the resolution factor. While higher megapixels would offer better and clearer images, it seems to be slow on the uptake because of the associated cost. Lastly, analytics is an emerging trend in surveillance systems, yet some still question it’s viability due to not only its cost but effectiveness. Aside from analytics that can people-count there is technology in the works that can supposedly detect individual aggression. How effective this feature can be is still up for debate among industry professionals. As technology pushes forward, camera development and integration will no doubt continue to change; how it will change us as a society, nobody knows.

If you own a business in Central or Northern New Jersey and are in need of a security system, looking to update your current situation, or unsure of where to begin do not hesitate to call on our team of professionals at Perfect Connections, Inc.. As security systems experts, our team has been providing service since 1992. We believe in providing comprehensive security systems that include video surveillance, access control, fire alarms, burglar alarms, and alarm monitoring. We are always keeping up with technology that is beneficial to our customers. System maintenance and installation should be seamless, as should updates and integration.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image By Christian Schnettelker-Flickr-Creative Commons

Wireless Locks For Your Home

Alan Cleaver-Key in doorLast week in our blog, we wrote about how your cell phone could be your key at your business. Now, we’d like to tell you how it could work for your home too!

The days of struggling to carry 50 pounds of groceries while simultaneously trying to dig your house keys out of your pocket or purse, might be coming to an end. As a homeowner your door locks have always been an essential line of defense when it comes to protecting your home. While our everyday lives are saturated with technological advancement, it only makes sense that our physical structures should follow suit. That being said, using a key to unlock your doors may be a thing of the past with wireless access control on the rise.

What is wireless access control? Essentially, wireless access control in a residential setting means replacing the standard lock and key with a keypad, remote control, biometric reader, card reader, or Wi-Fi access. Keys are no longer the only method for unlocking your doors, in fact, they become the back-up. At Perfect Connections, Inc. our team of licensed experts have been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992. We stay in touch with current technologies and how they might benefit our customers. Protecting entrances is key (no pun intended) to the safety and security of any home, and we aim to provide the best solutions to each individual residence.

How does a wireless lock work? Most traditional locks operate on some form of a “pin and tumbler” method. This is when the serrated edge of an inserted key moves pins on the interior of the lock a certain distance allowing you turn the lock cylinder and open the door. With a wireless lock (which typically operates on electricity or battery power) has “actuators,” which connect the cylinder or bolt to a motor within the door or frame. The motor is electrically activated by a keypad, card reader, or wireless remote controller. On top of that there are locks that work on Wi-Fi signals used in conjunction with your smartphone or mobile device, sometimes referred to as smart or automated locks. Lastly, biometrics are sometimes used to control home access. Typically a fingerprint or hand print is the credential required for such a system.

There are many advantages to a wireless locking system. For one, you never have to worry about losing or forgetting your keys. This eliminates having to leave spare keys outside or giving them to people who need access to your home. Instead of using a key you can, depending on the type of wireless lock, give your visitor the access code or with an automated system you can unlock the door from your smartphone. With a wireless lock there are no wires. Typically this means an easier and seamless installation. It’s a technology that would allow for a more ubiquitous integration that includes old and new construction homes. Wireless locks offer a convenience and extra layer of security you can’t get from a standard door lock.

While there are multiple benefits to a wireless locking system, none of them are perfect. With a regular lock you might lose your keys, with a wireless keypad lock you could forget your access code or the code could be hacked by a savvy burglar. Fortunately, if you forget your code many keypad locks come with a physical key as a backup. As for code hacking, it’s usually best practice to pick a random code, so don’t use a birthday or something easily guessed. It’s also prudent- and some systems may require it anyway-to change the code every few months or after you’ve let an outsider use it.

The main drawback with a remote controlled lock is, just as with keys, you could lose the remote. Unlike keys, a remote is usually programed by a computer. Therefore, in the event that you lose the remote you can deactivate it from the convenience of a computer. With a smart or automated lock you run into the issue of not always having a reliable Wi-Fi signal. Then there’s the dreaded question of what happens when the power goes out? As some of the wireless locks run on electricity, a power outage could be an issue. However, many of these locks tend to have multiple redundancies in place including backup battery power. The main deterrent when it comes to biometric locks is the price as they tend to be a fairly complex system that isn’t as pervasive in the residential market as the other technologies.

Whether you are building a new home or want to enhance the security of your current residence, wireless locks can reinforce your first line of defense and provide a convenience you can’t obtain with conventional locks. As with any security device or installation you should always consult a licensed security systems professional, especially if you’re looking for full system integration. At Perfect Connections, Inc. our team has been providing comprehensive security system solutions to homes throughout northern and central New Jersey for the past 23 years. We help you connect and protect what matters most, offering a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alan Cleaver-Flickr-Creative Commons

Using Cell Phones with Access Control Systems

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives. It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone. We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems. In particular as a means of access control and authentication in commercial applications using near field communication (NFC). According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…” This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey. We have been helping a wide range of businesses secure their facilities for over 20 years. As with any technology, progression in the realm of security components shows no signs of slowing. At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications. However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers. One of the many reasons being NFC technology has yet to become an innate feature in the spectrum of devices in circulation today.

In theory NFC access control would work by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential. The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control. This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord. Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access. Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike. Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night. It only makes sense that phones would become part of integrated security protocols. With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce. They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand. While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming. It also allows you to change credentials on and as needed basis. This would be helpful if you have a contract or temp worker who needs provisional access. You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials. Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification. So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user. If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving. Currently one of the major drawbacks is that it’s not universally integrated in mobile phones and access readers. Certain manufacturers like Apple and Google have yet to include NFC technology in their devices making the user purchase external accessories that can be bulky and unattractive. Then there are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons. The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

The world of security systems is constantly evolving. This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems. NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years. It will provide a new level of security and convenience that has yet to be fully realized. At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients. We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992. Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

Home Automation and Z-Wave Technology

Smart home AccessIn the wake of home automation, smart home, or connected home technology you may have come across the term Z-Wave technology. What is it? Z-Wave technology is, “a wireless technology that makes regular household products, like lights, door locks and thermostats ‘smart’.” It’s what allows your home devices to “talk” to each other and be controlled remotely via your mobile device. Why is this important? Well, if you have home automation or been considering it, it’s all about ease of integration, flexibility, and interoperability. Home automation and its perspective devices are an integral part of a comprehensive home security system. At Perfect Connections, Inc. our licensed integrators have been providing comprehensive home security solutions for the past 23 years. We believe in making your life easier and more convenient by providing technologies that not only operate effectively but help provide superior protection.

Having strong communication between devices is crucial to the efficacy of your system. It seems Z-Wave technology has the majority grip on the market as it stand today, one of the main reasons being it boasts communication capabilities for more than 1,100 products from over 300 different manufacturers. This is beneficial to integrators and end-users alike. The quantity of smart products that operate on Z-Wave technology opens the door to highly flexible smart home applications. This means you can outfit your entire house with automation devices that can be controlled from your central control panel or a single application on your mobile device versus having to control devices piecemeal because they don’t operate on the same technology.

According to Mark Walters, chairman of the Z-Wave Alliance, “…greater than 80 percent of the North American security company-based lifestyle solutions are powered by Z-Wave.” The wide breadth of automation product availability within the Z-Wave family provides immense system scalability for homeowners and integrators. Meaning your initial product installations are not finite. Security and automation devices can be added on an as needed basis. For example, you may start with automated door locks, lighting, and garage door control but you may find that with time your needs expand to temperature management, skylight controls, and/or guarding against potential water damage; it’s always nice to only have to go through the installation process once, but it’s comforting to know you have options after the fact. While most homeowners rely on the experts to properly install devices in their home, the range of Z-Wave technology products does open the door to a more DIY approach. However, it is important to note that it is always wise to consult a licensed security system integrator to ensure proper product installation and operation. This technology also provides an open platform for integrators and consumers who prefer products from a specific manufacturer, making it easier to get exactly what you want.

What about existing household technologies, will they be affected by Z-Wave home automation devices? Today our lives are inundated with technology, your home probably has a slew of devices that operate on Wi-Fi or Bluetooth. The potential issue with a house full of devices operating simultaneously is the communication disruption they can incur on one another. Luckily with Z-Wave technology you don’t have to worry about interference with or from other household devices. Its operational capabilities were designed specifically for home control. It’s a low energy consumption, bandwidth efficient technology that won’t inhibit other home devices. Z-Wave technology also has a vast international presence throughout Europe further expanding their territory for consistency, device compatibility, and home automation integration.

Home automation is a facet of comprehensive security systems that improves a homeowners posture in security. It is meant to improve lives through convenience and seamless integration. With home automation you can turn lights on and off remotely with the tap of your finger on your mobile device. You can arm or disarm your alarm system while on vacation. You can monitor an aging loved one who wants to maintain a level of independence by tracking their activity on your smartphone. Or you can use it to receive instant notifications of real time events like your kids arrival home from school. Like any system, home automation is only as good as the sum of its parts and the technology it operates on.

Z-Wave technology is the means by which many automation devices communicate with each other and the system as a whole. The strong hold it has on the market today seems to prove it’s effectiveness and dependability. It creates flexibility in product selection and system integration without interfering with existing household devices. Chances are if you already have home automation as part of your security system your devices operate on Z-Wave technology. This technology and the devices it encompasses show no signs of slowing down in our age of technological progression.

Our licensed integrators at Perfect Connections, Inc. have been providing custom and comprehensive security system solutions to homes throughout northern and central New Jersey since 1992. We believe in providing technologies that enhance your home’s security and home automation devices do just that. Home automation is part of a comprehensive security system which should include fire and burglar alarms, video surveillance, access control, and a monitoring service. We help your home security stay relevant and provide technology that improves your quality of life.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Domoalert Smart Life Quality’s photostream-Flickr-Creative Commons