Should Surveillance Systems Share A Network With Office Computers?

Network-Norlando PobreWhether you are installing a new surveillance system or changing an existing one you need to consider the type of system and the operating implications associated with it.  The desire for advanced image quality, video analytics, ease of integration, and remote access has ushered in the era of IP (Internet Protocol) surveillance systems.  IP surveillance systems have opened the door to a more integrated security system and they provide increased scalability which is important to company growth and future adaptation.  This type of surveillance system typically relies on an internet network, and as they say “therein lies the rub.”

Should your surveillance system operate on the same internet network as your office computers?  The answer is not a simple yes or no.  The short answer being it certainly is a viable option, but it could depend on the size and type of business you run.  It’s also possible to set up an IP surveillance system on its own network but it may not be cost effective or necessary.  For these reasons it is imperative to consult a licensed security system professional when altering or adding a surveillance system.

When it comes to a company’s network there seems to be some trepidation about how and what devices can and should be allowed on it.  It’s understandable, a company’s network is often a basis for its everyday functions, but where does the worry come from?  A lot of it usually has to do with a communication gap between security integrators and IT professionals or end users.  At Perfect Connections, Inc. our licensed experts are able to provide clear and understandable information about the surveillance equipment we implement and how it will affect your company’s network.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  Our team has witnessed and been a part of the migration from mainly analog surveillance to IP.

Let’s discover the common concerns about network devices and how they can be dissolved, but first we’ll review some quick terminology when talking about networks.  LAN, MAN, and WAN are three basic types of networks you’ll likely hear about from integrators and IT professionals.  Local area networks (LANs) are typically found at most small to medium sized businesses as they cover a smaller more specific area.  In all likelihood your company operates on a LAN network.  Metropolitan area networks (MANs) cover a larger area and are usually present in cities and across large campuses.  Wide Area Networks (WANs) provide the most coverage, anything from expansive distances to the whole world.  According to Fredrik Nilsson, general manager for Axis Communications in North America, WANs are often comprised of multiple smaller networks including LANs and MANs.

All networks are comprised of some sort of cabling and equipment such as switches, servers, and hubs.  The most popular type of network configuration used with LANs is called star.  A star configuration allows all network devices to be connected to a central point where if one device crashes the rest will remain in operation.  However, redundancies are typically incorporated to account for the possibility of a central station crash.

Now that terminology is out of the way, what are some of the major concerns one might have when adding surveillance equipment to a company network?  One of the most common is bandwidth consumption.  This often stems from companies that have had to deal with employees streaming or downloading videos via company networks which eats into the available bandwidth.  According to James Marcella, director of technical services for Axis Communications, IP surveillance equipment is wrongly accused when it comes to bandwidth consumption.  He says most IP cameras today can be customized to fit a company’s network and storage guidelines.  To help limit their consumption surveillance can be setup on a Virtual LANs (VLANs) which Marcella says, “prevents video traffic from grabbing the lion’s share of bandwidth.”

Then there’s the ever-present question, “what about hacking?”  In our world where virtually everything is connected through the IoT (Internet of Things), it’s hard not to worry about who can access private information and how that information is being protected.  Having surveillance equipment on the same network as your company computers may seem scary, but in reality, more oft than not, there are procedures in place to prevent hacker access.

When it comes to adding network devices and keeping the network safe authentication protocol and data encryption are key.  According to Marcella authentication protocol protects the network at the physical port level.  If someone were to unplug a network camera and try to plug in their own device, all “traffic” to that port’s switch would automatically be shut down as the foreign device wouldn’t have the proper authorization.  Data encryption is essentially creating a password to your network whether it’s wired or wireless.  This prevents someone from getting into your network or freeloading on your company’s internet.  Encryptions can be highly effective as long as they are not something obvious or easily guessed.

Lastly, network storage is a top concern.  This is often directly linked to bandwidth consumption concerns.  Due to high image quality of IP camera recordings it’s not uncommon for businesses to store video footage for longer periods of time.  Fortunately, with IP surveillance systems you don’t necessarily have to store recordings directly on the network.  For smaller installations there is the option to utilize in-camera storage through internal SD cards (Secure Digital Cards).  Network Attached Storage (NAS) devices and cloud-based systems are other viable options.  In order to determine which method is best for your company an evaluation of camera quantity and storage needs should be conducted.

Whether you are adding a new surveillance system or updating an existing one it’s imperative to consider the impact it will have on your company’s network, if any at all.  Always consult a licensed security system professional as they can help guide you or your IT department through the process from initial assessment to final installation.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We can help break down the communication barrier that sometimes creates apprehension when installing network devices.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Norlando Pobre-Flickr-Creative Commons

What You Need to Know About Fire Alarm Maintenance

Fire Strobe-Alfonso PierantonioFire is an unpredictable force that can wreak havoc on any business.  It is imperative as a business owner, facility manager, or building owner that the proper precautions are in place to help prevent catastrophe.  The NFPA (National Fire Protection Association) is a leading advocate in fire prevention and safety.  They’ve written numerous codes and standards that have been implemented nationwide.  These standards are designed to help reduce the risk and effects of fire.  In combination with local regulations, NFPA codes and regulations are what system integrators and contractors have to follow in order to pass inspection from local authorities.

While you no doubt have some sort of fire detection and/or suppression system in operation it’s important to maintain it in accordance with national and local requirements.  As a security systems integrator, our team at Perfect Connections, Inc. has been installing fire alarm systems in business facilities throughout northern and central New Jersey for that past 23 years.  We specialize in comprehensive security systems that include fire alarms as a major component to a fully functioning system.  We do offer maintenance and service contracts helping you preserve a system that will continue to pass annual inspections and work efficiently in the event of a fire.

What goes into fire alarm maintenance?  First off, unless you or your staff is trained and licensed, you must hire a licensed technician.  This will help avoid accidentally setting off any false alarms which can result in substantial fines.  A common starting point, whether the system is fairly new or if you moved into a space with an existing system, is to find out the systems age and maintenance history.  The age of a fire alarm system will help determine whether or not components need to be replaced and what type of maintenance might be required.

According to Mike Lohr, director of service marketing for SimplexGrinnell LP, “Systems between five and ten years old may experience component breakdown caused by harsh, but normal, environmental factors. Voltage fluctuations, temperature, and humidity may cause system failure or nuisance alarm problems.”  He notes that systems between 5-10 and 10-15 years can provide adequate “life-safety” responses, but those within the 10-15 year marks should be watched carefully.  This is even more important if you have a shoddy record of maintenance history as it could have been poorly taken care of in the past.

Aside from knowing the age of your system you have to take any specific regulations the local authority having jurisdiction (AHJ) might have into consideration.  While the NFPA provides codes and standards for the nation, the AHJ will likely have their own set of rules that are specific to the area they preside.  This means that even if your system meets NFPA standards it may not pass local inspection because of AHJ specifications.  For this reason it is imperative to hire experts that are licensed and educated not only in maintenance specific to your system, but national and local requirements as well.

In most cases fire alarm systems must be inspected at least once a year some may require a more frequent assessment.  It really all depends on the type of business.  During an inspection all components of the system will be tested so if something is not functioning properly, it will likely be taken care of at that time.  Before an inspection you should notify the building occupants as the alarms will be tested and it gets noisy.  Your alarm system company is the one who should contact the alarm monitoring station and local authorities in advance to avoid false emergencies.

Maintaining a functional fire alarm system is key to preventing potential catastrophe.  It helps protect not only the physicality of your business, but everything that goes into running your business, i.e. you, your employees, company records, and equipment.  If you ever consider cutting corners when it comes to fire alarm maintenance carefully consider the extent of what it might cost you if you do.

While as a business owner you may not need to know all the fine details of what goes into fire alarm maintenance, it is important to have a basic understanding of what you can expect when the time comes.  For further information on fire alarm maintenance and inspections check out our related blog post HERE.  If you run a business in northern or central New Jersey do not hesitate to call on our licensed technicians at Perfect Connections, Inc..  We have been providing comprehensive security system solutions including fire alarm installation and maintenance since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alfonso Pierantonio-Flickr-Creative Commons

What Is Remote Monitoring?

laptop monitor-Intel Free PressWhen you picture a surveillance monitoring station what do you see?  Is it a half awake guard staring blankly at multiple monitors?  If that’s the case you can scratch that image from your mind.  The future of monitoring services is quickly shifting and adapting to our society’s need for streamlined and efficient processes.  As surveillance systems migrate from analog to IP with megapixel network cameras, and our world becomes more and more connected through the IoT (Internet of Things), the desire to access and monitor footage from anywhere increases.  This is where the idea of remote monitoring comes into play.

Being able to remotely monitor surveillance footage from virtually anywhere is a convenience that, up until recently, hasn’t been a pervasive security feature.  It differs from alarm monitoring in the sense that a service representative isn’t necessarily waiting around for an alarm to go off, instead they are actively watching live recordings to catch potential disasters before they happen.  In the past a company would typically hire people to monitor cameras on site, which isn’t always the most economical or effective method.  Today, companies are using off-site monitoring services that have the ability to keep watch over multiple facilities 24/7.  In conjunction with that, business owners have the ability to download apps that allow them to access their surveillance footage at their convenience via a mobile device.

At Perfect Connections, Inc. our experts typically recommend a monitoring service as part of a comprehensive security system to help ensure its effectiveness.  Our team of licensed technicians have been providing security solutions to businesses throughout northern and central New Jersey for that past 23 years.  The technological climate is ever changing and we always do our best to stay on top of relevant trends that will benefit our customers.

Remote monitoring allows an individual or group of users to access surveillance footage through a secured network from virtually anywhere via a smartphone, tablet, computer, or mobile device.  Why is this beneficial?  It can help cut down, or eliminate entirely, the need to have an on-site staff staring at monitors, how effective can that be anyway?  According to Doug Marman, CTO of VideoIQ Inc. and founder of Remote Guarding Alliance, “…humans monitoring video screens grow fatigued to the point of ineffectiveness after only 20 minutes…”  Marman argues that the traditional method of monitoring surveillance is at best a practice in “hindsight” strategy.  Meaning by the time a reaction is made the damage is done or the perpetrator has already escaped.

Marman’s system of remote monitoring using a combination of video analytics and audio over IP, or voice over IP (VOIP), decreases response time and increases the ability to monitor a large quantity of cameras at once.  And in contrast to human attention span, video analytics are “100 percent vigilant.”  Marman illustrates the ability to interact with intruders instantly via audio over IP, citing how quick they are to abandon their criminal attempt when someone is calling them out over a speaker on site.  While audio interaction is an intriguing feature that allows for a virtual presence at all times, it may not be necessary depending on your type of business and your security needs.  What matters most is the ability to react instantly, reduce any lag time in response, and prevent false alarms as they typically result in fines and wasted essential resources.

With response time being one of the top benefits of remote monitoring it can also reduce overall monitoring costs, increase scalability options, and send notifications via e-mail or other media.  While the benefits of a remote monitoring system may eliminate the need to hire on-site staff, it doesn’t necessarily mean you should rely solely on self-monitoring.  If you were to take on the task of monitoring everything yourself, your business could be at risk.  Imagine you’re monitoring from a smartphone, it runs out of battery and you don’t have your charger handy.  What if you misplace your smartphone and miss an important notification?  Think about logistics too, as a business owner even you need to get sleep, you can’t be vigilant 24/7.

Having the ability to self-monitor should be looked at as an added layer of security, not your only means of protection.  According to Jerry Cordasco, vice president of operations for G4S Video Monitoring Support and Data Center, “A better choice for remote video surveillance is the use of a professional monitoring facility.”  Having a remote monitoring service provides a virtual presence 24/7 that can access real time footage and initiate the appropriate response immediately.

Security systems can be an effective crime fighters, but what good are they if an alarms goes off and no one is notified or made aware?  What good is a surveillance system that no one is monitoring?  You might get lucky and capture a license plate number that could eventually lead you to the perpetrator after the fact, but by that point the damage has been done.  The goal of a remote monitoring service is to provide timely and accurate responses to disturbances on site.

As a security systems provider, our team at Perfect Connections, Inc. understands the importance of immediate action.  Mere seconds can be the difference between prevention and disaster.  We have been providing comprehensive security system solutions, which include monitoring services, to facilities throughout northern and central New Jersey since 1992.  Every business has different security risks that is why we tailor our solutions to fit your specific needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Intel Free Press-Flickr-Creative Commons

How to Secure a Parking Garage

Parking Garage-David HilowitzThere are many architectural components to a business facility sometimes that includes a parking lot or garage.  Whether it is attached or detached, near or far from the main building it can be a convenient asset to any business.  It’s likely the place where you and your employees park in the morning and leave in the evening.  At some point in your life, whether you were at work or another establishment, you’ve probably had an uneasy feeling walking to your car.  But why?  Perhaps it had something to do with a perceived lack of security.

A parking lot or garage can often go overlooked when it comes to the security of an organization as it is not necessarily looked at as an actual part of the main building.  Often times organizations focus on protecting the areas people spend most of their time in, their office or interior work destination.  Sometimes a parking lot or garage isn’t even owned by the business it serves but rather an outside property manager.  However, parking destinations can often be high risk areas especially at night.  As a licensed security systems company our experts at Perfect Connections, Inc. assess the security risks of an organization as a whole.  We have been offering comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We understand not every business or location is the same, and with different locations comes different security risks.  Our team helps minimize risk by offering tailored security system solutions.

The risks associated with an unprotected parking lot or garage can be mitigated once brought to light.  Speaking of light, it is one of the most important safety factors in parking lots and garages.  As you’ve probably experienced at one point or another not all parking areas have adequate lighting, thus creating dark corners and easy hiding spots for potential criminals.  According to James Marcella, Director of Technical Services for Axis Communications, “The most effective deterrent to criminal activity is a well-lit area, because not only does it increase the ability for natural surveillance, it also improves the quality of recorded images from security cameras.”

Not only is it imperative for patrons to be able to see, but if something were to happen it’s crucial that security cameras record useable footage.  Lighting and surveillance tend to go hand-in-hand.  This means installing light fixtures that will provide ample illumination and an adequate CRI (Color Rendition Index) rating.  CRI ratings quantify the precision a light source has when it comes to reproducing color.  One of the best and overall cost effective options is LED (Light Emitting Diode) lighting.

While lighting is paramount, surveillance is key when it comes to catching criminal behavior, especially in parking lots and garages.  In our current technological environment surveillance cameras and equipment are becoming more efficient and advanced.  For instance, garage and parking lot environments are not exactly the cleanest or protected areas, therefore surveillance equipment has to be able to withstand harsher elements.

Fortunately there are cameras built specifically for such vulnerable settings.  Vandal-resistant cameras happen to be a surveillance solution in volatile areas, providing protection from both human and environmental elements.  They typically come sealed from dust and moisture right out of the box making them durable and increasing their longevity.  This helps cut down on long term costs of repairs or replacements.

Aside from being durable, ease of integration is becoming a pervasive quality in cameras and security equipment.  Today, end-users are starting to migrate from analog camera systems to IP (Internet Protocol) for their image quality, coverage, and scalability.  This opens the door to whole system integration where a garage surveillance system can be on the same network as the business it services, or at least that’s the idea.  With IP and cloud-based surveillance systems becoming more ubiquitous, clearer images and video analytics are sure to play an important role in the security of any infrastructure, including parking lots and garages.  It would help cut down on the need for physical monitoring services as well provide a platform for remote access via a mobile device or computer.

When enhancing the safety of your parking lot or garage it’s important to consider landscaping, signage, cashier booths and pay stations, and alert systems for the patrons.  Landscaping around a garage or lot should be well kept and vegetation should be trimmed low to maintain a clear line of sight.  There should be clear signage that improves way-finding and some that indicates the area is under surveillance.  Sometimes seeing signage is enough to deter criminal activity.  Cashier booths and pay stations are crime targets for obvious reasons, therefore they should be well-lit and have adequate surveillance coverage.  Alert systems can be a helpful added security feature that would notify patrons by text message of any issues or disturbances while they are away.

Whether you are the owner of a parking lot/garage or a patron it is critical to ensure its security.  It’s not just about being vigilant of your property, it’s about protecting you, your employees, and your patrons.  As every location has different risks you should always call on a licensed security systems professional to perform an in-person security assessment.  Our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey since 1992.  Our team is skilled at providing custom solutions tailored specifically to your needs.  We appreciate the complexities involved in protecting an organization as a whole.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by David Hilowitz-Flickr-Creative Commons

Changing Residential Access

Alan Cleaver-Key in doorThe days of struggling to carry 50 pounds of groceries while simultaneously trying to dig your house keys out of your pocket or purse, might be coming to an end.  As a homeowner your door locks have always been an essential line of defense when it comes to protecting your home.  While our everyday lives are saturated with technological advancement, it only makes sense that our physical structures should follow suit.  That being said, using a key to unlock your doors may be a thing of the past with wireless access control on the rise.

What is wireless access control?  Essentially, wireless access control in a residential setting means replacing the standard lock and key with a keypad, remote control, biometric reader, card reader, or Wi-Fi access.  Keys are no longer the only method for unlocking your doors, in fact, they become the back-up.  At Perfect Connections, Inc. our team of licensed experts have been providing comprehensive security solutions to homes throughout northern and central New Jersey since 1992.  We stay in touch with current technologies and how they might benefit our customers.  Protecting entrances is key (no pun intended) to the safety and security of any home, and we aim to provide the best solutions to each individual residence.

How does a wireless lock work?  Most traditional locks operate on some form of a “pin and tumbler” method.  This is when the serrated edge of an inserted key moves pins on the interior of the lock a certain distance allowing you turn the lock cylinder and open the door.  With a wireless lock (which typically operates on electricity or battery power) has “actuators,” which connect the cylinder or bolt to a motor within the door or frame.  The motor is electrically activated by a keypad, card reader, or wireless remote controller.  On top of that there are locks that work on Wi-Fi signals used in conjunction with your smartphone or mobile device, sometimes referred to as smart or automated locks.  Lastly, biometrics are sometimes used to control home access.  Typically a fingerprint or hand print is the credential required for such a system.

There are many advantages to a wireless locking system.  For one, you never have to worry about losing or forgetting your keys.  This eliminates having to leave spare keys outside or giving them to people who need access to your home.  Instead of using a key you can, depending on the type of wireless lock, give your visitor the access code or with an automated system you can unlock the door from your smartphone.  With a wireless lock there are no wires.  Typically this means an easier and seamless installation.  It’s a technology that would allow for a more ubiquitous integration that includes old and new construction homes.  Wireless locks offer a convenience and extra layer of security you can’t get from a standard door lock.

While there are multiple benefits to a wireless locking system, none of them are perfect.  With a regular lock you might lose your keys, with a wireless keypad lock you could forget your access code or the code could be hacked by a savvy burglar.  Fortunately, if you forget your code many keypad locks come with a physical key as a backup.  As for code hacking, it’s usually best practice to pick a random code, so don’t use a birthday or something easily guessed.  It’s also prudent- and some systems may require it anyway-to change the code every few months or after you’ve let an outsider use it.

The main drawback with a remote controlled lock is, just as with keys, you could lose the remote.  Unlike keys, a remote is usually programed by a computer.  Therefore, in the event that you lose the remote you can deactivate it from the convenience of a computer.  With a smart or automated lock you run into the issue of not always having a reliable Wi-Fi signal.  Then there’s the dreaded question of what happens when the power goes out?  As some of the wireless locks run on electricity, a power outage could be an issue.  However, many of these locks tend to have multiple redundancies in place including backup battery power.  The main deterrent when it comes to biometric locks is the price as they tend to be a fairly complex system that isn’t as pervasive in the residential market as the other technologies.

Whether you are building a new home or want to enhance the security of your current residence, wireless locks can reinforce your first line of defense and provide a convenience you can’t obtain with conventional locks.  As with any security device or installation you should always consult a licensed security systems professional, especially if you’re looking for full system integration.  At Perfect Connections, Inc. our team has been providing comprehensive security system solutions to homes throughout northern and central New Jersey for the past 23 years.  We help you connect and protect what matters most, offering a peace of mind you can’t get from anything else.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Alan Cleaver-Flickr-Creative Commons

Should I Move To The Cloud?

Pattys-photos-cloudsWe’ve all seen those puffy white, wondrous, water vapor creations up in the sky, commonly known as clouds.  These natural wonders are not the clouds we’ll be investigating here.  Instead we’ll be taking a look at what the “cloud” is in relation to business networks and their security infrastructure.

You may be using the cloud in some form already and not even know it.  Think about your everyday, do you use an internet based e-mail account, like Gmail?  If so, then you use a cloud based service.  So what is the “cloud”?  Basically, the cloud takes recorded information and stores it on internet servers.  Instead of taking up space on your computer or on a physical storage device your information is accessible via the internet.  In our physical world of limited space and the desire to streamline as much as possible, the cloud is helping achieve just that.  While it is an exciting technology with seemingly endless applications, it is not without flaw.  That being said, its benefits seem to outweigh its imperfections; and with non-stop progression in technology it can only improve with time.

Where does the cloud fit within the security system industry?  In security applications today, cloud services are becoming a presence in business video surveillance and access control solutions.  As security system components migrate towards a more cohesive integration the need for heavy wiring, cables, and hardware is dissipating making the cloud a more viable option for some.  As a licensed security systems provider our team at Perfect Connections, Inc. strives to utilize current technologies that make sense within an organizations facility and their budget.  We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

How is a cloud-based security network setup and what are the benefits?  In many cases a comprehensive security system is comprised of multiple surveillance cameras, some form of physical access control, fire and burglar alarms, and an alarm monitoring service.  Surveillance and access control are the areas where the cloud seems to have the most impact these days.

As end-users and integrators move away from analog and switch to IP surveillance systems the video cameras themselves are becoming more advanced.  According to Steve Surfaro, an Axis Communications’ Security Industry Liaison, “Many of today’s network video cameras are actually platforms or small computers, complete with solid-state storage and room for onboard security and video content analysis ‘apps,’ as well as enhanced image processing.”  Otherwise, in a cloud environment cameras are linked to a company’s network and record footage that is stored on encrypted internet servers.  If you think about it, it’s doing the same thing as a traditional surveillance system would as far as recording data and storing it, it’s just the means of conveyance that differs.

When it comes to access control linked to the cloud the possibilities include, but are not limited to, being able to control door, elevator, and card access remotely from a mobile device.  Being able to remotely access a system through a secured network in the cloud opens the door to a world of convenience and efficiency.  As surveillance and access control continue to be further integrated through wireless and IP systems, managing them with the cloud will likely become commonplace.

The benefits of using the cloud include reduced infrastructure, low system maintenance, low energy consumption, flexibility, scalability, and almost unlimited storage capabilities (Griffin, Joel-Securityinfowatch.com).  It helps eliminate the need to use multiple processes to operate a security system, potentially alleviating pressure on a company’s IT department.  This could help cut down on unnecessary manpower costs.  And the capability for remote software updates would eliminate the hassle on both the end-user and system integrator.

While there are many benefits to utilizing the cloud for video surveillance and access control, it is not a perfect system on its own; and it may take time before it becomes a pervasive technology.  Systems that rely solely on the cloud for recording and storage face some obvious risks.  For one, there is the potential for network outages.

According to Pierre Racz, president, CEO and founder of Genetec-a company focused on hybrid cloud solutions-it is likely that you will have network outages with the cloud.  However, these outages are estimated to be no more than 4 hours per year.  Fortunately there are inexpensive solutions to such an issue.  To avoid losing any data a local recording device can be set up to operate for more than 4 hours.  Implementing redundancies like NAS (Network Attached Storage) drives will also help eliminate any potential losses created by outages.

The initial cost of a cloud based system may also be a deterrent to end-users.  However, Racz points out that the maintenance costs for a cloud-based system are far lower than maintaining the extensive hardware that comes with more traditional systems.  Business size is also a factor in the cost.  Cost will vary depending on how many cameras, how much bandwidth, and other equipment is required.  So while a cloud-based system may not initially make sense for a high-rise office building, it may make sense for a singular business or a company with multiple small locations.  Cloud access is another major concern for end-users.  The question remains, what is stopping someone from hacking into my network?  Industry experts believe this concern can be eliminated based on the high level of encryption used to authenticate users.

Even though there might be a few technical hitches with cloud integration in the security industry today, it promises to be more ubiquitous in the near future.  The communication gap between end-users, integrators, and industry professionals on the best way to implement this exciting technology is shrinking.  Once the dialogue becomes clearer the cloud has potential to become standard protocol.  If you are considering making the switch to a cloud-based system or hybrid solution be sure to call on an industry professional.  Our team at Perfect Connections, Inc. can guide you through the process from initial assessment to final installation.  We have been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We’ve been able to adapt our services based on the ever changing technological climate, implementing what is best and makes sense for our clients.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Pattys-photos-Flickr-Creative Commons

Can My Cameras See In The Dark?

West Midlands Police-Infrared FootageNot all surveillance cameras are created equally.  It may seem as simple as selecting a surveillance camera and popping it into place, but what about the external factors that affect the quality of recorded images?  One of the top concerns for industry professionals and end-users alike is a cameras ability to function in the dark or varied light conditions.  Whether you’re using interior or external cameras, their ability to function under varied light conditions is paramount.  Our experts at Perfect Connections, Inc. understand the importance of a surveillance system that doesn’t quit when the sun goes down.  We are a licensed security systems company that has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.

What challenges do different lighting conditions pose to surveillance cameras?  The most obvious is the absence or lack of light.  Unless your cameras are True Day Night it is likely that they will not be able to pick up fine details in the lack of light.  Another common issue is the effect of light glare.  Problematic glare can come from car headlights to poorly placed exterior lighting fixtures.  Glare will disrupt the sensors in the video camera and the recorded footage can be rendered useless.  It is important to take lighting conditions into consideration when choosing and installing cameras as it will impact the overall effectiveness of your system.  What good is a camera that captures grainy unclear images or blanks out for seconds at a time?

Fortunately there have been vast improvements in the surveillance industry that are changing the game when it comes to light adaptation capabilities.  According to Greg Peratt, Senior Director of the Panasonic Video Solutions Integration Team, there are IP (Internet Protocol) cameras that can capture detailed footage in lighting less than .01 lux illumination.  Lux illumination is the metric measurement for how much light falls on an object.  A measurement of 1 lux, “equals the amount of light that falls on a one-square-meter surface that is one meter away from a single candle.”  Therefore a camera that can capture detailed images in less than .01 lux illumination is not only impressive, it’s advantageous.

Another helpful advancement in the case of low or varied light is the Infrared Cut-Filter Mechanism (IRCF).  This filter is automatically lifted or lowered in front of the camera’s sensor depending on the light levels.  The IRCF helps block out disruptive infrared light that can come from sunlight or certain lighting fixtures and it ultimately improves the camera’s low-light performance.  When light levels are low-typically at night-is when the filter is automatically lifted from in front of the sensor.  Cameras that have this feature are considered to have True Day Night capabilities.

The only hitch with this technology is color is often distorted or lost completely.  However, the camera is still able to capture a clear black and white image and according to Steve Carney it captures an image, “…that is not only vastly more usable but also cleaner without chroma noise.”  Carney points out another differentiator between True Day Night cameras and the impersonators is what happens when the IRCF is lifted or removed.  In a True Day Night camera a piece of “dummy” glass will take the place of the IRCF in order to maintain focus and, “minimize the spectral offset between visible and IR light.”  In other cameras the ability to remove such a filter doesn’t exist, therefore the full spectrum of visible and infrared light cannot be taken advantage of.

Other features to look for when considering Day Night cameras are the shutter speeds and any tinting on the camera housing.  Varying shutter speeds affect the amount of the light that is able to be captured.  The slower the shutter, the more light is captured which isn’t always better.  Often times a camera will come with a domed or “bubble” exterior housing.  These “bubbles” can sometimes be tinted.  Depending on your application you may or may not need tinting; sometimes the tint can have an adverse effect by decreasing visibility and obstructing image clarity.

Whether you are replacing older interior/exterior cameras or installing new, your best solution is to call on the experts.  Every business and facility is different which means each will have different requirements when it comes to day/nighttime surveillance.  Having a licensed security professional do an in person assessment of your facility will help determine what type of camera should be implemented and where.  Our team of licensed professionals at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and facilities throughout northern and central New Jersey since 1992.  We believe in personalized service that tailors solutions to your individualized needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by West Midlands Police-Flickr-Creative Commons

Making the Switch from Analog to IP

If you’ve had a surveillance system installed within the past decade it’s more than likely that it’s either an analog or IP (Internet Protocol) system.  So what’s the difference?  Analog typically refers to an older technology that doesn’t use Ethernet protocol.  IP includes “IP-addressable items,” the cabling, and network equipment used to connect all components to an Ethernet networked system.  As people transition to a fully digital IP system there is some overlapping of the two technologies creating hybrids.

Making the switch from analog to IP isn’t always as daunting as it may seem and there are options that make the transition easier over time.  Our licensed professionals at Perfect Connections, Inc. have the expertise to address your security needs.  We have been providing comprehensive security system solutions to organizations throughout northern and central New Jersey for the past 23 years.  We understand the complexities of installing and updating security systems including the surveillance equipment.

So why make the switch from analog to IP?  For one, a fully digital IP system will have improved performance over an analog system.  Many IP cameras are equipped with features like, “advanced digital signal processing, optical zoom lenses, wide dynamic range, on-board analytics and auto image stabilizers…” These features in conjunction with high resolution megapixel cameras provide better coverage and the ability to cover more area with less cameras.  Being able to expand or re-configure, also referred to as scalability, comes easily with an IP system.  This is an advantage to any organization especially one that plans on expanding or renovating in the future as the initial investment cost isn’t lost in the process.

With IP surveillance systems comes advanced analytics.  That means footage can be monitored, recorded, interpreted, archived, and retrieved by the central server as well as peripheral devices.  How is this beneficial?  It helps when looking for specific recordings as a search can be initiated versus having to view hours of useless footage.  If an alarm is activated this type of intelligence can be used to zoom in on what is setting it off which cuts down on time looking for what it might be.

There’s also a flexibility that comes with converting to an IP system.  It makes system integration easier when it comes to adding features like access control, alarms, and extra cameras.  You also have more of a reason to store a higher volume of footage with an IP system because the image quality is clearer and be accessed easily.  Having an IP system allows for ease of software upgrades which helps keep it relevant.  In that sense IP is worth the initial up front cost as it is more adaptable to future technologies and won’t require extensive re-cabling and labor in years to come.

Does this mean you have to completely abandon your analog system all at once?  Not necessarily.  As each system is different the only real way to tell what will need to be done is to hire a security systems expert to do an in person assessment of the current situation.  One option might be to use the existing analog equipment and simply add converters to the camera and network switch ends of the cabling.  This creates a sort of hybrid system where you’re using existing coax cable from the analog system but the converters allow you to add IP cameras; they don’t have to rely on your company’s network and can still be recorded on your DVR, NVR, or VMS (Digital Video Recorder, Network Video Recorder, and Video Management System).

The benefit to a hybrid system is you don’t lose out on the initial investment of the original system and it allows for easy add-ons, upgrades and replacements of IP technology.  The other option is to completely remove all analog devices and cabling and start over with a new IP system.  Sometimes IP systems can utilize existing analog infrastructures so that could be an alternative to starting from scratch.  Remember if you have an IT department at your facility it is important to include them in the process to ensure a seamless integration.

Whether you’re looking to upgrade to and IP system all at once or try the hybrid approach it’s key to include a licensed security systems expert from the beginning.  They can help guide you through the process from start to finish.  Our team at Perfect Connections, Inc. have been providing expert security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand that each facility is unique and requires individualized security solutions.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

What Are My Access Control Options?

Steven DepoloWhat is access control?  In the simplest of terms it can be explained as a means to allow or deny entry to or exit from a designated space.  Think of the kinds you likely use on a daily basis, a key to lock or unlock your front door or an electronic gate that lets you into the parking garage at work.  But what does it mean, what are the options when it comes to business integration and security systems, and why might your facility need it?  As licensed security systems providers our team at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for the past 23 years.  We have extensive knowledge and experience in creating comprehensive security systems that often include some form of access control.

Before looking at the different types of access control available it is important to understand why it may be necessary in the first place.  In most cases access control is used as a layer of protection.  What warrants this added layer of protection is subjective.  It could be company assets, valuable materials, sensitive or confidential information, medication (assisted living or healthcare facilities), staff and employees, or any combination of these items.  Regardless of what needs protection, the point is it warrants reinforcement.

The most simplistic and ubiquitous form of access control is a door lock and key.  While this system is effective at creating a temporary barrier, it is not sophisticated enough to prevent a break-in on its own.  Consider how easy it is to lose a key or duplicate one for that matter.  An experienced burglar or criminal could easily pick a standard lock.  This is why many companies turn to more advanced technologies typically provided in conjunction with a comprehensive security system.

An access control system (ACS) consists of the user being issued a “credential” which is then used on an electronic reader typically at the point of entry or in close proximity.  A credential can consist of any predetermined physical item like a plastic ID card or token that is embedded with the appropriate access information.  When it is swiped, tapped, or within range of the electronic reader, access or exit will be permitted.  According to SecurityMagazine.com, “A credential is presented to an electronic reader that gathers information stored on the credential and compares it to preset parameters and information stored in the ACS computer.”

A fairly common form of access control is using a keypad and PIN number or code.  When used individually this type of technology is not always effective.  PINs can be easily stolen by an onlooker observing you entering it.  Wear and tear on the same digits on the keypad can also be a dead give-away to someone looking to gain entry.  When used in combination with other access control methods a keypad can become more effective as an added layer of security.

One of the most secure and pervasive electronic technologies being implemented in the access control industry today is proximity technology.  How does it work?  Basically a plastic card or token (fob) is embedded with an electronic chip and antenna.  The internal chip is coded and when presented within range of the electronic reader the code is transmitted.  If the code is recognized and verified by the reader access will be granted.  The obvious downfall of this type of system is if you were to lose your card/token or if it were stolen.

Looking toward the future a less popular form of access control is sitting on the back-burner.  Biometrics.  According to Steven Hausman biometrics involves, “analyzing physiological and/or behavioral characteristics of the body, both classes of which would be presumably unique to an individual, and thus more reliable than traditional methods of verifying identity.”  This could be anything from fingerprint to vocal recognition.  This technology isn’t as widely used as some of the more traditional forms of access control because of its cost and reliability issues.  Although it may be difficult to replicate physical traits, it can be done.  The television show “Mythbusters” proved that fingerprints can be replicated using latex and ballistics gel.  While this technology may have some kinks to work out, it’s something to keep an eye on in the future.

There are many viable options when it comes to access control integration.  When combined with a comprehensive security system access control technologies become more effective at deterring crime.  A comprehensive system includes not only access control but video surveillance, fire alarms, burglar alarms, and alarm monitoring.  Our team at Perfect Connections, Inc. has been providing access control and security system solutions to businesses throughout northern and central New Jersey since 1992.  We understand you have many concerns when it comes to the security of your business, and we are here to help guide you through the process from an initial assessment to final installation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Steven Depolo-Flickr-Creative Commons

What Does Megapixel Mean In Security Cameras?

If you’re in the market for a security system a major component you’re probably considering is video surveillance.  While doing a little research you’ve likely come across a plethora of surveillance options with various technological features.  It may seem like a daunting task to choose the cameras that suit your needs, which is why you should always consult a licensed security systems professional.  They’ll be able to assess the security risks associated with your facility and provide optimal solutions.  Our team at Perfect Connections, Inc. has been providing comprehensive security systems to businesses throughout northern and central New Jersey for the past 23 years.  We understand the process and can help you protect what matters most.  Our experts are knowledgeable in all aspects of security system integration including surveillance.  Whether or not you’ve done your own research it’s likely you’ve heard or come across the term megapixel.  What does that mean in regards to surveillance systems, and what are the advantages/disadvantages?

640px-Definitions_of_TV_standards To understand the relationship between megapixels and video surveillance let’s first figure out what megapixel means.  A pixel is a “picture element residing on the image sensor (in a camera).”  The quantity of pixels helps determine the resolution of an image.  All megapixel cameras have a minimum of 1,000,000 pixels which means the image is comprised horizontally and vertically 1,000 x 1,000 pixels.  In recent years there has been an increased demand for megapixel surveillance cameras over the standard definition cameras widely used in the past.  Standard resolution cameras typically have a resolution of approximately 400,000 pixels.

To get an idea of the difference between image resolutions the picture above shows three variations.  The front image shows a standard resolution of 576 pixels, the middle shows an HD (High Definition) resolution of 720 pixels, and the last image shows an HD 1080 pixel resolution.  While most consider all HD cameras to fall under the megapixel category Raul Calderon, senior vice president of marketing for Arecont Vision, says that HD cameras with a 720 pixel resolution are not technically a megapixel camera as the resolution only adds up to 921,600 pixels.  A major difference between HD and megapixel cameras is HD cameras have to comply with set standards whereas megapixel cameras simply refer to the number of pixels.

A major advantage to investing in megapixel camera technology is the ability to use less cameras to cover larger areas.  With standard definition IP (Internet Protocol) or network cameras coverage is significantly limited and typically requires more cameras and cabling.  Megapixel cameras require less cabling and therefore the cost of labor and cabling is typically less than installing standard resolution cameras.  The ability to digitally zoom-in on an image without losing clarity is another benefit of utilizing megapixel cameras.  Megapixel recordings are clearer than standard resolution cameras therefore more consumers are storing footage for longer periods of time, which can be helpful in solving crimes.  They decrease the need for constant live monitoring as the footage can be revisited with ease.  Other benefits include a long lifespan, they conserve energy, and they are low maintenance.

Megapixel cameras not only benefit the owner but different industries as well.  With more quality recorded footage being stored the more the recording and storage industries will grow.  As megapixel cameras become more ubiquitous, technologies used in conjunction with them will grow and change.  For example the types of video displays and lenses will likely become more developed.  While there are many benefits to megapixel cameras the potential drawbacks include initial cost of installation and the challenge of keeping up with the fast paced technological changes.  Fortunately, as these types of cameras become more widely used their pricing will be driven down.  As far as technological advancements are concerned there will always be changes and improvements it’s a matter of security system experts providing ease of integration and updates.

While you now have a little background on megapixel cameras and their advantages/disadvantages, it’s still imperative to contact a licensed professional for your security needs.  They’ll be able to assess the specific security risks associated with your facility and which products will work best.  Our team of experts at Perfect Connections, Inc. have been providing professional service to businesses and facilities throughout northern and central New Jersey since 1992.  We understand the complexities involved in creating a comprehensive security system that is tailored to your needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Raskoolish at ru.wikipedia-Google-Creative Commons “Definitions of TV standards” by Raskoolish at ru.wikipedia. Licensed under CC BY-SA 3.0 via Wikimedia Commons http://commons.wikimedia.org/wiki/File:Definitions_of_TV_standards.jpg#/media/File:Definitions_of_TV_standards.jpg