Is Your Security Provider Licensed?

There are many reasons to make sure the person you hire to do a job is qualified. When it comes to installing camera systems, it’s the law.Video Surveillance-Christian Schnettelker

In New Jersey, a professional surveillance system installer needs to be licensed by the Fire Alarm, Burglar Alarm, and Locksmith Advisory Committee. According to Eric Marcy at Wilentz Attorneys at Law, “many local Informational Technology Companies have begun to dabble in installing CCTV monitoring as part of their product/service offerings.” While it may make initial sense to hire an IT professional to install network-based cameras, they may lack many of the qualifications that a licensed surveillance system installer has due to the training required to obtain the proper license.

Eric Marcy also states that “While Information Technology businesses may find the installation of CCTV and surveillance systems a natural extension of the services the business may offer, failure to have a proper license for such services will result in legal exposure and penalties. Prior to any Information Technology firm from offering, marketing or providing such services it should fully investigate the requirements necessary to allow it to provide such services. IT companies would be well served to consult with counsel to review the proposed services and proposed marketing to insure that the IT firm is not in violation of State law. ”

If you’re not sure if the person or company you are hiring is licensed, you can verify on the NJ Division of Consumer Affairs website.

If you live in Central or Northern New Jersey and are considering installing cameras in your home or business, please call 800-369-3962 or simply CLICK HERE. Our licensed integrators at Perfect Connections, Inc. have been providing custom and comprehensive security system solutions since 1992.

Smart Homes and 5G – How To Stay Protected

For those who own alarm systems, whether they are video surveillance, access control, burglary, or fire protection, our systems watch over us and protect us around the clock.

But in today’s day and age, just about everything is connected to the internet. In many cases, this includes our alarm system. And like any device that is connected to the internet, if not taken care of properly, it can be at risk of attack from hackers. With the upcoming launch of 5G, it is extremely important this year to protect anything connected to your home network.

“Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks” said a news piece by the Wall Street Journal. Many times, these cameras were infected by pre-compromised routers that already existed.

Here are some tips about how to protect your alarm system as well

Router security:
We recommend using WPA2 security for your router. Most routers, unless they are fairly old, are capable of this type of security. For more information on this, check out your router’s brand’s website – Belkin, Linksys, and Netgear are common brands.

Firmware updates: It is very important that any device that connects to the internet, from thermostats to alarm systems to routers to televisions to computers, always has the most up to date firmware. Each device’s manual or website will have instructions on how to do those, and if there is a phone application that interfaces with the device, you can often do it through the application.

Password protection: Many devices come with generic user names and passwords. These are easy targets for hackers. Make sure you change any default passwords, and try not to use the same password on multiple devices. It is most important that this is done on the router.

New hardware:
According to Kenneth White, a security researcher and director of the Open Crypto Audit Project, “If the company that made your [device] isn’t selling that model anymore or offering security updates, that’s a good sign for you to throw it in the trash.”

How Lighting Affects Your Video Quality

When it comes to surveillance cameras, visibility is key.  Some of the obstacles surrounding a camera’s capability to retain high video quality such as lighting, camera installation, and type of camera are somewhat within our control, others are not.  Uncontrollable issues of extreme brightness, like light produced from headlights and the sun, or extreme darkness are not necessarily easily overcome.  However, as with anything, technological progression helps change these harrowing limitations.  As industry professionals our team at Perfect Connections, Inc. has been providing security system solutions, including surveillance, to organizations throughout northern and central New Jersey for over 25 years.  We’ve seen the impact changing technology has on the equipment we install and how it can be beneficial to our customers.

Surveillance systems are in the midst of a transition from using conventional analog equipment to IP (Internet Protocol).  Why? For one, image quality.  The tricky thing with IP cameras is not all are created equal.  There isn’t necessarily a defined industry standard that is accepted by all integrators and camera manufacturers when it comes to “best” image quality.  For example some might argue that the higher the megapixel count the better, but it doesn’t necessarily guarantee a better image.  At least with HD (high definition) cameras there are standards manufacturers must comply with in order to be considered HD.

Aside from pixel count, an IP camera’s display threshold in extreme conditions is critical, but limited.  This limit, specifically when referring to extreme brightness or darkness, is typically known as “dynamic range.”  Wide dynamic range (WDR), “allows cameras to capture much more detail in scenes where there are varying levels of light, much like the way the human eye ‘processes’ these types of scenes.”  You know the feeling of widening your eyes in the dark to try to see clearer because you’re eyes haven’t quite adjusted yet?  It’s sort of the same idea with WDR cameras and how they adapt in both light and dark conditions.  However, their adjustments aren’t a physical strain and transitions are typically quicker than ours.

WDR footageThe images above show the difference between a parking garage being monitored by a camera with no WDR or WDR turned off on the left, and on the right the same area monitored by a camera with WDR enabled.  The difference is clear as day.  Why do they differ so much?  The camera with the WDR enabled has two internal Charge-Coupled Devices (CCD).  The two devices, or sensors, scan an image at different speeds, one low and one high, the image processor then combines the separate images producing a clearer, more balanced picture with better contrast and lighting.  This process happens quickly enough to produce a stream of clear recorded footage.  There are many different manufacturers that produce these WDR cameras in the market today, and not all of them use the same type of sensor and image processing combinations.  The best way to ensure you are getting the best camera for your specific application is to hire a licensed security systems integrator who is educated in which camera specifications will work best in variant conditions.

WDR technology, like anything else, is not perfect.  Depending on the camera manufacturer, you could end up with a camera that takes up to 15 seconds to adjust with varying light levels.  That doesn’t sound like that long, but it could mean the difference between catching a perpetrator and them getting away.  Another issue you might run into are cameras that don’t have the ability to turn WDR settings on and off automatically.  Without the automation the transition becomes the responsibility of someone on site, which can be time consuming and ineffective in a time sensitive situation.  This is why it is vital to consult a professional security systems integrator who is educated in the differences between product specifications and their appropriate applications.

The clarity of recorded video footage is crucial to the security of any organization.  As a business owner you don’t want to be left wondering why your recordings are grainy, washed out, or so dark they become unusable.  No one can control the external factors that affect an organization, but you can be prepared for them by taking the proper precautions.  Licensed system integrators are there to help.  Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We recognize the importance of utilizing quality security products that not only perform well but perform to their intended specifications.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by IQinVision-Google-Creative Commons

What’s Missing From Your Security System

Missing puzzle pieceWhile businesses have a lot to offer, many are lacking the protection they need.  No I don’t mean stowing an arsenal below your cash-wrap, but rather an effective security system and security features.  At Perfect Connections, Inc. we can help you protect what you’ve worked so hard for.  If you run a business in central or northern New Jersey, let us assess your security risks and provide a custom solution to fit your needs.  Many don’t know what they are lacking and how it can be rectified – our licensed professionals can help in that arena.  Don’t fall victim to preventable disasters – find out what a comprehensive security system can do for you and the health of your business.

What’s lacking?

An incomplete security system is a bit like working on a puzzle with missing pieces.  There are essential features that should be included in a comprehensive security system.  Maybe you already have a security system installed at your business, but is it monitored?  What good is a security system if no one, except those in the area, is alerted when the alarm goes off?  Having a 24/7 monitoring service as part of your security system is crucial for the quickest response times.  Surveillance equipment can also help deter employee theft which is, “the fastest growing crime in America,” according to the FBI.  Employee theft costs businesses up to $200 billion each year.  Installing surveillance equipment not only in the main customer space, but in offices, storage, and inventory spaces can help decrease chances of employee theft and misconduct.

Other areas that tend to be overlooked or under-protected are doors and safes.  While a door typically locks, if it’s not sturdy and linked to an alarm, what’s preventing someone from kicking it in?  To protect your entries, exits, and interior spaces be sure that your doors are not only sturdy and alarmed but protected by some sort of access control.  Whether it’s a swipe card, key fob, passcode, or some form of biometrics, access control will help prevent unwanted entrants.  Safes that are out in the open and easy to grab or crack open provide minimal protection for whatever is in it.  If you’re going to store valuables or cash in a safe at your business be sure it’s secure either bolted to the ground or in a fortified room.

Inadequate protection from fire and carbon monoxide can be a killer for any business.  Having detectors and alarms may not be enough if they don’t communicate with emergency services.  It’s the same idea as the unmonitored burglar alarm, if no one is around to hear the detectors go off a fire could easily escalate to the point of no return.  For the quickest response time, fire alarms and detectors should be linked to a monitoring service that communicates with emergency services.  Proper fire alarms, smoke and carbon monoxide detectors should be an integral part of a comprehensive security system.  Your business is likely your livelihood, protect it.

There are few certainties in life, but taking initiative to protect what you’ve built by installing a comprehensive security system is guaranteed to help.  No two businesses are the same, therefore no two security systems will be the same.  At Perfect Connections, Inc. we believe in customizing security solutions for each individual business based on their specific needs.  As security systems experts we have been providing security solutions to northern and central New Jersey businesses since 1992.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Protecting Your Employees After Hours

When running an office, it is important to make sure that you are keeping your staff both happy and safe, but feeling confident that you are keeping them safe can become difficult when they stay late at night. If keeping your staff who go want to stay late is something of concern for you, there are a couple of things you can do to ensure that they will not be at risk if they stay late, and especially if they are staying alone.

One thing that can be done to ensure your employees’ safety after hours is to make sure that there is a clear plan for those who are last in the office. It can be helpful to create a system in which the last few people in the office make sure to notify each other that they are the last ones, and also that they notify others of when they are leaving. Along with this, it can be helpful to make sure that either all doors are locked, or that only one is left unlocked when there are fewer people left. This helps to make everyone aware when they are alone and when there are less people in the office later at night.

Another thing that can be done to ensure office safety for those who work late is to install a security camera system at the entrances to the office. This provides two layers of security because it is a deterrent for any unwanted visitors who may attempt to come into the office, and it also records anyone who is entering and exiting the office.

Key Card System

Image from Safe Tech

An additional layer of security that can be applied is a key card system. In this case, employees can be given key cards that will unlock doors to the office. In this case, the doors to the office can remain locked from the outside at all times, or just during certain hours of the day. This would not only provide security after hours, but would also have the potential to provide security during the day if this was something that you chose to apply to the office around the clock. This is also something that can be coupled with a security camera system for additional security.

Both the combination and individual use of all of these systems can help to secure your workplace, especially for employees that stay after hours and are sometimes left at the office alone, and can give you the peace of mind that your workplace is always a safe place.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

How Using Edge Technology Can Secure Your Business

Todd Huffman-SurveillanceWhen it comes to security systems you may have heard the term “edge technology,” “edge analytics,” or “edge devices.”  What exactly do these terms mean and why are they important?  When talking about security systems “the edge” is typically used when referring to video surveillance components.  Every security system integrator and industry professional will likely have their own definition of what it means, but in summary “edge technology” refers to surveillance devices that operate, analyze, and record at their source versus transmitting all that information over a network to the system’s core.  In traditional surveillance systems there is a central server where recorded data from peripheral devices is stored and analyzed.  In an edge-based system cameras perform these functions locally.

Why is this pertinent information?  Depending on your specific situation, using edge-based technology can provide more efficient surveillance processes and enhance the overall effectiveness of your security system.  As every situation is subjective, a licensed security systems integrator should always be consulted when determining what type of components will serve your business best.  At Perfect Connections, Inc. our licensed security system integrators are committed to providing comprehensive security systems that exceed your expectations.  We have been installing comprehensive security systems at businesses throughout northern and central New Jersey for over 25 years.  We know how to assess your security needs and implement relevant technologies that will help keep business running as usual.

Surveillance components that can be considered on “the edge” are IP cameras, video encoders, and network attached storage (NAS) devices.  These devices have recently become more advanced and their capabilities that were once unique to the central server of the security system continue to improve.  According to Steve Gorski, general manager at Mobotix, “Edge-based surveillance solves the bottleneck problem by using the camera to decentralize intelligence and video data.”  This means the cameras themselves are more intelligent and effective.

Edge-based technologies allow for higher image resolutions and the ability to compress them without the loss of image quality.  Even with the use of high resolution IP cameras becoming more commonplace, in a traditional system, the images still have to travel to the central server to be stored and typically compressed; this is where image quality can be lost.   Edge technology helps reduce the need for exorbitant storage space on the central server as many edge devices are capable of storing data locally on SD memory cards or NAS devices.  Traditionally these types of storage options were primarily used as backups for the system, but they can now be implemented as the main recording devices in smaller applications.  Cutting down on the need for centralized storage will reduce the need for high bandwidth consumption, ultimately cutting costs.

According to Fredrik Nilsson, general manager for Axis Communications, “It’s estimated today that a staggering 99 percent of all recorded surveillance video is deleted before it’s ever seen.”  How does that make surveillance useful?  It really doesn’t except for use in forensic investigations or after the fact viewing, but with edge-technologies providing intelligence and analytics at the source, detection capabilities increase which creates a more effective system.  With smarter edge devices that can detect patterns, motion, facial recognition, license plates, camera tampering, and people count, you can avoid potential catastrophe that could be caused by deleting recordings to free up space.  These types of analytics provide a platform for real-time viewing that can even be streamed to mobile devices, which are also often considered part of “the edge” realm – the ultimate goal always being prevention and proactive approaches rather than delayed after the fact reactions.

With any technology, “the edge” is a work in progress and will continue to evolve.  It seems edge devices are primarily implemented in smaller applications where the camera need is less than 20.  One of the reasons being a server-based surveillance system can run more analytics per camera because of the CPU power, so the more cameras you have the more processing power you’ll likely need.  For smaller facilities and businesses with remote locations that need surveillance, edge devices are a viable option as they provide real-time analytics, can store footage locally, and don’t require a ton of bandwidth consumption.

At Perfect Connections, Inc. we are committed to providing security system solutions that fit your specific needs.  Our team of licensed integrators has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992.  We realize that just because a new technology is available that doesn’t mean it is the appropriate solution to every problem.  Our integrators work with you to learn your needs and will design a custom system that addresses your subjective security risks.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Todd Huffman-Flickr-Creative Commons

How The IoT Can Protect Your Home or Business

Jonathan Briggs-Network CableOur world is constantly changing and evolving. Progression is an inevitable force that influences the way we live our daily lives. This is especially true of advancements made in the techy devices we interact with on a daily basis. Everything from our smartphones to our security systems. It’s the manner in how we interact with all of these devices that is driving innovation and product design. The internet and networking of devices is creating a connected environment that offers ultimate convenience and changes how we perceive the potential of security systems.

At Perfect Connections, Inc. our licensed integrators provide comprehensive security systems to businesses and homes throughout northern and central New Jersey. We believe in installing quality systems that are in line with the best technological advancements the market has to offer. This doesn’t mean we use the trendiest devices for the sake of being “trendy,” it means evaluating current products that will add value and provide a platform for future adaptation. With the Internet of Things (IoT) it’s imperative to implement devices that are not only relevant but can stand the test of time, within reason.

The definition of the IoT can be summed up as, “the interconnection of uniquely identifiable embedded computing devices within the existing internet infrastructure without requiring human-to-human or human-to-computer interaction.” This means devices that are able to “talk” to one another via an internet connection without third part interference. An example would be a motion detector that automatically uploads a video clip to an authorized smartphone when it senses movement. The IoT is influencing changes in security system components like video cameras, access controls, recording equipment, fire and burglar alarms, locks, and monitoring services. The devices themselves are evolving but so is the manner in which end users and system operators interact with them.

A higher level of remote connectivity to security systems and their components is a result of the IoT. End-users can now login to security systems and their devices via an app on their mobile device. This would allow the business owner who is away on vacation to periodically check-in on the day-to-day by logging into their surveillance system on their smartphone. The homeowner who forgot to lock their doors and arm their system can now do so remotely via a mobile device or computer. Automated notifications can be setup to send an alert when an alarm is triggered, someone tries to gain entry without proper access credentials, when a camera or motion detector capture movement within their range; the possibilities are extensive and continue to be developed.

According to Steve Hausman, president of Hausman Technology Keynotes, we are still at the beginning of the “IoT revolution.” Some research suggest by next year there will be over 30 billion wirelessly connected devices in operation. With everything becoming more and more connected one has to wonder, what are the risks? In this highly connected world, there is a plethora of data being recorded, stored, and shared but who has access and rights to this data? Therein lies the problem.

As with anything connected to the internet, the risk of being hacked or stolen is inherent. In the security world this would be a problem for IP cameras, cloud storage and recording solutions, networked access controls, and basically anything running on or connected to an internet network. With that in mind, industry professionals and developers are continuously working on solutions to prevent and minimize vulnerability.

Hausman says, “Security standards need to be established and enforced at the design and manufacturing levels. As the IoT evolves, we can also expect that society will not only adapt to its usefulness but come to expect that appropriate safeguards be implemented to ensure both privacy and security.” Today, those “safeguards” are being provided by licensed security integrators who understand the risks associated with system automation and the IoT. Often times this means strong encryptions for not only the network, but the connected devices as well.

The IoT isn’t something that’s going to disappear. Its presence in the security industry will continue to shape the way manufacturers develop products and how they are implemented by security integrators. As licensed professionals our integrators at Perfect Connections, Inc. provide comprehensive security system solutions to businesses and homes throughout northern and central New Jersey, and have been doing so for over 25 years. Our team has witnessed decades of advancements in the industry. We realize it is our duty to continue our own education as well as offer knowledge to our customers when implementing new technologies and component counterparts.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Jonathan Briggs-Flickr-Creative Commons

Can Your Camera See In The Dark?

West Midlands Police-Infrared FootageNot all surveillance cameras are created equally.  It may seem as simple as selecting a surveillance camera and popping it into place, but what about the external factors that affect the quality of recorded images?  One of the top concerns for industry professionals and end-users alike is a cameras ability to see in the dark or varied light conditions.  Whether you’re using interior or external cameras, their ability to function under varied light conditions is paramount.  Our experts at Perfect Connections, Inc. understand the importance of a surveillance system that doesn’t quit when the sun goes down.  We are a licensed security systems company that has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for over 25 years.

What challenges do different lighting conditions pose to surveillance cameras?  The most obvious is the absence or lack of light.  Unless your cameras are True Day Night it is likely that they will not be able to pick up fine details in the lack of light.  Another common issue is the effect of light glare.  Problematic glare can come from car headlights to poorly placed exterior lighting fixtures.  Glare will disrupt the sensors in the video camera and the recorded footage can be rendered useless.  It is important to take lighting conditions into consideration when choosing and installing cameras as it will impact the overall effectiveness of your system.  What good is a camera that captures grainy unclear images or blanks out for seconds at a time?

Fortunately there have been vast improvements in the surveillance industry that are changing the game when it comes to light adaptation capabilities.  According to Greg Peratt, Senior Director of the Panasonic Video Solutions Integration Team, there are IP (Internet Protocol) cameras that can capture detailed footage in lighting less than .01 lux illumination.  Lux illumination is the metric measurement for how much light falls on an object.  A measurement of 1 lux, “equals the amount of light that falls on a one-square-meter surface that is one meter away from a single candle.”  Therefore a camera that can capture detailed images in less than .01 lux illumination is not only impressive, it’s advantageous.

Another helpful advancement in the case of low or varied light is the Infrared Cut-Filter Mechanism (IRCF).  This filter is automatically lifted or lowered in front of the camera’s sensor depending on the light levels.  The IRCF helps block out disruptive infrared light that can come from sunlight or certain lighting fixtures and it ultimately improves the camera’s low-light performance.  When light levels are low-typically at night-is when the filter is automatically lifted from in front of the sensor.  Cameras that have this feature are considered to have True Day Night capabilities.

The only hitch with this technology is color is often distorted or lost completely.  However, the camera is still able to capture a clear black and white image and according to Steve Carney it captures an image, “…that is not only vastly more usable but also cleaner without chroma noise.”  Carney points out another differentiator between True Day Night cameras and the impersonators is what happens when the IRCF is lifted or removed.  In a True Day Night camera a piece of “dummy” glass will take the place of the IRCF in order to maintain focus and, “minimize the spectral offset between visible and IR light.”  In other cameras the ability to remove such a filter doesn’t exist, therefore the full spectrum of visible and infrared light cannot be taken advantage of.

Other features to look for when considering Day Night cameras are the shutter speeds and any tinting on the camera housing.  Varying shutter speeds affect the amount of the light that is able to be captured.  The slower the shutter, the more light is captured which isn’t always better.  Often times a camera will come with a domed or “bubble” exterior housing.  These “bubbles” can sometimes be tinted.  Depending on your application you may or may not need tinting; sometimes the tint can have an adverse effect by decreasing visibility and obstructing image clarity.

Whether you are replacing older interior/exterior cameras or installing new, your best solution is to call on the experts.  Every business and facility is different which means each will have different requirements when it comes to day/nighttime surveillance.  Having a licensed security professional do an in person assessment of your facility will help determine what type of camera should be implemented and where.  Our team of licensed professionals at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and facilities throughout northern and central New Jersey since 1992.  We believe in personalized service that tailors solutions to your individualized needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by West Midlands Police-Flickr-Creative Commons

Why You Need A Monitoring Station

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response. This system still exists today and is considered an effective means for preventing disaster and catching criminals. However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device. One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We have seen how technology can affect not only individual security devices but the system as a whole. There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it. This is where the idea of self-monitoring comes into play. If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device. This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act. The same is true of a tripped alarm. This all sounds great, right? However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response. This could happen for a number of reasons. One being your mobile device is turned off or not on your person. Another could be a missed notification. As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times. It’s a feat not likely met by any independent business owner, you have to sleep at some point. Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day. The constant interruption would be enough to drive anyone mad. It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one. In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage. Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring. There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors. According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.” It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location. However, this doesn’t mean someone will be vigilant 24/7. This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it. Lastly, there’s professional remote video monitoring. This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios. These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities. Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage. As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it. These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility. An operator may notice things like loose wires or a piece of equipment that looks out of place. Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them. Many industry professionals agree that having a professional monitoring station is still the preferable method of watching over your facility. There’s simply too many holes in trying to self-monitor your own business. According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.” Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.” With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for over 25 years. We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs. If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t. The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

If Your Security System Is Missing One Of These, It’s Not Complete

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a complete security system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that complete security systems should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing complete and comprehensive security solutions to homes and businesses in northern and central New Jersey for over 25 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons