How The IoT Can Protect Your Home or Business

Jonathan Briggs-Network CableOur world is constantly changing and evolving. Progression is an inevitable force that influences the way we live our daily lives. This is especially true of advancements made in the techy devices we interact with on a daily basis. Everything from our smartphones to our security systems. It’s the manner in how we interact with all of these devices that is driving innovation and product design. The internet and networking of devices is creating a connected environment that offers ultimate convenience and changes how we perceive the potential of security systems.

At Perfect Connections, Inc. our licensed integrators provide comprehensive security systems to businesses and homes throughout northern and central New Jersey. We believe in installing quality systems that are in line with the best technological advancements the market has to offer. This doesn’t mean we use the trendiest devices for the sake of being “trendy,” it means evaluating current products that will add value and provide a platform for future adaptation. With the Internet of Things (IoT) it’s imperative to implement devices that are not only relevant but can stand the test of time, within reason.

The definition of the IoT can be summed up as, “the interconnection of uniquely identifiable embedded computing devices within the existing internet infrastructure without requiring human-to-human or human-to-computer interaction.” This means devices that are able to “talk” to one another via an internet connection without third part interference. An example would be a motion detector that automatically uploads a video clip to an authorized smartphone when it senses movement. The IoT is influencing changes in security system components like video cameras, access controls, recording equipment, fire and burglar alarms, locks, and monitoring services. The devices themselves are evolving but so is the manner in which end users and system operators interact with them.

A higher level of remote connectivity to security systems and their components is a result of the IoT. End-users can now login to security systems and their devices via an app on their mobile device. This would allow the business owner who is away on vacation to periodically check-in on the day-to-day by logging into their surveillance system on their smartphone. The homeowner who forgot to lock their doors and arm their system can now do so remotely via a mobile device or computer. Automated notifications can be setup to send an alert when an alarm is triggered, someone tries to gain entry without proper access credentials, when a camera or motion detector capture movement within their range; the possibilities are extensive and continue to be developed.

According to Steve Hausman, president of Hausman Technology Keynotes, we are still at the beginning of the “IoT revolution.” Some research suggest by next year there will be over 30 billion wirelessly connected devices in operation. With everything becoming more and more connected one has to wonder, what are the risks? In this highly connected world, there is a plethora of data being recorded, stored, and shared but who has access and rights to this data? Therein lies the problem.

As with anything connected to the internet, the risk of being hacked or stolen is inherent. In the security world this would be a problem for IP cameras, cloud storage and recording solutions, networked access controls, and basically anything running on or connected to an internet network. With that in mind, industry professionals and developers are continuously working on solutions to prevent and minimize vulnerability.

Hausman says, “Security standards need to be established and enforced at the design and manufacturing levels. As the IoT evolves, we can also expect that society will not only adapt to its usefulness but come to expect that appropriate safeguards be implemented to ensure both privacy and security.” Today, those “safeguards” are being provided by licensed security integrators who understand the risks associated with system automation and the IoT. Often times this means strong encryptions for not only the network, but the connected devices as well.

The IoT isn’t something that’s going to disappear. Its presence in the security industry will continue to shape the way manufacturers develop products and how they are implemented by security integrators. As licensed professionals our integrators at Perfect Connections, Inc. provide comprehensive security system solutions to businesses and homes throughout northern and central New Jersey, and have been doing so for over 25 years. Our team has witnessed decades of advancements in the industry. We realize it is our duty to continue our own education as well as offer knowledge to our customers when implementing new technologies and component counterparts.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Jonathan Briggs-Flickr-Creative Commons

Can Your Camera See In The Dark?

West Midlands Police-Infrared FootageNot all surveillance cameras are created equally.  It may seem as simple as selecting a surveillance camera and popping it into place, but what about the external factors that affect the quality of recorded images?  One of the top concerns for industry professionals and end-users alike is a cameras ability to see in the dark or varied light conditions.  Whether you’re using interior or external cameras, their ability to function under varied light conditions is paramount.  Our experts at Perfect Connections, Inc. understand the importance of a surveillance system that doesn’t quit when the sun goes down.  We are a licensed security systems company that has been providing comprehensive security solutions to businesses throughout northern and central New Jersey for over 25 years.

What challenges do different lighting conditions pose to surveillance cameras?  The most obvious is the absence or lack of light.  Unless your cameras are True Day Night it is likely that they will not be able to pick up fine details in the lack of light.  Another common issue is the effect of light glare.  Problematic glare can come from car headlights to poorly placed exterior lighting fixtures.  Glare will disrupt the sensors in the video camera and the recorded footage can be rendered useless.  It is important to take lighting conditions into consideration when choosing and installing cameras as it will impact the overall effectiveness of your system.  What good is a camera that captures grainy unclear images or blanks out for seconds at a time?

Fortunately there have been vast improvements in the surveillance industry that are changing the game when it comes to light adaptation capabilities.  According to Greg Peratt, Senior Director of the Panasonic Video Solutions Integration Team, there are IP (Internet Protocol) cameras that can capture detailed footage in lighting less than .01 lux illumination.  Lux illumination is the metric measurement for how much light falls on an object.  A measurement of 1 lux, “equals the amount of light that falls on a one-square-meter surface that is one meter away from a single candle.”  Therefore a camera that can capture detailed images in less than .01 lux illumination is not only impressive, it’s advantageous.

Another helpful advancement in the case of low or varied light is the Infrared Cut-Filter Mechanism (IRCF).  This filter is automatically lifted or lowered in front of the camera’s sensor depending on the light levels.  The IRCF helps block out disruptive infrared light that can come from sunlight or certain lighting fixtures and it ultimately improves the camera’s low-light performance.  When light levels are low-typically at night-is when the filter is automatically lifted from in front of the sensor.  Cameras that have this feature are considered to have True Day Night capabilities.

The only hitch with this technology is color is often distorted or lost completely.  However, the camera is still able to capture a clear black and white image and according to Steve Carney it captures an image, “…that is not only vastly more usable but also cleaner without chroma noise.”  Carney points out another differentiator between True Day Night cameras and the impersonators is what happens when the IRCF is lifted or removed.  In a True Day Night camera a piece of “dummy” glass will take the place of the IRCF in order to maintain focus and, “minimize the spectral offset between visible and IR light.”  In other cameras the ability to remove such a filter doesn’t exist, therefore the full spectrum of visible and infrared light cannot be taken advantage of.

Other features to look for when considering Day Night cameras are the shutter speeds and any tinting on the camera housing.  Varying shutter speeds affect the amount of the light that is able to be captured.  The slower the shutter, the more light is captured which isn’t always better.  Often times a camera will come with a domed or “bubble” exterior housing.  These “bubbles” can sometimes be tinted.  Depending on your application you may or may not need tinting; sometimes the tint can have an adverse effect by decreasing visibility and obstructing image clarity.

Whether you are replacing older interior/exterior cameras or installing new, your best solution is to call on the experts.  Every business and facility is different which means each will have different requirements when it comes to day/nighttime surveillance.  Having a licensed security professional do an in person assessment of your facility will help determine what type of camera should be implemented and where.  Our team of licensed professionals at Perfect Connections, Inc. has been providing comprehensive security solutions to businesses and facilities throughout northern and central New Jersey since 1992.  We believe in personalized service that tailors solutions to your individualized needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by West Midlands Police-Flickr-Creative Commons

Why You Need A Monitoring Station

Traditionally in any monitored security system, the individual security devices are installed by a systems integrator and when an alarm sounds or something looks suspicious a signal, and sometimes a video clip, is sent to a central monitoring station which then either contacts the end-user or the local authorities to initiate an emergency response. This system still exists today and is considered an effective means for preventing disaster and catching criminals. However, in light of recent technological advancement, the end user now has the capability to “monitor” their own property via their mobile device. One has to wonder, how effective can self-monitoring be and could it actually replace a central monitoring service?

Our licensed team of integrators at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We have seen how technology can affect not only individual security devices but the system as a whole. There are pluses and minuses to every situation, but its understanding which methods and devices provide the most benefits that make the difference, and monitoring services are no exception.

As a business owner it’s nice to feel in control of your facility and what goes on within it. This is where the idea of self-monitoring comes into play. If you have a security system installed at your facility, it can be set up to send notification directly to your mobile device. This means that when there is a disturbance, maybe an intruder walks in front of a motion sensitive video camera, a video clip can be sent directly to your smartphone or mobile device so you can act. The same is true of a tripped alarm. This all sounds great, right? However, it’s not without its limitations.

One of the major drawbacks of monitoring your own alarm system is failure to initiate an immediate and adequate response. This could happen for a number of reasons. One being your mobile device is turned off or not on your person. Another could be a missed notification. As a business owner you likely have enough on your plate to occupy the full 24 hours of the day, never mind trying to keep an eye on your facility at all times. It’s a feat not likely met by any independent business owner, you have to sleep at some point. Self-monitoring can also become a nuisance, receiving excessive notifications throughout the day. The constant interruption would be enough to drive anyone mad. It’s for these reasons central monitoring services continue to prevail.

The goal of monitoring an alarm system is to create a proactive response versus a reactive one. In the recent past, surveillance footage was primarily being utilized in “after the fact” scenarios where local authorities would try to catch a perpetrator or solve a crime based on recorded footage. Today, with real-time video verified notifications and improving communications, local authorities stand a better chance of catching someone red-handed.

There are essentially four different types of monitoring that can be implemented, including self-monitoring. There’s onsite monitoring which typically consists of paying someone to sit and stare at TVs or computer monitors. According to a study from Sandia National Laboratories the attention span of a person viewing surveillance footage for just 20 minutes will be “significantly diminished.” It’s not a very reliable or economical method to ensure the security of your facility.

Then you have remote monitoring where surveillance footage is monitored off site by streaming footage over the internet to a remote location. However, this doesn’t mean someone will be vigilant 24/7. This could mean streaming it to your home computer and that would only be effective if someone were there to monitor it. Lastly, there’s professional remote video monitoring. This type of monitoring typically employs operators that are trained on how to interact with local authorities and respond to different security scenarios. These types of monitoring stations are typically staffed 24/7.

Professional remote video monitoring is an advantageous service because the operator on duty can interpret live video footage and provide useful information to the local authorities. Information that isn’t necessarily transmitted to a mobile device in a 5-10 sec video clip; things like a perpetrator/s physical description, maybe the license plate or make and model of their getaway vehicle, what the suspect is doing, how many people are present, and whether or not the suspect/s is armed.

This type of monitoring can also help filter our false alarms and fees incurred by false dispatches by validating on site activity with the end user via real-time footage. As the end user you can also request that the operators perform occasional virtual tours throughout your facility or parts of it. These routine surveys of your property would help detect any disturbances but also help in general maintenance of your facility. An operator may notice things like loose wires or a piece of equipment that looks out of place. Depending on your facility’s capabilities, monitoring operators can sometimes interact with suspects or people on site through speakers on a VoIP (voice over internet protocol) system.

While new technology continues to usher in the desire for self-reliance it also fosters further development of security system components and the way monitoring services are able to interact with them. Many industry professionals agree that having a professional monitoring station is still the preferable method of watching over your facility. There’s simply too many holes in trying to self-monitor your own business. According to Simon Morgan, director of Technology, SureView Systems, “The central station remains the first line of defense.” Matthew Riccoboni, director of Marketing, OzVision, says, “There truly is a value in 24/7 monitoring by the central station. Customers like to know someone is keeping an eye on their assets whether they are awake or not.” With a central monitoring station you can rest easy knowing someone is always there to initiate a response.

At Perfect Connections, Inc. our licensed integrators have been providing comprehensive security systems to businesses throughout northern and central New Jersey for over 25 years. We understand the value our customers place on their business that they’ve worked so hard for; we work to provide the best solutions to fit their specific needs. If you live or run a business in central or northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Check out this video on actual events that highlight the differences between monitoring stations that have video verification and those that don’t. The last scenario is what everyone wants to avoid. Link: What is Video Verification?

Image Credit: Image by Bosch Service Solutions-Google-Creative Commons

If Your Security System Is Missing One Of These, It’s Not Complete

CCTV-Wikipedia ImageIn an unpredictable world, one thing is certain, we all want to protect what’s ours.  Whether you’re a business owner or a homeowner, you want to keep safe that which you’ve worked so hard for.  One of the most effective ways to do that is to install a security system.  Well, what exactly is a security system and what makes it a complete security system? Security can be defined as, “the state of being protected or safe from harm,” and system can be defined as, “a group of related parts that move or work together.”  A security system is an assemblage of equipment that helps prevent imminent danger or damage.

As a licensed security systems provider, our team at Perfect Connections, Inc. has been helping protect homes and businesses throughout northern and central New Jersey since 1992.  We believe that complete security systems should not only be a group of working parts, but that it should be comprehensive.  Comprehensive can be defined as, “complete; including all or nearly all elements or aspects of something.”  After decades of installing security equipment we’ve found that a truly comprehensive security system should include some form of access control, fire and burglar alarms, surveillance, and a monitoring service.

Access control is the means by which you limit admission to a specific point of entry.  It’s essentially your first line of defense against unauthorized entrants.  Probably the most conventional form of access control is a standard lock and key.  Today, the lock and key method is either being eliminated or used as a backup to more technologically advanced controls.  Traditional keys when lost or stolen can be easily replicated whereas using readers, fobs (tokens), and sometimes biometrics in combination with a password are more concrete and less susceptible to duplication.

Card and proximity readers are typically placed next to a point of entry and a fob or card that is programmed with the appropriate credentials is used.  The card or fob is either tapped or swiped on or near the reader to gain access. The benefit to using a swipe card or fob is if they are lost or stolen they can be deactivated in the operating system whereas you can’t deactivate a physical key unless you change out the entire lock.  Biometrics, which uses physical credentials like a fingerprint, is similar in the sense that access information isn’t as easily stolen or duplicated.  This type of access control isn’t as widely used today because they tend to be more complex and costly.  However, as technology progresses we may see a rise in biometric applications.

Fire and burglar alarms are critical alerts in potentially life-threatening situations.  Fire and burglary can strike at any given time without warning, wreaking havoc on your business or home.  With burglary occurring every 14.6 seconds and national fire departments responding to an estimated 1,240,000 fires a year (2013), it’s critical to the safety and security of any home or business to implement preventative measures.  Physical structural damage and property loss incurred by a fire or burglary is only part of the aftermath, the emotional and psychological damage is even harder to repair.

In conjunction with burglar alarms and access control, surveillance is essential.  When installed correctly surveillance equipment is not only a helpful crime deterrent, but a useful tool in solving crime.  In the wake of IP (Internet Protocol) and wireless technology, surveillance equipment is no longer limited to hardwired installations.  This increases scalability, flexibility, and ease of installation.  It also helps reduce the cost of installation by not having to pull as much cabling through walls.  Another benefit to having a surveillance system is the potential capability to access footage remotely.  With a plethora of mobile apps at your disposal, you can access your surveillance system to see what is going on at your facility or home when you can’t be there.  Being able to remotely access your security cameras adds a layer of monitoring and convenience that, up until recently, wasn’t widely used or available.

Lastly to complete the effectiveness of a security system you should have an alarm monitoring service.  Without a monitoring service who is going to respond to an active alarm?  If you’re lucky someone nearby will call the authorities, that’s assuming someone is actually near your facility or residence when the alarm goes off.  An alarm monitor can help save you, your family, or your business from potential disaster by decreasing the response time from local authorities and emergency responders.  When an alarm is triggered the monitoring station is instantly notified; they typically try to contact you first, and if they don’t get a response within a given amount of time authorities and emergency crews are dispatched.  This is a particularly beneficial service in the event that you’re out of town or unable to respond in an emergency.  Having an alarm monitoring service can mean the difference between catastrophe and a manageable situation.

A security system is so much more than the equipment that comprises it.  It helps provide protection and life safety in a volatile world. Remember, a system is only as effective as the parts that comprise it.  For a security system to be comprehensive it should include fire and burglar alarms, access control, surveillance, and a monitoring service, at least.  As a security systems expert, Perfect Connections, Inc. has been providing complete and comprehensive security solutions to homes and businesses in northern and central New Jersey for over 25 years.  We understand the importance of mitigating the unpredictable and what it takes to do so.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by KRoock74-Google-Creative Commons

How To Spot A Scam

Scam-Widjaya IvanImagine you’re at home and the doorbell rings. You go to answer the door. Who’s there? It’s a salesman claiming to be a representative from a security system company. They tell you they’re at your home to offer you a free security system. Sounds too good to be true, right? That’s because it probably is. Unfortunately, this type of scam is not uncommon in the residential security system industry.

At Perfect Connections, Inc. we believe in helping our customers, not ripping them off. Our licensed experts install customized and comprehensive residential security systems throughout Northern and Central New Jersey. We know each home is unique, which means each system should be tailored individually. False promises, aggressive sales tactics, lengthy and overpriced contracts are NOT what we are about. Unfortunately, there are many door-to-door “sales” people that are only looking to make a quick buck. In doing so, they typically pressure you to sign high priced contracts or make a purchase on the spot. They talk fast to avoid any questions you might have, and to meet their end goal which is you writing a check or giving them your credit card information.

These so called “sales” representatives aren’t even associated with an actual security company in many instances. In some cases, like one reported by CBS Miami, these sales associates may falsely represent themselves as part of an already established company. The case in Miami involved a man named Yassiel Cabre who reportedly worked for a company called Alarm Digital Telecommunication. Instead of representing himself that way, he would tell homeowners he worked for ADT, which is a well-known security systems company. He even gave out folders and business cards that clearly displayed the ADT logo. He conned one victim into signing a 5 year contract (industry standard is typically 36months) with a company called Monitronics (ADT competitor), promising them they would be saving money because ADT supposedly purchased Monitronics. Of course this was 100% false.

Con artists or aggressive door-to-door sales people will sometimes use scare tactics to get you to sign contracts, buy what they are trying to sell, or simply let them into your home-only to steal from you. They might feed you forged crime statistics about your neighborhood to persuade you into buying what they’re offering. They do this hoping fear will get the better of you. If they’re not scaring you into buying an inadequate or fake system, they might offer freebies. A common tactic is to offer a free “system” in exchange for allowing them to put a sign on your lawn (consumerreports.org). While this may sound like an awesome deal, it’s not. As you’re caught up in the word “free,” long term contracts will be sneaked in as a formality of the deal, and you’ll sign because it seems fair. Next thing you know, you’re locked into an expensive agreement that costs an arm and a leg to cancel.

Don’t let yourself be a victim of these forceful sales strategies. There are some telltale signs that you might be getting scammed or ripped off. Check out the list below:

  • Aggressive sales tactics
  • Skipping right to the contract instead of taking the time to discuss and review the vulnerabilities of your home
  • Limited time offers
  • Companies that sell your contract to a bigger company after the initial agreement is made
  • Using fear as a selling point
  • Offering everything for “free”
  • Claiming to be a representative from your current security systems company
  • They will not produce proper identification or licensing
  • Fast talking and speedy contract review
  • Immediate installation without an assessment

Lesson number one: do your research before signing anything. If you suspect someone of false representation or not having the proper licensing, report it to your local authorities. Be sure you find a security systems company that is not only reputable but knowledgeable. The sophistication and effectiveness of your system is only as good as the experts who provide and install it. For over 25 years Perfect Connections, Inc. has been providing custom residential security systems to Northern and Central New Jersey. Our specialists are licensed and understand the complexities of a comprehensive system. We know how to guide you through the process from an initial on site assessment to final installation. Let us help you protect what matters most.

If you live in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE. Beware of scammers and make sure you’re relying on a trusted and proven security company by calling us today.

Image Credit: Image by Widjaya Ivan-Flickr-Creative Commons

Securing Multi-Tenant Offices

Office SpaceWe have all seen an office building, whether it’s the 104 floor World Trade Center in New York City or the 5 floor office you work in.  Many of these buildings house a multitude of different businesses.  This begs the question, how do you protect your business when you share a space with multiple tenants?  You don’t know their clientele or who is coming and going on a regular basis, just as they don’t know yours.

The security challenges that face business owners in a multi-tenant office space are diverse as each tenant is providing a different service with individualized needs.  At Perfect Connections, Inc. we have been providing security system solutions to businesses throughout northern and central New Jersey for over 25 years.  Our experts understand the security complexities business owners and facility managers encounter on a daily basis, and we can provide an individualized plan specific to your company’s needs.

What security challenges do companies face in a multi-tenant space, and how can they be overcome?

A major challenge for tenants and facilities managers is communication.  As each business within a shared space operates differently, they’re likely going to have different security needs.  These needs should be clearly communicated with the building owner, facilities manager, and security systems provider.  If you’re a business that requires a higher level of secured access into the main building, and your office space, that should be discussed up front.

Often times in a shared building there are already security features in the entrance or lobby.  These areas serve as an initial means of access control, but different business owners may have different desired security restrictions.  For example, the company next door to you might not require a sign-in or check-in with security upon arrival, but maybe your company does.  Why does this matter?  It may affect how you secure your individual office space within the building.  You may not want another company’s client or employee accidentally wandering into your space.  A building owner or manager may have their own set of restrictions for each tenant as well, so having that conversation up front is imperative.  By having your own security in place you lessen the chances of workplace violence and employee theft from unauthorized entrants as well as within your own business.

Providing your employees with an emergency plan or protocol is important.  The buildings facilities manager will likely already have a plan for the entire building that includes alarm testing, drills, and escape routes.  You may be the type of company that wants to run your own emergency drills.  Running emergency drills is a great way to ensure your employees are prepared.  However, when running preparatory drills be sure to inform your neighbors and the facilities personnel to avoid confusion and unneeded chaos.  It might be beneficial to hold a meeting about emergency procedures with the building manager and neighboring company owners to come up with a cohesive plan.  That way you reduce the risk of complete panic if everyone is on the same page.

Construction and renovation within multi-tenant office buildings is not uncommon.  Redistributing space or accumulating office space can pose a security challenge for tenants.  During a renovation your building becomes a host to a multitude of people that you aren’t used to seeing on a daily basis.  This includes construction workers, architects, inspectors etc.  While these people are likely respectable individuals, you don’t know them, and you may not want them accidentally entering your space.

While most would agree a comprehensive security system is better to install during the initial stages of building construction, it doesn’t always happen that way.  In some buildings you may have tenants that opt for an individualized security system after moving in.  When acquiring space, you may run into old or inefficient security systems that do not align with what you might have in your current space.  To ensure your security system is cohesive and efficient you should involve your security systems provider during the initial design phase for the new space.  This will help make sure your current space is protected during the construction phase, and that all components will work seamlessly once completed.  According to Sean Ahrens, a senior security consultant with Schirmer Engineering (in regards to access control and alarm monitoring), “The only way to address those issues is with communication during the design process.”  He’s right, and this concept applies to all security issues a tenant may have.

While securing your business within a multi-tenant space can be complex, the technical side would be covered by your security systems provider.  It’s up to you as the owner to communicate your desired outcome, get the right professionals involved from the start, and to have a vision for how you want your company protected.  Here at Perfect Connections, Inc. we’ve been providing comprehensive security system solutions to companies throughout central and northern New Jersey since 1992.  We provide everything from access controls to video surveillance and so much more.  Our team can assess the risks specific to your business and provide a customized system to help you protect what matters most.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

View Your Cameras From Anywhere

laptop monitor-Intel Free PressWhen you picture a surveillance monitoring station what do you see?  Is it a half awake guard staring blankly at multiple monitors?  If that’s the case you can scratch that image from your mind.  The future of monitoring services is quickly shifting and adapting to our society’s need for streamlined and efficient processes.  As surveillance systems migrate from analog to IP with megapixel network cameras, and our world becomes more and more connected through the IoT (Internet of Things), the desire to access and monitor footage from anywhere increases.  This is where the idea of remote monitoring comes into play.

Being able to remotely monitor surveillance footage from virtually anywhere is a convenience that, up until recently, hasn’t been a pervasive security feature.  It differs from alarm monitoring in the sense that a service representative isn’t necessarily waiting around for an alarm to go off, instead they are actively watching live recordings to catch potential disasters before they happen.  In the past a company would typically hire people to monitor cameras on site, which isn’t always the most economical or effective method.  Today, companies are using off-site monitoring services that have the ability to keep watch over multiple facilities 24/7.  In conjunction with that, business owners have the ability to download apps that allow them to access their surveillance footage at their convenience via a mobile device.

At Perfect Connections, Inc. our experts typically recommend a monitoring service as part of a comprehensive security system to help ensure its effectiveness.  Our team of licensed technicians have been providing security solutions to businesses throughout northern and central New Jersey for over 25 years.  The technological climate is ever changing and we always do our best to stay on top of relevant trends that will benefit our customers.

Remote monitoring allows an individual or group of users to access surveillance footage through a secured network from virtually anywhere via a smartphone, tablet, computer, or mobile device.  Why is this beneficial?  It can help cut down, or eliminate entirely, the need to have an on-site staff staring at monitors, how effective can that be anyway?  According to Doug Marman, CTO of VideoIQ Inc. and founder of Remote Guarding Alliance, “…humans monitoring video screens grow fatigued to the point of ineffectiveness after only 20 minutes…”  Marman argues that the traditional method of monitoring surveillance is at best a practice in “hindsight” strategy.  Meaning by the time a reaction is made the damage is done or the perpetrator has already escaped.

Marman’s system of remote monitoring using a combination of video analytics and audio over IP, or voice over IP (VOIP), decreases response time and increases the ability to monitor a large quantity of cameras at once.  And in contrast to human attention span, video analytics are “100 percent vigilant.”  Marman illustrates the ability to interact with intruders instantly via audio over IP, citing how quick they are to abandon their criminal attempt when someone is calling them out over a speaker on site.  While audio interaction is an intriguing feature that allows for a virtual presence at all times, it may not be necessary depending on your type of business and your security needs.  What matters most is the ability to react instantly, reduce any lag time in response, and prevent false alarms as they typically result in fines and wasted essential resources.

With response time being one of the top benefits of remote monitoring it can also reduce overall monitoring costs, increase scalability options, and send notifications via e-mail or other media.  While the benefits of a remote monitoring system may eliminate the need to hire on-site staff, it doesn’t necessarily mean you should rely solely on self-monitoring.  If you were to take on the task of monitoring everything yourself, your business could be at risk.  Imagine you’re monitoring from a smartphone, it runs out of battery and you don’t have your charger handy.  What if you misplace your smartphone and miss an important notification?  Think about logistics too, as a business owner even you need to get sleep, you can’t be vigilant 24/7.

Having the ability to self-monitor and view your cameras from anywhere should be looked at as an added layer of security, not your only means of protection.  According to Jerry Cordasco, vice president of operations for G4S Video Monitoring Support and Data Center, “A better choice for remote video surveillance is the use of a professional monitoring facility.”  Having a remote monitoring service provides a virtual presence 24/7 that can access real time footage and initiate the appropriate response immediately.

Security systems can be an effective crime fighters, but what good are they if an alarms goes off and no one is notified or made aware?  What good is a surveillance system that no one is monitoring?  You might get lucky and capture a license plate number that could eventually lead you to the perpetrator after the fact, but by that point the damage has been done.  The goal of a remote monitoring service is to provide timely and accurate responses to disturbances on site.

As a security systems provider, our team at Perfect Connections, Inc. understands the importance of immediate action.  Mere seconds can be the difference between prevention and disaster.  We have been providing comprehensive security system solutions, which include monitoring services, to facilities throughout northern and central New Jersey since 1992.  Every business has different security risks, which is why we tailor our solutions to fit your specific needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Intel Free Press-Flickr-Creative Commons

Forget About Keys – Using Smartphones To Unlock Doors

Access-ErvinWe use our smartphones and other mobile devices for many functions in our daily lives. It’s almost impossible to go through an entire day without seeing someone tapping, scrolling, or swiping through their phone, never mind using your own phone. We’ve created a mobile environment where convenience lies in the palm of our hands.

Technological progression has taken us so far in a short amount of time; we can pay our bills on our phones, we can chat with someone a world away, we can make everyday purchases, and now they can be used as an extension of our security systems. In particular as a means of access control and authentication in commercial applications using near field communication (NFC). According to Jeremy Earles, Readers and Credentials Portfolio Manager for Allegion, NFC technology, “provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other…” This is essentially the same technology you may have seen advertised by Samsung where two phones can be tapped together to share information, see HERE.

At Perfect Connections, Inc. our team of licensed professionals provide comprehensive security system solutions to businesses throughout northern and central New Jersey. We have been helping a wide range of businesses secure their facilities for over 25 years. As with any technology, progression in the realm of security components shows no signs of slowing. At Perfect Connections we realize it is our responsibility to stay on top of these changes and provide our clients with solutions that are current but practical as well.

NFC technology is an exciting new venture in access control applications. However, it has yet to become as ubiquitous as traditional access controls like key fobs, swipe cards, and proximity readers. NFC access works by allowing your employees and authorized users to utilize their mobile device, likely their cellphone, as their access credential. The user’s phone would have an embedded NFC chip that would wirelessly receive an authorized credential from an administrative control. This process can be similar to how you would download an app or retrieve information stored in a cloud service; or it could be easily managed by plugging the phone into an administrative device via a USB cord. Once the phone has the proper credential it can be used in the same fashion as a fob or proximity card, simply tap the phone or be within range of a reader that will grant or deny access. Imagine the convenience!

With 5.9 billion, or 87% of the world’s population, being mobile subscribers it’s no wonder NFC technology is creating buzz among end users and security integrators alike. Of those mobile subscribers 91% keep their phone within and arm’s length throughout the day and night. It only makes sense that phones would become part of integrated security protocols. With younger generations the desire for new and streamlined processes is endless, especially for those now entering the workforce. They don’t want to be bothered with having to search through their pockets or purses for badges or fobs when their phone like an extension of their hand. While NFC technology may not be the universal method for access control yet, the case for it exists today.

One of the many benefits NFC technology offers is no longer having to print or buy new ID badges which can be costly and time consuming. It also allows you to change credentials on and as needed basis. This would be helpful if you have a contract or temp worker who needs provisional access. You would simply send or upload a temporary credential to their phone and when their job is done you can delete access from the administrative network.

According to Ron Oetjen, president of Intelligent Access Systems (IAS), NFC technology saves money by not having to replace lost or stolen card credentials. Oetjen argues that security may be even better when using smartphones than cards or fobs considering how obsessively people guard them, and the fact that in order to use it as a credential the phone first has to be unlocked using a PIN or biometric identification. So many companies already employ a BYOD (bring your own device) policy at work that the transition would be easy for the user. If a phone is lost or stolen it can be remotely tracked, disabled, and/or wiped preventing an unauthorized user from gaining access.

Like any other developing technology, NFC is not perfect and consumer perception is still evolving. There are some businesses that don’t want to lose the traditional ID badge that displays a photo of the user for security reasons. The issue of existing security infrastructure can be tricky too as it may require the removal and reinstallation of new system components which adds cost.

Aside from NFC, one of the easiest ways to integrate a smartphone with your access control system is with Brivo. Using Brivo’s OnAir pass, unlocking a door is as simple as opening an app and tapping a button.

The world of security systems is constantly evolving. This requires integrators and end users to be aware of changes that will affect and potentially enhance their systems. NFC technology is an exciting addition to the access control component of a security system that will likely become more ubiquitous in the coming years. It will provide a new level of security and convenience that has yet to be fully realized. At Perfect Connections, Inc. our licensed integrators are constantly educating themselves on changes in the industry and how they may benefit our clients. We provide comprehensive security systems that include access controls to businesses and facilities throughout northern and central New Jersey, and have been doing so since 1992. Our experts will help guide you through the process from an initial security assessment to final installation, implementing technologies that are not only effective but make sense for your specific situation.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Ervins Strauhmanis-Flickr-Creative Commons

Protection During Network Outages -How It Works

No Internet-Marcelo GraciolliDoes your security system, or part of it, rely on your company’s internet network? Or are you considering a system that is at least partially dependent on network connectivity? If so, what happens if that network fails or is compromised? Fortunately nowadays the chances of your network dropping or losing connection is pretty slim, in fact the probability of most Internet Service Providers (ISPs) experiencing an outage is about 1%. But in the rare case that it does become inactive there are methods to keep security features active, in particular network attached surveillance or IP (Internet Protocol) cameras. Maintaining an operating surveillance system is crucial to the overall effectiveness of a comprehensive security system. Surveillance footage can aid in police investigations and the mere presence of cameras can help deter criminals. Fortunately there are methods of streaming and recording footage even when your local area network (LAN) is down.

Our licensed integrators at Perfect Connections, Inc. understand the importance of security system continuity and one that functions with minimal incident. We have been providing comprehensive security solutions to businesses throughout northern and central New Jersey for over 25 years. We specialize in surveillance systems, fire and burglar alarms, and access control solutions. There is no perfect system, but by installing redundancies and planning with prevention in mind, system issues will be few and far between.

Traditionally recorded surveillance footage would be stored on an external digital video recorder (DVR), but thanks to progressing technology and the desire to streamline everything, virtual and network storage options are becoming more popular. The cloud is becoming a popular virtual storage method that is cost effective and has seemingly limitless real estate. To find out more about the cloud, check out our post here. Whether you’re using the cloud or an external device like a DVR, it’s not a bad idea to have a back-up in the unlikely event your network goes down. Two common types of redundancies are Network Attached Storage (NAS) devices and SD memory cards.

NAS devices are installed on the same network as your security cameras. If your network were to suddenly go out or someone accidentally caused an outage, the NAS would continue recording. If you were using the cloud as your main storage and the network drops, the NAS device could be setup to automatically upload recorded data to the cloud once the network is repaired. It’s also a cost effective method as multiple network cameras can be setup to stream to the same NAS device.

SD memory cards are exactly what they sound like. They’re storage cards within the actual camera, essentially the same as memory cards used in digital cameras and other devices. This type of technology is also sometimes referred to as “edge storage.” SD cards are typically programmed one of two ways. Either they are constantly recording regardless of the network status, or they are programmed to kick-in when network connection is lost. According to Fredrik Nilsson, General Manager of the Americas for Axis Communications, using SD cards as a redundancy works best in smaller applications where there are minimal cameras. The main reason being they cost more per gigabyte of storage in comparison to NAS devices that can accommodate multiple cameras on a single device.

While the likelihood of your network failing or dropping out is pretty low it’s always best to plan for the worst case scenario. There is no perfect security system, but there are measures that can be implemented to ensure coverage when you need it most. When it comes to surveillance, it’s imperative to have continuity, therefore it couldn’t hurt to have redundancies installed when using network cameras. NAS devices and SD memory cards are two effective back-up storage methods that will help retain critical information that can later be accessed if need be. To find out which type of backup is best for your facility always consult a licensed security system integrator. Our team at Perfect Connections, Inc. has been providing comprehensive security system solutions to businesses throughout northern and central New Jersey since 1992. We understand no two businesses are exactly the same and that they should be treated with an individualized approach that suits their specific needs.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Marcelo Graciolli-Flickr-Creative Commons

Where Is Your Footage Stored?

Surveillance playSAN-Dennis van Zuijlekoms a vital role in any comprehensive security system. It helps authorities catch criminals and provides helpful insight into your business operations by collecting and analyzing data on a daily basis. Where and how is all of this visual and analytical data being “collected?” That is the ever pressing question for system integrators and end-users alike. Storing surveillance data can be as important to the efficiency of your security system as having the surveillance equipment itself. We are catapulting ourselves into the future with the constant evolution of technology in all aspects of life including security system components, and surveillance storage solutions are no exception, but not all are created equal.

At Perfect Connections, Inc. our licensed integrators are dedicated to providing comprehensive security system solutions that protect people and property. We have been installing security systems at business facilities throughout northern and central New Jersey for over 25 years. Our team designs system solutions that meet the needs specific to your organization. Surveillance storage is a security system component that will vary project to project and should be treated with an individualized approach.

In the not so distant past, video recordings weren’t as advanced as they are today in terms of image resolution, clarity, and noise distortion. Recordings would often be deemed unusable due to their lack of clarity and they would typically be discarded freeing up storage space for new recordings. Today, with the advent of IP cameras (internet protocol) and more advanced camera technology the recordings have become critical data sources that are considered valuable. This means more and more end-users are interested in keeping recorded data for longer periods of time. The obvious consequence is the need for more storage space.

There are many factors that affect what kind of surveillance storage solutions can and should be implemented at a facility. The size of the project, existing infrastructure, and client budget are all critical determinants as to what type of storage should be implemented. The camera type, camera quantity, compression standards, frame rates, motion detection, desired length of storage, and overall estimate of desired resolution all should be taken into account as well.

When it comes to storing surveillance data it is paramount that the integrity of the footage is not lost. Traditionally surveillance footage would be stored on a DVR (digital video recorder), but it’s limitations within a networked system make it less than ideal. With so much of the surveillance world developing around IP and network solutions it’s only natural that network storage solutions should arise. NAS (network attached storage), SAN (storage area network), and DAS (direct attached storage) are all potential methods for storing surveillance data. All have different installation requirements. Some may call for extensive cabling and a large closet to store servers, but it all depends on the size and type of project. According to Justin Schorn, vice president of product management for Aimetis, “The critical decision is choosing between a storage area networks (SAN) and network attached storage (NAS).”

The different storage devices vary in how they present information to the user and how data is accessed. The NAS devices present data in a “file system” same with DAS, whereas SAN is presented in what is referred to as “block storage.” DAS and NAS either attach directly to an existing network or the NVR (network video recorder). SAN is essentially an extension of a DAS, but provides a higher storage capacity.

DAS is typically implemented in situations when expansion is not an option, the system performance requisites are static, and shared access is not necessary. The reason being is DAS devices are limited to singular DVR or NVR applications. SAN solutions are typically used in larger camera applications that may later require scalable options. According to Lee Caswell, founder and chief marketing officer at Pivot3, “Many archivers can share the storage and the SAN platform introduces more reliability over NVR/DVR systems because there is no single point of failure.” Common applications for SAN storage include airports, casinos, and prisons.

NAS devices are typically used in smaller surveillance applications as its performance isn’t as robust as SAN. One of the advantages to NAS solutions is data can be easily accessed by anyone on the same protected network. Lee says, “The advantage of the file system on the NAS platform is that it is easier to support a hybrid storage case as some storage occurs locally on self-contained NVRs/DVRs and extended storage is sent to a specific file on the NAS.”

Keeping high quality recorded data for longer periods of time can help local authorities with investigations and it can provide insight into your business that you otherwise wouldn’t observe. While storing recorded footage from your surveillance system is critical to your overall security, it’s important to remember that the type of storage necessary will vary depending on the project parameters. It is imperative to work with a licensed security system integrator to help evaluate security risks, the quantity of cameras needed, and how a surveillance storage system can be implemented to meet your requirements. At Perfect Connections, Inc. we are committed to providing security systems that suit your specific needs. We have been designing and installing comprehensive security systems at businesses throughout northern and central New Jersey since 1992.

If you live or run a business in Central or Northern New Jersey and would like information on any of the topics discussed above, please call 800-369-3962 or simply CLICK HERE.

Image Credit: Image by Dennis van Zuijlekom-Flickr-Creative Commons