Wednesday, September 1, 2021

IoT is future of Video Technology

IoT is future of Video Technology 

The Internet of Things is about connecting network-enabled devices and exchanging data between them. This offers great potential for improving processes wherever information needs to be exchanged securely and quickly. It enable devices and add much more value than they have had so far. For this, there is no better example than security cameras. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose.

Acting alongside other sensors, such as motion or smoke detectors, security cameras have been in use for a long time, however without being connected to each other through data networks. Growing demands for smart video surveillance in public spaces, commercial buildings, public transport and other areas and the rise of IoT will drive for the further integration of these cameras systems. Let's see how video surveillance has evolved to this day and where the journey is heading.

The past: standard security surveillance systems

Closed-circuit television systems (CCTV) have demonstrated that they can do what they're supposed to: give humans a better eyesight on the security situation in order to reduce security incidents. CCTV cameras can only show and record video footage and not much more beyond that. As they do not understand what they are watching, they are also unable to do anything about it.

To fight theft, violence, vandalism or fire effectively, cameras must be able to detect and interpret such incidents by themselves. They must also have the capability to cooperate with other systems, such as alarm systems.

This is where the Internet of Things comes into play. It connects network-enabled cameras with other devices and systems that perform other tasks and turns security surveillance into smart safety and security management.

Video surveillance systems built the largest segment in our country. That’s why today modern camera systems are widely used in many areas of life, retail, commercial buildings, stadiums, transportation and public spaces in cities.

Security cameras frame the next technological step in the security surveillance evolution…

The future: smart security surveillance

The times when video surveillance systems only deliver video that must be continuously observed by humans are over. Machines able to record and analyse video data in one go are already available, and they can provide security managers with deep insights instead of single pieces of information.

This will significantly improve security and security-related processes in many areas and industries by enabling faster and more insightful response to any sort of incidents.

Future security surveillance essentially combines 3 technologies that will completely change the game: computer vision, automation and deep-learning, driven by powerful processors and apps on cameras in the IoT. Let's take a quick look at these technologies.

Data is the new digital oil

All these devices at their most basic, simply collect data. This information is used to streamline, manipulate and measure the way you interact with the world. From your online habits to your physical day-to-day routine – every single thing you do or don’t do is, or will very soon be, monitored.

In the case of connected ‘things’ – now known as ‘smart devices’ due to their ability to collect and transmit information – each one sends bytes of data over the internet to an application that interprets and collates that data into valuable insights. Your service provider and the product manufacturer can then use those insights to achieve a variety of objectives – from improving the device’s performance, and your experience of using it, to identifying how or when they should be selling you extra services or products.

What precisely is connecting all of these IoT things

2G, 3G and 4G are terms that we all know and understand well but how about radio, Wi-Fi, NB-IoT or LPWAN? There are various types of connectivity that can underpin the Internet of Things and these latter ones are arguably the most widely used outside of pure cellular connectivity.

When we talk about the ‘internet of things’ it’s not immediately clear which type of ‘internet’ connectivity we’re referring to because many devices are now being designed to intelligently select the connectivity that best suits its needs, based on the following three things:

Power consumption – How much power does the device or sensor need to operate?
Range – Does it need to connect and send data over great distances?
Bandwidth – Will it transmit small or large amounts of data e.g. low bandwidth and high bandwidth?

Two of the most commonly utilised connectivity networks are:

Cellular

Most of us are very familiar with cellular connectivity as it is used around the world to connect our mobile phones to the internet. IoT devices also use cell towers to connect to a cellular network. Cellular connectivity is prolific, has excellent range and the capacity to send high volumes of data over the network but uses a lot of power and, therefore, is not ideal for IoT devices which don’t have access to an immediate power supply and need a long battery life to operate over long periods of time, for instance in rural or agricultural areas.

LPWAN

‘LPWAN’ stands for Low-Power Wide-Area Network, which is a type of radio technology and is so far one of the most ideal connectivity networks available to IoT sensors that are deployed in areas where there is a lack of range. These devices are usually battery-powered and send very small packets of data over the network. This connectivity is ideal when it comes to monitoring utilities such as water, gas and electricity using smart meters and for farming and agriculture to check on water quality, sensing soil moisture and tracking livestock.

Computer Vision

Computer vision is becoming smarter because of more sophisticated algorithms, faster devices, larger networks and access to a wider range of data sets through IoT. This allows machines to “see” and analyze in real time.

“Deep Learning and general AI techniques within computer vision, makes possible what would be impossible to do by the naked eye.” - Matt Candy, Global leader for IBM’s iX creative solutions.

Example: Detect fire and smoke within seconds

Many threats, such as smoke, are difficult for the human eye to detect in videos, especially in poor lighting conditions. Seconds later, however, a fire may have broken out. Security cameras equipped with smoke and fire detection can alert at an early stage and activate the proper safety measures without any human assistance.

Source: Bosch Security Systems

Automation

Speed plays an important role in safety and security. The faster you react to security incidents, the greater the chance of preventing or at least reducing damage. In case of theft in a store, every second counts, because criminals may disappear before security personnel can intervene.

Standard security surveillance via CCTV wastes valuable time because reaction paths between machines and human operators are too long. Smart cameras take a shortcut by saving staff from interpreting videos. They immediately deliver notifications or initiate appropriate actions themselves.

Example: Detect and catch thieves in retail

The "AI Guardman" security camera helps shopkeepers identify potential thieves in time. Software installed on the camera scans live video streams and analyzes the poses of any person it can see. This data is automatically matched against predefined "suspicious" behavior. When it sees something remarkable, it alerts onsite personnel via app for double checking.

Deep learning

“Cameras capture the video, but video analytics captures the value.” (IBM)

Using computers for video analysis is not a new idea. However, there is a problem that slows the development of video analytics: mobile video made on drones or vehicles is full of dynamic variables that can confuse even the most intelligent computers. That's why many companies and startups are working on smart systems using self-learning algorithms.

Deep learning is a machine learning method based on artificial neural networks. Video analytics, which gives security cameras the ability to analyze video data on board, is one application of deep learning. Another application is automation, which embeds video analysis into processes.

The good thing about deep learning is that developers of video analytics apps for security cameras don't have to reinvent the wheel themselves. There are already sophisticated frameworks that simplify developing deep learning models, such as Google's Tensorflow, Microsoft’s Custom Vision and IBM’s PowerAI Vision.

Example: Training object recognition using IBM’s PowerAI Vision

To determine whether workers are complying with safety regulations such as wearing helmets, security cameras need to know what helmets look like. In case a person is not wearing a helmet, a camera could react and alert. This is what a simplified training process looks like…

Source: IBM

Flood Management Assistance

As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem.

Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure?

Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event.

Environmental Control Assistance

Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. 

But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary.

Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security.

Roadway Management & Parking Assistance

Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes.

They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database.

With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders.

Shopper Experience Assistance

In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings.

With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience.

For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked.

Capturing Business Intelligence

Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup.

They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns.

Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping.

A Natural Cross-Over Technology

This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond.

IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.


Monday, August 16, 2021

ELECTRIC STRIKE LOCKS AND MAGNETIC LOCKS

 ELECTRIC STRIKE LOCKS AND MAGNETIC LOCKS

Access control locks on doors have come a long way in the past 30 years or so. They contribute more than you might think to our safety and security while at work, or while spending time in public buildings such as schools, government buildings, and healthcare facilities.

There’s a lot more than meets the eye when it comes to electronic door locking hardware. Because of their importance to safety and security, we thought we’d spend some time exploring two of the most common types of access control locks in use on buildings today — electric strike locks and magnetic locks — and discuss their different features, benefits, and potential drawbacks.

If you own or manage any kind of commercial building, healthcare facility or school, this post will give you a better understanding of these two very popular locks, including some of the advantages and disadvantages of each.

 

You’ll often see the terms “fail-safe” and “fail-secure” when looking at different access control systems. These are important terms to understand because they tell you how the lock will function in the event of a power failure:

·        “Fail-Safe” requires power to lock the door. If power is lost, then the door will become unlocked. (Typically Mag Locks)

·        “Fail-Secure” requires power to unlock the door. If power is lost, then the door will remain locked. (Typically Door Strikes)

It’s also important to have a basic understanding of the different parts and how they function together. Most door locks have three major components that work together to keep the door secure. They include the handle and the latch (the small metal bolt that sticks out of the side of the door when open), which together make up the lockset, and the strike. The strike, or “strike plate” is the metal plate or assembly installed on the inside of the door frame and is aligned to receive the latch and hold it secure.

Electric strikes are electromechanical door locking devices, meaning they are mechanical locks with electronic devices that provide additional functionality.

Electric strikes are used in combination with another form of locking devices, such as a lock set or a panic bar. They are installed in place of the conventional lock strike plate on the inside of the door frame. Electrical power is supplied to the strike, which holds the latch or lock bolt in place, keeping the door locked until the release system is activated.

The type of release system chosen will vary based on the application. Examples of release systems for electric strikes include reception release buttons, a keypad for entering passcodes, electronic key card or fob readers, etc. Once the release system is activated, a hinged piece of metal inside the electric strike will pivot to allow the door to open without having to turn the door handle.

The lock or panic hardware functions independently of the electric strike. Therefore, while the electric strike plate functions to keep the door locked from the outside, even if the power is out, you can still open the door from the inside by turning the door handle or pushing the touchpad of the panic hardware. This is an example of a fail-safe function. However, depending on the application, most electric strikes can be set to either fail-safe or fail-secure using an integral switch.

Magnetic or “Mag” Locks

Mag locks are electromagnetic door locking devices. A mag lock consists of a large electromagnet installed along the top of a door frame and a metal plate on the door that lines up with it. The lock functions by passing an electric current through the electromagnet, creating a magnetic charge that attracts the plate and holds it in place against the door frame. This keeps the door securely locked until the power is removed or interrupted.

Examples of release systems for mag locks include many of the same devices as for electric strikes. When energized, a mag lock can create a retention force greater than 1,000 pounds, making it a very effective lock. That is, until the power is cut. Because mag locks by design require a constant supply of electricity to remain locked, mag locks are fail-safe only — they do not function to keep the door locked from either side when the power is out.

Choosing the Right Locks for Your Building

When comparing magnetic locks to electric strikes, important factors to consider include whether it will be used on an interior, exterior, or fire rated door; the purpose of the door; and the relevant life safety regulations.

Budget concerns, while also important, should be considered secondary to these. Choosing a lock based solely on cost often leads to higher costs in the end when it is discovered that the lock is not code-compliant or that it does not work for the application for which it was intended.

The following table provides a summary of some of the features of each type of lock and some of the advantages and disadvantages that you may want to consider when choosing a locking mechanism for your doors.

Features

Electric Strikes

Mag Locks

Functionality

Electromechanical

Electromagnetic

Works in combination with a mechanical locking mechanism by replacing the standard fixed strike of the lock with an electronically controlled strike.

Works independently of the mechanical door latch by means of an electric current passed through an electromagnet installed on the door frame creating a magnetic charge that bonds to a metal armature plate on the door.

An access control device is used to trigger the strike plate and release the lock bolt or latch.

An access control device is used to cut power to the electromagnet to trigger the release of the lock.

Power Fail Modes

Can be fail-safe or fail-secure.

Only available fail-safe.

Installation

Mounted in the frame, and its wires are typically inside the frame.

Installed on the face of the door and frame, it can be installed relatively easily by most contractors.

Advantages

An electric strike is much less likely to delay egress because it can be easily operated from the inside of the building.

One of the most effective types of hardware for securing both sides of a door.

Lockset can stay locked but the strike releases to allow the power operator to freely swing the door open.

Easy to install with no interconnecting parts.

Acts as a release — Can be used on a door with an automatic opener.

Reliability — with no moving parts, they suffer less damage in an attempted forced entry.

Availability as either fail-safe or fail-secure allows for a wider variety of uses.

Quick release — unlock instantly when the power is cut, allowing for quick release compared to other locks.

Disadvantages

Visible to the door user, which can make it more susceptible to tampering

Potential safety hazard — can slow egress in the event of an emergency.

Complexity of devices typically requires skilled installers

Can fail in the event of a power outage, disabling security.

Must be precisely matched to the hardware on the door, or they will not work

Can become difficult to open the longer the mag lock is continuously locked.

 

Requires battery backups to be secure during a power outage, which requires routine inspection and replacement of batteries.

 

Can be easily tampered with.

Relative Costs

$$-$$$

$$$-$$$$

It is important to remember that door locks in public buildings must meet applicable regulations based on the type of door on which the lock is to be used. Most safety codes pertain to egress doors — those that provide occupants a way to escape the building in the event of an emergency. This includes a number of different types of interior doors and exterior doors.

In most cases, door hardware is required to provide for free egress at all times with hardware that is readily openable from the egress side without a key, special knowledge or effort; and depending on the code, may also require the ability to open in one action. Relevant regulations regarding means of egress can be found in:

·        Chapter 10 of the International Building Code (IBC) and International Fire Code (IFC)

·        Chapter 7 of the National Fire Protection Association (NFPA) 101 Life Safety Code

·        Chapter 11 of the NFPA 5000 Building Construction and Safety Code

Additional regulations regarding the use of locks on fire rated doors can be found in Chapter 6 of the NFPA 80 Standard for Fire Doors and Other Opening Protectives.

You may need one or both types of locks on the different doors within your building. Hopefully, this post has provided you with the information you can use to determine if the locks you currently use for access control are adequately meeting those needs and are compliant with all the relevant codes. If you’re not sure, SSA Integrate can help. We have Certified Access Control & fire experts that can help you determine the best solution to meet your security needs while keeping you compliant with all the relevant codes. Contact SSA Integrate today to learn more.


Sunday, August 1, 2021

Elevator Surveillance Guide

 Elevator Surveillance Guide

Installing surveillance in an elevator can be challenging. Small but wide areas, vandal resistance, and transmission methods all present challenges not found in other areas cameras are installed. In this note, we look at:

  • Form factor: Box vs. dome vs. specialty
  • Resolution: How much is necessary?
  • Transmission: Wired vs. wireless vs laser methods
  • Dealing with electrical contractors

Form Factor

The first decision to make when considering elevator cameras is form factor. Minidome and corner mount are the two most common options in use as they most compact compared to box, bullet, or full sized dome cameras. Other form factors, such as box or bullet may be more easily tampered with due to the low ceiling height of the elevators, and more easily knocked out of position.

Minidome

The key advantage to minidomes is camera choice, as most manufacturers offer cameras in this form factor, with numerous resolution and lens options. These options are not generally seen in corner mount cameras.

However, they are more obtrusive than many corner mount housings, and do not blend into the interior of the elevator as well. Where aesthetics are the key concern, domes may not be preferred.

Corner Mount

This type of mount places the camera in a roughly triangular housing made to cover one of the elevator's corners. Some are sold as unitized housing/camera packages, while other manufacturers sell housings meant to accept a box camera. Size and appearance varies depending on manufacturer:

They key drawback to corner mount cameras is limited availability. Most manufacturers do not offer corner mount options, and those that do typically only offer one or two models, with limited resolution and lens choices. Larger corner housings built for box cameras add more flexibility, but are larger and more obtrusive.

Field of View/Resolution

Given elevators' small size, generally under 10' wide, users typically choose to cover the full car instead of just the doors. This gives them not only the opportunity to view comings and goings, tracking subjects throughout a facitity, but to view potential incidents in the elevator, as well. However, care should be taken that pixels per foot (PPF) does not drop below acceptable levels for recognition if no other cameras will provide facial shots of subjects, e.g. lobby and hallway cameras.

For example, using an actual 103° field of view from an elevator camera with Camera Calculator, we can see the difference between VGA, 720p, and 1080p in a typical 8x8' elevator. Estimating ~9' to target to reliably capture subjects as they enter through the elevator doors, 720p provides 56 PPF in this scene. This is likely enough to provide identification quality video under good lighting. VGA provides only 28 PPF, too low for recognition, while 1080p provides 85, more than enough.

Mounting Height

Since most people look down while walking, and criminals may actively avoid cameras, mounting height in elevators should be carefully considered for the best chance of capture. As we found cameras are typically best mounted as low as possible, with ~8' being a "sweet spot", better able to see those with heads down or hats on while also see over subjects beneath the camera.

This image shows the effects of mounting height and the subject's face angle, displaying the difference in capture quality at various mounting heights with the subject's face level as well as tilted down.

Signal Transmission

Once the camera has been selected, installers must decide how signal will be carried from the elevator. There are three typical options for this:

  • Traveler cable
  • RF wireless
  • Optical laser

Traveler Cable

Connections between the elevator car and the machine room for power and signal are made via a specialized traveler cable. This cable is attached to the car, typically to the bottom, and to the top or center of the shaft. The construction of this cable varies, but it typically contains multiple twisted pair conductors for power and control, and possibly a UTP or coaxial cable for video. 

This image shows cross-sections of various flat traveler cables:

Generally speaking, since these cables are often attached to the top of the shaft, making the cable approximately twice the height of the shaft, UTP is not a usable solution for Ethernet. Buildings of 12-14 stories can easily have a 300' traveling cable, which exceeds the maximum distance category cables can be run, before even considering horizontal runs to an equipment room or IDF. In low-rise buildings, UTP may be an option, however. Fiber-optic and coaxial cables may be considered otherwise.

RF Wireless

The second option is to opt for wireless connectivity, utilizing a pair of wireless APs between the car and bottom or top of shaft. Both are used in practice, with the bottom of the shaft generally chosen for easier servicing. In this case, local power must be obtained from the car, which may involve the elevator contractor. Power is readily available, however, due to lights and air conditioning installed in the car.

Wireless eliminates the issue of necessary conductors in the traveler cable, but presents challenges of its own. Cables and conduits located in the elevator shaft may cause interference, making wireless connectivity unreliable. Very narrow beamwidth antennas may be used to compensate for this, but antenna alignment must be carefully set and maintained over time.

Optical Wireless

Optical wireless uses a pair of laser transceivers, one mounted to the car, the other in the shaft, to send/receive data. This is specified to handle elevator shafts up to 75 floors.

Optical product performance is degraded by dust, dirt, and other debris which may fall in the elevator shaft and as such should be cleaned regularly.

Dealing With Elevator Contractors

Normally, most facilities maintain service contracts with an elevator contractor, since the elevator must undergo routine maintenance. These contractors may be difficult to deal with, as a number of users have shared. They are often hesitant to modify existing traveling cables for new services, simply because it complicates (however slightly) their routine maintenance of the elevator with a system outside their control. If the traveling cable is insufficient to add video, installing a new cable is, most times, cost prohibitive, and may remove the elevator from service for several days. Both of these add up to expenses users may not wish to incur.

To avoid the coordination and expense required to have the elevator vendor add video to a car, users and integrators may attempt to add their own cable to the car. There are two things to be aware of in this case: 

  • Third parties attempting to modify the cable without the contractor's permission will void warranties and service contracts in most cases. Even leaving existing cables alone and simply zip-tying a new UTP cable to it may be frowned upon.
  • According to NEC code, hoistway cables must be listed for use in these applications, and be of type E. Standard UTP, fiber, and coaxial cables do not meet these requirements.

 

Thursday, July 15, 2021

Before Buying Intrusion Alarm System

Before Buying Intrusion Alarm System 

This is a short note on Intrusion or Burglar alarm system. A burglar alarm system is not something you shop for regularly. That’s because it’s an important purchase for your business that is meant to last — so make sure you have the best. While you can always upgrade as new technology is released, you still need to trust that your alarm system will work when it needs to.

In terms of cost, a high-quality alarm system can be expensive but it is an investment that provides peace of mind.

The system charges are generally separate from the monthly subscription costs besides the installation fees. While there is a lot to learn about alarm systems, it’s important to first learn which one would be the best fit for your home by reaching out to the professionals and asking the right questions.

Here are three questions you need to ask before deciding on which home alarm system is right for your home or your small offices:

Question #1: Accreditation?
The first question you should ask is to make sure that the company has the required accreditations to perform the service. There are a lot of companies who claim they have all the required levels of accreditations, but that might not be true. If they are able to produce some level of documentation that could authenticate that, it can’t get much better than that.

Question #2: Type of System?
The second question to ask is the type of system that is best for your business. Some homes are configured for both wired and wireless security systems while some are not. Hence, you need to be sure about it and avoid settling for a type of connection that is not already configured at your facility.

Question #3: How Much?
The most important question to ask is the cost associated with the total installation. Some companies offer incentives like free installation while others may offer discounts on monthly subscriptions.

Since there are so many types of commercial alarm systems available on the market, that suits your needs and your budget; just because a provider promises you the best, doesn’t mean and could be more effective doesn’t mean you necessarily need it.

Question #4: Installation by whom?
This is another most important questing to ask installation, testing & training of system that is best for your business. Both wired and wireless security systems recommended to involve certified installer. Non-certified experienced person may share password and backdoor entry details with hacker and connection that is not already configured correctly as per your needs.

Hopefully, this post has provided you with the information you can use to determine if you going to install. If you’re not sure, SSA Integrate can help. We have Texecom Certified (Level 3) Intrusion experts that can help you determine the best solution to meet your security needs while keeping you compliant with all the relevant codes. Contact SSA Integrate today to learn more.