DGA Security Blog
Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.
Access Control | Video Surveillance | Fire Systems | Intrusion Alarms | Security Terms
By:
John Kolb, CET, CPP
May 25th, 2023
Integration in security refers to the interactivity between different parts of a security system. Here are some examples of what you can accomplish with an integrated security system.
Video Surveillance | Security Terms
By:
John Kolb, CET, CPP
May 18th, 2023
An Internet Protocol Security Camera is the preferred technology for video surveillance systems. Unlike traditional analog cameras that rely on physical cables to transmit video signals, IP (Internet Protocol) cameras send data over a local private network or the internet to be stored on an intelligent video server. Some applications employ cloud storage of video events, allowing users to access and review footage from anywhere (as with DGA's OneVIEW). These cameras also have higher video resolution and more advanced features like video analytics, making them a popular choice for businesses and organizations of all sizes.
Access Control | Security Terms
By:
John Kolb, CET, CPP
May 11th, 2023
Access control systems are designed to regulate and manage the movement of people. One of the essential components of access control systems is the portal, which refers to a physical barrier that controls entry and exit from one space to another. The portal is typically a door, gate, or hatch that is managed by a locking device like a key, code, card, or biometric authentication that grants access. The locking device may also have additional features, such as integration with video surveillance systems or intrusion alarm systems for a more intelligent security system. In addition to managing access, portals can also be used to monitor and record the movement of people whose historical records can be accessed from DGAConnect.
Access Control | Security Terms
By:
John Kolb, CET, CPP
May 4th, 2023
Bluetooth is a technology standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. One type of Bluetooth technology that consumes significantly less power is called Bluetooth Low Energy (BLE). This type of Bluetooth remains in sleep mode unless a connection is initiated, which translates to much longer battery life. This is ideal for access control systems since it doesn't use as much power. BLE is the wireless technology used in mobile app-based access credential systems.
Access Control | Security Terms
By:
John Kolb, CET, CPP
April 27th, 2023
Even if your employees use the correct credentials to gain access to restricted areas, holding or propping the door open can create a security risk. This is why Door Held Open Alerts were created. This feature is part of an advanced physical access control system.
By:
John Kolb, CET, CPP
February 7th, 2023
When planning your business security system, it’s important to know the differences and application of outdoor vs indoor security cameras to deter crime. Despite their similar appearance, these security cameras have significant functionality differences.
By:
Daniel Torpey
May 19th, 2022
You’re going about your day when you receive a letter from the City of New York informing you that your business has an ECB violation. Though resolving ECB violations isn’t fun, it doesn’t have to be difficult.
By:
John Kolb, CET, CPP
March 2nd, 2022
If you’re shopping for business security cameras, you might wonder why anyone would bother paying for a professionally installed commercial security camera system at all when you could just do-it-yourself (DIY).
By:
John Kolb, CET, CPP
February 8th, 2022
Searching for a business video surveillance system can sometimes feel like wading through a swamp of confusing terms often misused and mistaken for one another. Learning about the most common video surveillance mistakes and misconceptions will make you better informed on what your business needs are, even before speaking to a security professional.
By:
Steve Bartlett
January 4th, 2022
If you're reading this article, you might be wondering if your security provider has a SOC report, why security providers should undergo SOC audits, or even what a SOC audit is. While we don’t offer SOC audits at DGA, they are something we highly recommend to businesses dealing with sensitive information.
By:
Michael Reynolds
July 29th, 2021
When it comes to door/window contact sensors used in business security systems, the most common mistake we see is either overuse or underuse of these devices. Sometimes we see a contact sensor installed on every door and window regardless of location – which likely increased the installation cost without adding additional security benefit. Other times, we see doors and windows that are easily accessible from the outside missing a contact sensor, making the business vulnerable to potential intrusion attempts.
By:
Larry Weintraub
April 30th, 2021
When we are designing business security systems, we sometimes get pushback from clients about whether they really need motion sensors in addition to door/window contacts. At other times, we get pushback from our clients’ architect who asks us: “Do we really need a motion sensor in that spot? Can you move it to a more hidden location?”