Integration in security refers to the interactivity between different parts of a security system. Here are some examples of what you can accomplish with an integrated security system.
An Internet Protocol Security Camera is the preferred technology for video surveillance systems. Unlike traditional analog cameras that rely on physical cables to transmit video signals, IP (Internet Protocol) cameras send data over a local private network or the internet to be stored on an intelligent video server. Some applications employ cloud storage of video events, allowing users to access and review footage from anywhere (as with DGA's OneVIEW). These cameras also have higher video resolution and more advanced features like video analytics, making them a popular choice for businesses and organizations of all sizes.
Access control systems are designed to regulate and manage the movement of people. One of the essential components of access control systems is the portal, which refers to a physical barrier that controls entry and exit from one space to another. The portal is typically a door, gate, or hatch that is managed by a locking device like a key, code, card, or biometric authentication that grants access. The locking device may also have additional features, such as integration with video surveillance systems or intrusion alarm systems for a more intelligent security system. In addition to managing access, portals can also be used to monitor and record the movement of people whose historical records can be accessed from DGAConnect.
Bluetooth is a technology standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. One type of Bluetooth technology that consumes significantly less power is called Bluetooth Low Energy (BLE). This type of Bluetooth remains in sleep mode unless a connection is initiated, which translates to much longer battery life. This is ideal for access control systems since it doesn't use as much power. BLE is the wireless technology used in mobile app-based access credential systems.
Even if your employees use the correct credentials to gain access to restricted areas, holding or propping the door open can create a security risk. This is why Door Held Open Alerts were created. This feature is part of an advanced physical access control system.