DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Isabel Leckie

Isabel is a Marketing Specialist at DGA.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
August 31st, 2023

Access control is a crucial component of physical security. It is an electronic system that controls the entry or exit of an area. With access control, only authorized personnel are granted entry to restricted areas, which can include a company's main entrance, server rooms, storage areas, and other sensitive locations.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
August 24th, 2023

Access Credentials are devices that contain an encoded ID number that can be captured by an access reader. They are an essential component of modern access control systems, providing a convenient and secure way for individuals to gain access to restricted areas. These devices are designed to store and transmit identification data, which is then captured by an access reader. Some of their different forms include cards, fobs, tags, or mobile apps that can be easily carried around. One of the key advantages of access credentials is the range of encoding technologies they utilize. These devices utilize one or more encoding technologies such as proximity, smart card, magnetic stripe, or Wiegand to store and transmit identification data. Proximity technology, for instance, allows individuals to gain access simply by holding their access credential close to the reader, while smart card technology provides enhanced security through the use of encryption and authentication protocols. With the advent of mobile technology, access credentials can now be stored on mobile apps, making them even more convenient and accessible. With DGAPass, you can easily control access levels for each individual user along with schedules. For instance, you could give Employee A access to your retail location between 8 am and 9 pm and Manager A access from 4 am to 11 pm and so on. Each access point (or door) is also 100% customizable so you can limit who can access storage areas, for instance. All of this can be done at any time on the DGAPass web portal and mobile app.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
August 10th, 2023

Infrared (IR) security cameras can capture black-and-white images even when there is little visible light. This technology is crucial in enhancing visibility and capturing images in low-light or nighttime conditions. IR security cameras are equipped with infrared LEDs that emit infrared illumination. This illumination can then convert the reflected IR light to a grayscale image visible to the human eye, which can then be displayed or recorded for surveillance purposes. By leveraging IR technology, security cameras can effectively monitor areas with little or no available light, such as nighttime scenes or dimly lit alleys and rooms. This enables round-the-clock surveillance and enhances the overall security of a location by providing visibility in challenging lighting conditions.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
July 13th, 2023

Dome cameras are a popular type of security camera characterized by their darkened plastic dome-shaped housing. The dome housing serves both aesthetic and functional purposes. It provides a discreet appearance and makes it difficult for individuals to determine the direction the camera is pointing. The dome housing also protects against vandalism and tampering. Dome cameras are commonly used in indoor and outdoor environments to monitor a wide range of areas, including retail stores, office buildings, public spaces, and more.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
July 6th, 2023

Digital zoom is a feature in security cameras that allows for the selective enlargement of a digital image or video without physically moving the camera lens. Unlike manual zooming, which uses the lens to magnify, digital zoom relies on software processing to enlarge the pixels in the image. For this reason, digital zoom can be easier to use since it doesn't require a technician to come and adjust the lens and can be completed at the tap of a button. However, it's important to note that digital zoom may result in losing image quality and detail. It can be useful for obtaining a closer view of an object or area of interest, but for clear imaging, manual zoom is generally preferred.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 29th, 2023

In access control, fail-safe is a locking method that defaults to the unlocked or open position when power is removed or interrupted. Access systems are universally required by code to revert the locking methods to the fail-safe position upon a fire alarm activation to ensure a safe, fast exit for those inside the premises. This is often done with an electromagnetic lock (mag lock). This locking method consists of a powerful electromagnet and an armature (a metal plate). It is typically used in building entry doors or glass doors where the electromagnet is installed on or in the door frame and the armature is attached to the door. When electrified, the electromagnet keeps the door in a locked position. When a mag lock’s electromagnet loses power, the door will remain unlocked. Overall, fail-safe locking systems are crucial in ensuring safety and reliability, and they are essential for your fire safety compliant access control system.

Blog Feature

Access Control | Video Surveillance | Fire Systems | Intrusion Alarms | Security Terms

By: Isabel Leckie
June 22nd, 2023

Underwriters Laboratories (UL) is a trusted resource known around the world for product safety and service certification. Since being founded in 1894, UL examines and tests devices, systems, and material to determine how their performance affects life, fire, casualty, hazards, and crime prevention.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
June 15th, 2023

CCTV, or closed-circuit television, is a type of surveillance system that uses security cameras to monitor and record activities in a specific area. The term CCTV (closed-circuit television) is thrown around a lot when it comes to security cameras, but it isn’t a catch-all term. CCTV refers to an older type of technology in which camera video is stored locally, if at all. Compare this to IP cameras, a more modern alternative in which video is sent over a local private network to be stored on an intelligent video server. This allows for cloud storage, higher video resolution, and even advanced features like video analytics. With IP cameras, video can also be accessed live remotely from a mobile app or desktop browser.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 8th, 2023

Tailgating refers to an action in which a person without a valid access credential enters an access control point by closely following another person who did present a valid access credential. The technique used in tailgating is simple but effective. The tailgater waits for an authorized person to scan their access credential into a secured area, such as an office lobby. They then quickly follow the authorized person through the door. Once inside the secured area, the perpetrator can cause damage to the business by stealing confidential information or sabotaging systems, among other things. Tailgating can be particularly difficult to prevent because it relies on human behavior. It is natural for employees to not confront or even hold the door open for those they perceive to be coworkers out of politeness. It is also challenging to detect since security cameras may not capture the act of tailgating. This is why educating employees about the risks of tailgating and enforcing strict access control policies is essential. One way to prevent tailgating is to train employees to be aware of their surroundings and to report any suspicious activity. Optical turnstiles can also be effective solutions to ensure that each person entering a secured area is authorized to do so.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
June 1st, 2023

After a video surveillance security camera captures live video, it is processed and sent over a local private network for storage on an integrated video server (IVS). In some instances, integrated video servers also employ cloud storage of video events. With cloud storage, IVS makes it possible to view and share video clips remotely from your mobile device or personal computer, such as with DGA's OneVIEW system. Depending on your system, your video server may also come with cloud-based system health monitoring and event reports. Integrated video servers integrate easily into existing IT infrastructure and communicate with cloud-based servers for a secure and reliable video surveillance system. With advanced system management capabilities, large amounts of internal storage space, and compression ability, they are designed to meet the needs of virtually any business.

Blog Feature

Access Control | Video Surveillance | Fire Systems | Intrusion Alarms | Security Terms

By: Isabel Leckie
May 25th, 2023

Integration in security refers to the interactivity between different parts of a security system. Here are some examples of what you can accomplish with an integrated security system.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
May 18th, 2023

An Internet Protocol Security Camera is the preferred technology for video surveillance systems. Unlike traditional analog cameras that rely on physical cables to transmit video signals, IP (Internet Protocol) cameras send data over a local private network or the internet to be stored on an intelligent video server. Some applications employ cloud storage of video events, allowing users to access and review footage from anywhere (as with DGA's OneVIEW). These cameras also have higher video resolution and more advanced features like video analytics, making them a popular choice for businesses and organizations of all sizes.