DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
July 11th, 2024

A fixed lens is a wide-angle lens that cannot have the position adjusted. This type of lens provides a broad field of view and can be great for monitoring large areas such as parking lots. The position of the lens will be set by the technician during installation and can be adjusted manually later.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 27th, 2024

Also known as an Authority Level, Access Levels control which users can access what doors, cabinets, or drawers during specified time periods. A user can be assigned one or more Access Levels depending on their role. Think of Access Levels as logical groupings within your business, such as departments, floors, or work shifts that share the same access requirements. Each Access Level is comprised of where (specific doors) and when (schedules). Depending on their role, a user can be assigned one or more Access Levels. With DGAPass, you can easily control Access Levels for each individual user along with schedules. For instance, you could give Employee A access to your retail location between 8 am and 9 pm and Manager A access from 4 am to 11 pm and so on. Each access point (or door) is also 100% customizable so you can limit who can access storage areas, for instance. All of this can be done at any time on the DGAPass web portal and mobile app.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 13th, 2024

Turnstiles are physical barriers that control pedestrian traffic flow and access at security checkpoints. They are designed to ensure that only authorized individuals are permitted entry, thus providing an additional layer of security. Turnstiles come in various customizable options, ranging from simple waist-high turnstiles to more sophisticated full-height ones to suit different security needs. Furthermore, turnstiles have evolved with the latest technology, including biometric scanners and contactless access systems. This integration of technology makes entry authorization secure, but still quick and easy for users. DGA's exclusive Facepop™ identification technology integrates with turnstiles to instantly present stored visitor images upon the presentation of credentials, further enhancing security measures.

Blog Feature

Fire Systems | Security Terms

By: Isabel Leckie
June 6th, 2024

A fire watch is a temporary measure that involves having fire guards at a premises continuously monitoring a building or part of a building to identify and manage fire hazards. Fire guards possess an F-01 certificate of fitness for fire guard issued by the New York City Fire Department (FDNY). Monitoring a building includes detecting early signs of fire, raising an alarm in case of a fire, notifying the fire department, and performing other fire safety tasks as directed by the NYC Commissioner. A fire watch becomes necessary when the fire protection system is under any condition of impairment (such as a broken sprinkler system, standpipe/hose system, fire pump, fire protection water supplies, fire mains, fire alarm systems, etc.).

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 30th, 2024

Electric strikes are a common locking method used in modern access control systems. They consist of a hinged catch that releases to open the door when an authorized credential is presented to the reader. Electric strikes can be configured to be fail-safe or fail-secure, depending on the type of door they are installed on. Typically, electric strikes are configured as fail-safe to allow for safe exit from the premises. Although electric strikes operate on different hardware than magnetic locks, they follow the same principles of access control.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 23rd, 2024

An Access Control Unit (ACU) is a panel to which all door-locking hardware (see Electric Strike and Mag Lock) and credential readers are connected. The ACU functions as the traffic controller as well as the primary power source for all the devices connected to the access control system.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 16th, 2024

A two-person rule, also referred to as an escort rule, is a highly effective access control security measure that requires two authorized cardholders to be present in order to grant access to a specific area or item, such as a door or display case. This feature is often used to protect sensitive locations like specific doors, product storage areas, vaults and safes, and server rooms. By requiring the presence of two cardholders, the two-person rule ensures an added layer of security, minimizing the risk of unauthorized access or potential breaches. This feature is a great way to layer additional security elements to your physical access control system. While financial services firms, banks, jewelry businesses, cannabis growers and operators most frequently request these advanced features, they offer useful applications in many other types of businesses and buildings.

Blog Feature

Fire Systems | Security Terms

By: Isabel Leckie
May 9th, 2024

Authority Having Jurisdiction (AHJ) are government organizations, offices, or individuals that have the power to enforce and interpret the requirements of a fire code and approve equipment, materials, installations or procedures. They are a critical aspect of ensuring the safety and effectiveness of fire systems and fire system monitoring. By working closely with the AHJ, installers and monitoring centers can demonstrate their commitment to maintaining a safe and reliable system for detecting and responding to fires.

Blog Feature

Intrusion Alarms | Security Terms

By: Isabel Leckie
May 2nd, 2024

Holdup Buttons are discreet buttons that can be used to alert your monitoring center to an emergency. They silently send a signal to the monitoring center, which will immediately notify the police of the emergency. Due to the serious nature of a Holdup Button alert, the monitoring center will not contact you to check for a false alarm. Your security systems provider will work with you to find a location in your business that allows for the most discretion and convenience.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
April 25th, 2024

A Credential Reader, also known as a Card Reader, captures an access credential's encoded data and transmits it to an Access Control Unit (ACU). The ACU then determines whether to grant or deny access based on the cardholder's access rights.

Blog Feature

Video Surveillance | Intrusion Alarms | Security Terms

By: Isabel Leckie
March 7th, 2024

Thermal cameras are intrusion devices that detect and capture thermal radiation emitted by objects and individuals. Unlike traditional cameras that rely on visible light, thermal cameras use thermal imaging. Thermal cameras detect and measure the heat energy emitted by objects and convert it into a visual representation called a thermogram. Thermal cameras excel in challenging lighting scenarios, including near darkness or adverse weather conditions such as fog, smoke, or haze. This capability makes thermal cameras particularly valuable in applications such as outdoor perimeter surveillance.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
February 29th, 2024

A mobile access credential is a convenient app installed on your employees' smartphones that allows them to gain access to an access point by simply tapping or twisting their phones near the access point. This technology utilizes BLE (Bluetooth Low Energy) or NFC (Near Field Communication) which offers reliable and accurate access. Mobile access credentials widen your access control options beyond the more common access fobs and cards and can replace or supplement the use of physical access credentials.