DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Blog Feature

Access Control | Video Surveillance | Fire Systems | Intrusion Alarms | Security Terms

By: Isabel Leckie
June 22nd, 2023

Underwriters Laboratories (UL) is a trusted resource known around the world for product safety and service certification. Since being founded in 1894, UL examines and tests devices, systems, and material to determine how their performance affects life, fire, casualty, hazards, and crime prevention.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
June 15th, 2023

CCTV, or closed-circuit television, is a type of surveillance system that uses security cameras to monitor and record activities in a specific area. The term CCTV (closed-circuit television) is thrown around a lot when it comes to security cameras, but it isn’t a catch-all term. CCTV refers to an older type of technology in which camera video is stored locally, if at all. Compare this to IP cameras, a more modern alternative in which video is sent over a local private network to be stored on an intelligent video server. This allows for cloud storage, higher video resolution, and even advanced features like video analytics. With IP cameras, video can also be accessed live remotely from a mobile app or desktop browser.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
June 8th, 2023

Tailgating refers to an action in which a person without a valid access credential enters an access control point by closely following another person who did present a valid access credential. The technique used in tailgating is simple but effective. The tailgater waits for an authorized person to scan their access credential into a secured area, such as an office lobby. They then quickly follow the authorized person through the door. Once inside the secured area, the perpetrator can cause damage to the business by stealing confidential information or sabotaging systems, among other things. Tailgating can be particularly difficult to prevent because it relies on human behavior. It is natural for employees to not confront or even hold the door open for those they perceive to be coworkers out of politeness. It is also challenging to detect since security cameras may not capture the act of tailgating. This is why educating employees about the risks of tailgating and enforcing strict access control policies is essential. One way to prevent tailgating is to train employees to be aware of their surroundings and to report any suspicious activity. Optical turnstiles can also be effective solutions to ensure that each person entering a secured area is authorized to do so.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
June 1st, 2023

After a video surveillance security camera captures live video, it is processed and sent over a local private network for storage on an integrated video server (IVS). In some instances, integrated video servers also employ cloud storage of video events. With cloud storage, IVS makes it possible to view and share video clips remotely from your mobile device or personal computer, such as with DGA's OneVIEW system. Depending on your system, your video server may also come with cloud-based system health monitoring and event reports. Integrated video servers integrate easily into existing IT infrastructure and communicate with cloud-based servers for a secure and reliable video surveillance system. With advanced system management capabilities, large amounts of internal storage space, and compression ability, they are designed to meet the needs of virtually any business.

Blog Feature

Access Control | Video Surveillance | Fire Systems | Intrusion Alarms | Security Terms

By: Isabel Leckie
May 25th, 2023

Integration in security refers to the interactivity between different parts of a security system. Here are some examples of what you can accomplish with an integrated security system.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
May 18th, 2023

An Internet Protocol Security Camera is the preferred technology for video surveillance systems. Unlike traditional analog cameras that rely on physical cables to transmit video signals, IP (Internet Protocol) cameras send data over a local private network or the internet to be stored on an intelligent video server. Some applications employ cloud storage of video events, allowing users to access and review footage from anywhere (as with DGA's OneVIEW). These cameras also have higher video resolution and more advanced features like video analytics, making them a popular choice for businesses and organizations of all sizes.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 11th, 2023

Access control systems are designed to regulate and manage the movement of people. One of the essential components of access control systems is the portal, which refers to a physical barrier that controls entry and exit from one space to another. The portal is typically a door, gate, or hatch that is managed by a locking device like a key, code, card, or biometric authentication that grants access. The locking device may also have additional features, such as integration with video surveillance systems or intrusion alarm systems for a more intelligent security system. In addition to managing access, portals can also be used to monitor and record the movement of people whose historical records can be accessed from DGAConnect.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
May 4th, 2023

Bluetooth is a technology standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices. One type of Bluetooth technology that consumes significantly less power is called Bluetooth Low Energy (BLE). This type of Bluetooth remains in sleep mode unless a connection is initiated, which translates to much longer battery life. This is ideal for access control systems since it doesn't use as much power. BLE is the wireless technology used in mobile app-based access credential systems.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
April 27th, 2023

Even if your employees use the correct credentials to gain access to restricted areas, holding or propping the door open can create a security risk. This is why Door Held Open Alerts were created. This feature is part of an advanced physical access control system.

Blog Feature

Video Surveillance

By: John Kolb, CET, CPP
February 7th, 2023

When planning your business security system, it’s important to know the differences and application of outdoor vs indoor security cameras to deter crime. Despite their similar appearance, these security cameras have significant functionality differences.

Blog Feature

Fire Systems

By: Daniel Torpey
May 19th, 2022

You’re going about your day when you receive a letter from the City of New York informing you that your business has an ECB violation. Though resolving ECB violations isn’t fun, it doesn’t have to be difficult.

Blog Feature

Video Surveillance

By: John Kolb, CET, CPP
March 2nd, 2022

If you’re shopping for business security cameras, you might wonder why anyone would bother paying for a professionally installed commercial security camera system at all when you could just do-it-yourself (DIY).