DGA Security Blog
Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.
Access Control | Security Terms
By:
Isabel Leckie
January 4th, 2024
Biometric readers scan an individual's unique morphological characteristics such as a fingerprint, palm, voice, iris, or face as a form of access control. Fingerprint and palm readers are the most popular choices due to their ease of use and high level of accuracy, but DGA also employs modern facial recognition readers, which are highly convenient and accurate forms of access control.
Video Surveillance | Security Terms
By:
Isabel Leckie
October 19th, 2023
A wide-angle lens is a camera lens with a short focal length, providing a broad field of view. It captures a wider perspective, making it suitable for surveillance applications for more expansive spaces like parking lots, where capturing a wide field of view is important for comprehensive surveillance coverage.
Video Surveillance | Security Terms
By:
Isabel Leckie
October 12th, 2023
A telephoto lens is a type of camera lens with a long focal length, allowing for magnification and capturing distant subjects in detail. It has a narrow field of view, which results in a close-up view of the subject, making it ideal for surveillance applications where long-range monitoring is required. Telephoto lenses are commonly used in security cameras to monitor focused areas such as hallways or alleys.
By:
Isabel Leckie
October 5th, 2023
V-Code stands for verification code. It is the confidential numeric code that you select to authenticate yourself with DGA representatives. In order to request information or make changes to your account, you will be asked to provide your V-Code. Each authorized employee should have their own V-Code.
Access Control | Security Terms
By:
Isabel Leckie
September 28th, 2023
Fail-secure refers to a locking mechanism that defaults to a secure or locked position when it experiences a failure or power loss. This is the opposite of fail-safe, which defaults to an open position when power is lost.
By:
Isabel Leckie
September 21st, 2023
An Emergency Notification List contains the contact information for the individuals who DGA will attempt to contact in the event of an alarm activation or any other emergency situation. By maintaining an up-to-date list that includes accurate email addresses and mobile phone numbers, you enable our monitoring center to promptly alert you to any alarm signals or potential threats.
Access Control | Security Terms
By:
Isabel Leckie
September 14th, 2023
Also known as an Electro-Magnetic Lock, a mag lock is a highly secure and reliable locking method widely used in various settings, from commercial buildings to residential properties, typically used on building entry doors and glass doors. Designed with a powerful electromagnet and an armature (a metal plate), this locking system is secure and convenient.
Access Control | Security Terms
By:
Isabel Leckie
September 7th, 2023
Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the person’s facial contours. Facial recognition technology offers a seamless and efficient way to authenticate users for access control.
Access Control | Security Terms
By:
Isabel Leckie
August 31st, 2023
Access control is a crucial component of physical security. It is an electronic system that controls the entry or exit of an area. With access control, only authorized personnel are granted entry to restricted areas, which can include a company's main entrance, server rooms, storage areas, and other sensitive locations.
Access Control | Security Terms
By:
Isabel Leckie
August 24th, 2023
Access Credentials are devices that contain an encoded ID number that can be captured by an access reader. They are an essential component of modern access control systems, providing a convenient and secure way for individuals to gain access to restricted areas. These devices are designed to store and transmit identification data, which is then captured by an access reader. Some of their different forms include cards, fobs, tags, or mobile apps that can be easily carried around. One of the key advantages of access credentials is the range of encoding technologies they utilize. These devices utilize one or more encoding technologies such as proximity, smart card, magnetic stripe, or Wiegand to store and transmit identification data. Proximity technology, for instance, allows individuals to gain access simply by holding their access credential close to the reader, while smart card technology provides enhanced security through the use of encryption and authentication protocols. With the advent of mobile technology, access credentials can now be stored on mobile apps, making them even more convenient and accessible. With DGAPass, you can easily control access levels for each individual user along with schedules. For instance, you could give Employee A access to your retail location between 8 am and 9 pm and Manager A access from 4 am to 11 pm and so on. Each access point (or door) is also 100% customizable so you can limit who can access storage areas, for instance. All of this can be done at any time on the DGAPass web portal and mobile app.
Video Surveillance | Security Terms
By:
Isabel Leckie
August 10th, 2023
Infrared (IR) security cameras can capture black-and-white images even when there is little visible light. This technology is crucial in enhancing visibility and capturing images in low-light or nighttime conditions. IR security cameras are equipped with infrared LEDs that emit infrared illumination. This illumination can then convert the reflected IR light to a grayscale image visible to the human eye, which can then be displayed or recorded for surveillance purposes. By leveraging IR technology, security cameras can effectively monitor areas with little or no available light, such as nighttime scenes or dimly lit alleys and rooms. This enables round-the-clock surveillance and enhances the overall security of a location by providing visibility in challenging lighting conditions.
Video Surveillance | Security Terms
By:
Isabel Leckie
July 13th, 2023
Dome cameras are a popular type of security camera characterized by their darkened plastic dome-shaped housing. The dome housing serves both aesthetic and functional purposes. It provides a discreet appearance and makes it difficult for individuals to determine the direction the camera is pointing. The dome housing also protects against vandalism and tampering. Dome cameras are commonly used in indoor and outdoor environments to monitor a wide range of areas, including retail stores, office buildings, public spaces, and more.