Blog

DGA Security Blog

Our business security and fire systems experts answer the most frequently asked questions, no holds barred. Read on.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
December 18th, 2024

Facial height surveillance cameras are custom-designed and built DGA cameras mounted at face height with high-resolution sensors that clearly capture the faces of the people near them. They are often installed near entrances to record the faces of people entering a business. Facial height surveillance cameras are a great solution for businesses with high-value goods as they effectively deter those who might try to obscure their face via something like a brimmed hat which can sometimes pose a problem with ceiling-mounted security cameras.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
December 11th, 2024

In access control systems, a transaction refers to a record containing pertinent information about an access control event. Transaction history refers to the activities of the access control system that can be recalled on demand. These activities include access granted, access denied, and unauthorized attempts classified by credential, door, and time, such as an entry attempt at the main entrance using an invalid badge at 3:00 PM. Transaction history is an important tool in managing your access control system and knowing who has gained access to what and when. Regularly checking transaction history can help you to keep your business secure by monitoring for suspicious activity.

Blog Feature

Security Terms

By: Isabel Leckie
December 4th, 2024

Environmental Monitoring is the process of continuously observing and recording environmental conditions in specific areas of your business premises. This includes tracking factors such as temperature, humidity, the presence of water, power failure, and other critical conditions. Real-time alerts are generated each time a significant change is detected, allowing you to respond quickly and prevent potential damage. Environmental threats like water leaks, extreme temperatures, and high humidity can be just as damaging as theft or fire. For example, a sudden increase in temperature or a water leak in a server room can lead to equipment failure, data loss, and significant downtime. Similarly, in a stockroom, excess humidity could ruin sensitive inventory. Environmental monitoring systems, such as those provided by DGA, are designed to protect sensitive areas within your business, such as stockrooms, server rooms, and other critical spaces. These systems are equipped with sensors that detect changes in environmental conditions, such as temperature fluctuations or the presence of water, and immediately notify you of any potential threats.

Blog Feature

Fire Systems | Security Terms

By: Isabel Leckie
November 20th, 2024

Redundancy in a monitoring center refers to a duplication of critical systems such that if any component of the monitoring infrastructure fails, there is a backup in place. There are three different levels of redundancy: cold, warm, and hot.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
November 13th, 2024

Dual-factor authentication, also known as two-factor authentication (2FA) or multi-factor authentication (MFA), requires two pieces of evidence (credentials) to be granted access.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
November 6th, 2024

Wide Dynamic Range (WDR) is a technology commonly used in security cameras that balances the light in high-contrast images to produce a crisp, high-quality image. WDR is often applied in outdoor security cameras where there is greater unpredictability in lighting.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
October 30th, 2024

A high-security tag is a type of access credential in the shape of a small, round sticker. Other types of access credentials include access cards, key fobs, and mobile-based apps.

Blog Feature

Video Surveillance | Security Terms

By: Isabel Leckie
October 10th, 2024

Unlike a wide or narrow angle lens, a varifocal lens is a camera lens that can be adjusted to provide either a wide or narrow field of view. Varifocal lenses have more versatility than other types of lenses as they can be adjusted for the environment they are in, making them suitable for open spaces like parking lots and tight areas like hallways or alleys. They are often found in standard dome cameras which are the most widely used type of dome camera.

Blog Feature

Intrusion Alarms | Security Terms

By: Isabel Leckie
September 5th, 2024

DGA’s Supervised Opening and Closing service is the watchdog that oversees our customers' intrusion systems. If the intrusion alarm is not armed at closing or disarmed outside of the schedule provided to us, our Monitoring Center will contact the appropriate person to confirm that the action is authorized. In the event of an unscheduled disarming, if we cannot obtain a valid verification code, we will notify the appropriate authorities and follow the customer provided instructions.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
August 22nd, 2024

An elevator access control reader is an important part of your access control system that manages elevator access to floors within a building. Elevator readers are typically mounted within an elevator near the floor buttons and look like normal access readers. Just like other types of access control readers, elevator readers can accept multiple forms of access credentials, including mobile, tag, fob, etc.

Blog Feature

Security Terms

By: Isabel Leckie
August 15th, 2024

A plenum is a space between the structural ceiling and a drop-down ceiling used for air circulation for heating, cooling, and ventilation. Plenum-rated cables have special insulation that makes them fire-resistant and non-toxic during a fire condition. If your space has a plenum ceiling, the cables used in the ceiling space need to be plenum-rated to avoid a building code violation.

Blog Feature

Access Control | Security Terms

By: Isabel Leckie
July 18th, 2024

Anti-passback is a process or software control that prevents a user from allowing someone else to utilize his or her access credential to enter a specific entry point after the user has entered the protected area.