Security Answers Blog

Online Camera Demos: What Are You Really Seeing?

Posted by Matt Golueke

Feb 20, 2017 5:00:00 PM

Nothing beats a live camera demonstration.

This is true if the demonstration is similar to the conditions where your security cameras are being deployed.

Considerations for a quality comparison include:

  • camera system - fixed, pan-tilt-zoom, pano
  • lighting conditions - day, dusk, night
  • range to common targets - 50' vs 500'
  • resolution - 1080p, 5MP, 4K

We offer free access to online security cameras for end users and integrators to access in order to compare available resolutions, low light performace, and digital or optical zoom capability.

But, if all you see is what the camera sees, then how sure are you about how far away obvious targets are in the scene? We set out to solve that problem by creating an aerial map of the area around our Maryland office that serves our exterior demonstration security cameras. Click on the map image below to access our security camera demonstraion web portal.

CAUTION: Don't forget how important DORI (Detection, Observation, Recognition, Identification) is when selecting cameras for your next project. Don't know about DORI? This is something every security professional should know...check it out here. DORI is a standard that helps end users determine the perfect camera resolution, lensing, and lighting combination required to capture critical surveillance footage.

 

Nick explains recent updates to our online demo cameras in this short video:

 

Click here to access our security camera demonstration portal.

  

 

Click here for more information about personalized demonstrations.

 

Click here for FREE expert security advice.

Read More

Topics: Online Demos

Thermal Imaging Explained

Posted by Shaun Meehan

Feb 16, 2017 9:01:00 AM

Thermal imaging is becoming more popular for security applications.

Thermal cameras equipped with video analytics provide a spectacular level of detection. This is because the limitation of visible cameras isn't applicable to thermal cameras. Once a detection is made, then it's time to go to the visual cameras and investigate the findings of the thermal alarm trigger and evaluate if a reaction to a possible threat is in order.

Below is an interesting technical explanation of thermal imaging. Far below are a few more videos about thermal imaging as well as resources for security professionals seeking ultimate detection capabilities. Enjoy!

Comparison videos between visible and thermal security cameras:

              

Bosch VOT-320 Fixed Thermal Camera details

 

 

Bosch MIC-612 Pan-Tilt-Zoom Thermal Camera details

 

 

Contact our team for expert security advice

Read More

Topics: Technical - Simplified

Support: Who to Contact

Posted by Matt Golueke

Feb 15, 2017 9:00:00 AM

Without proper support, a project can "go sideways" quickly.

Support is critical at all stages of a security or communication project. Partnership ensures an ongoing, supportive environment from system design to installation to system usage.

In order to best support you, we've gathered some key support points of contact and valuable links for our largest manufacturers:

 

Bosch

 

Commend

 

Comnet

 

Read More

Topics: MidChes Value Add

Integrated Security Solution Benefits

Posted by Matt Golueke

Feb 14, 2017 10:54:07 AM

Integrated security systems were once an operational benefit only available to enterprise-class facilities.

Now, businesses and organizations of all sizes are moving from multiple, disparate security systems to one unified security solution.

This was primarily due to the cost involved to get these systems to work together. Several factors now allow implementation of integrated security systems to business and organizations of all sizes.

Integration Partners

3rd Party systems can be integrated together through programs like the Bosch Integration Partner Program. Many top-tier manufacturers offer services that allow 3rd party systems to "work together" to create solutions that operate in unison and compliment each other. This reduces duplicate efforts and streamlines operations when a trigger occurs.

One Brand Integration

For many organizations, 3rd party integration may be daunting. Cost, feature overkill, and implementation complexity are just a few reasons. Manufacturers like Bosch, who provide end-to-end solutions provide simplified integration between their systems, have made one-stop-shopping cost effective and easier to implement.

Take a look as our colleagues walk through an overview of end-to-end integration examples that may help secure your facility a little easier. Further below, deep dive into the solutions that resonate with your security challenges.

 

Deeper-dive: Managing an Integrated System

  Technologies in These Videos
     Bosch Video Management System (128+ Cameras)
     Divar IP 3000 (1-32 Cameras)
     Divar IP 7000 (1-128 Cameras)
     Bosch IP Cameras
     Integrated Intrusion Brochure
          B Series Guide
          G Series Guide

     Bosch Fire Detection Devices

     

 

Deeper-dive: Integrating Video, Access Control, and Intrusion Detection

     Technologies in These Videos

     Bosch Video Management System (128+ Cameras)
     Divar IP 3000 (1-32 Cameras)
     Divar IP 7000 (1-128 Cameras)
     Bosch IP Cameras
     Integrated Intrusion Brochure
          B Series Guide
          G Series Guide

  

Deeper-dive: Securing Sensitive Areas

     Technologies in These Videos

     Bosch Video Analytics
     Bosch IP Cameras
     Bosch Intrusion Detection
     Bosch Communication

 

 

 

Deeper-dive: Monitoring Systems 24x7

     Technologies in this Video

     Bosch Cloud Based Services
     Bosch IP Cameras
     Central Station Partner Information

 

 

 

Deeper-dive: 3rd Party Integration

     Technologies in this Video

      Integration Partners
      Bosch IPP Homepage

 

 

 

 

Deeper-dive: Helping Specifiers Design Integrated Systems

 

Deeper-dive: Biometric Reader Enrollment

     Technologies in this Video

     Integrated Intrusion Brochure
     B Series Guide
     G Series Guide
     Bosch Biometric Readers

 

 

 

Contact Us for Free Security Advice

 

 

Read More

Topics: Technical - Simplified, Your Challenge, Our Solution

Voice Communication: Why We Do It

Posted by Matt Golueke

Feb 6, 2017 9:41:44 AM

Digging deeper than "how" is critical. "Why" is much more important and is what drives our team.

Last week we headed north to Mahwah, NJ to dig deeper into the solutions offered by Commend. Audio communication puts a commanding, calming, clear voice in the air that moves people away from danger to toward safety.

Knowing about the "widgets" and the resulting solution is a key component of the value we bring to our security partners. Developing a deeper understanding SIP,  intelligent volume control, and IP speakers are just part of the equation.

However, better understanding how we can impact the safety of the people our partners protect really hit home.

Brad Anderson, National Sales Manager at Commend, Inc. put "why" in perspective this video:

 

Learn more about leveraging SIP for voice communication here

 

Learn about IP public address speakers here

 

Learn more about Commend voice communication solutions online here

 

Connect with our voice communication experts here

 

Read More

Topics: MidChes Value Add

Try Before You Buy & Lunch with Nick

Posted by Matt Golueke

Feb 4, 2017 4:45:47 PM

"I wish I could have tried it before I bought it."

Nick Hoyt takes a second during his busy day to chat with us while on the way to see a security professional who would like to try out a security camera before having to purchase it. 

Learn more about Try Before You Buy here

 

Contact our team here

 

Read More

Topics: MidChes Value Add

Remote Cameras: Power and Data Considerations

Posted by Shaun Meehan

Jan 31, 2017 9:06:00 PM

Security professionals are often faced with putting a camera or other device out on a pole in the middle of a parking lot or on a building where there's no continual power or data infrastructure.

If you don't have the ability or budget to trench and install dedicated power and data cabling to the pole or maybe the power is only on when the light comes on, then you have to consider alternative options for power and data connections.

In this video, Shaun Meehan discusses an alternative power solution for similar situations as well as a convenient way to send data without hardwired infrastructure in place.

Contact our team for a site visit

Request a parts list

Learn more about Netwave online

 

Read More

Topics: Technical - Simplified, MidChes Value Add, Your Challenge, Our Solution

Are You Using (or Managing) a Safe ATM?

Posted by Matt Golueke

Jan 30, 2017 9:00:00 PM

While Russian hacking has ruled the data security news since the election, other data is still at risk and is being compromised....at ATMs...still...

Financial and retail institutions have a LOT to protect: data, assets, staff, brand, and visitors just to name a few.

ATM users need to worry about quite a bit as well: personal safety, financial security.

And still we are seeing attacks using ATMs to gather information from financial institutions reports the SIA.

The SIA's Special Feature by Mike Baker outlines the vulnerabilities of ATMs in this informative article that introduces the term "Jackpotting."  According to Baker, ATMs are ubiquitous in our society. There are approximately three million of them worldwide, and about 432,000 in the United States, a number expected to rise to 438,000 by 2019. Even though mobile banking is exploding in popularity, a whopping 75 percent of U.S. consumers still use ATMs as a part of their daily banking activities. (click here for the complete article)

To help institutions better gather evidence and protect customers and their financial assets, we have assembled several resources:

  • Payment Card Industry (PCI) guidelines

 

  • Credit card skimming prevention

 

  • [VIDEO] FBI's guide to retail surveillance

 

  • Protecting IT data racks

 

  • Data security and your camera system

  • Data Security: Trusted Platform Module (TPM)

 

 

Read More

Topics: MidChes Value Add

Door Control Hardware Selection

Posted by Matt Golueke

Jan 29, 2017 9:00:00 PM

Security Door Controls (SDC) has released their online solutions catalog.

SDC is recognized for the developing the first electrified lockets approved for stairwell door applications. Today, SDC HiTower®, Selectric® and Electra® premium grade electrified mortise and cylindrical locks are installed in thousand of buildings dominating skylines worldwide.

SDC has earned twelve SIA New Product Achievement and Security Industry Finest Awards since 1997. In addition, SDC has received numerous SIA New Product Showcase certificates of recognition for Commitment to Innovation and Excellence in New Product Development.

Access the SDC online catalog here:

MidChes represents SDC in Pennsylvania, Southern NJ, and Delaware.

Contact us here

Read More

Topics: Your Challenge, Our Solution

State Legislatures Tackled School Security Issues

Posted by Matt Golueke

Jan 27, 2017 9:00:00 AM

New Jersey – Lawmakers from the New Jersey Legislature successfully enacted legislation addressing school security vulnerabilities throughout the state.

SIA commends state Sen. Patrick Diegnan, D-N.J., for his instrumental leadership introducing two sets of companion bills that allow local school districts to use emergency reserve funds to finance school security improvements and another bill that mandates the incorporation of certain school security measures during the architectural designs of future school construction projects.

Respectively, NJ S. 2241/A. 2158 and NJ S. 2439/ A.3348 were supported by SIA—and in Fall 2016, Gov. Chris Christie, R-N.J., signed both pieces of legislation into law.

Connect with SIA here...

Read More

Topics: MidChes Value Add

Subscribe to Email Updates