Tuesday, February 9, 2021

How to choose the video surveillance security cameras?

 

You will have asked yourself many times how to choose the video surveillance security cameras and what are the most important features to consider when choosing the system that best suits your needs.

Once you have chosen the recorder and the technology you just have to decide the camera, but which one to buy?

The questions you need to ask yourself before choosing your video surveillance camera are mainly four:

1.    What is the place to keep under control? Internal or external?

2.    What is the budget to be used for the purchase?

3.    What is the precision of the camera you are looking for? Do you want to analyze faces and small details? Or do you want a broader overview?

4.    Will the cameras be visible or hidden?

Models of video surveillance cameras

BOXED cameras

These cameras are often used in the past and can only be used indoors with the advantage of being able to change the optics installed on it. Boxed cameras In order to be able to install this type of camera outdoors, it is necessary to use adaptable containers supported by heaters or cooling fans. This type of cameras are very little widespread lately, their TRUE advantage is the possibility of using different types of optics, very far from those usually available on the market.

BULLET cameras

The Bullet camera is perhaps the most widespread in the world of video surveillance. It is defined Bullet (bullet) for its shape, the main advantage of this camera is the immediate association as a video surveillance camera, making the idea of ​​the controlled area clear. It is usually a camera placed outside, which is why it is essential to protect it from atmospheric agents such as rain and snow, in fact it is often supported by a "hat" that can protect the device from water or sunlight, this to prevent it from being blinded or wet.

Where possible, it is recommended to take a camera with a "hat" that can be repositioned forwards or backwards as needed. Another aspect concerns the illuminators which can be of different types, depending on their power, in fact they increase or decrease the shooting area. Finally, it is appropriate to evaluate the need for the joint. A camera can have a joint articulated on 2 or 3 axes, usually the two axes allow you to position the camera on the vertical or horizontal, the third axis allows a complete 360 ​​° rotation.

When to use the bullet camera? When you want to clearly understand the resume point and if it is required to use it outside where the optics must remain covered.

DOME cameras

The domes are cameras typically used indoors but positioned in a protected area they can also be suitable outdoors.

Why indoor?

There are 2 main dome models:

1.    the "EYEBALL"

2.    and normal DOME

Due to their characteristic, they are unable to protect the lens from dust or rain, as a result, if placed outside, the glass would easily be covered with dust, or worse, with rain, drastically reducing the yield of the shot, this is the main reason why a dome camera is NOT used outdoors or at least is NOT directly exposed to light or bad weather. They are often used in refueling stations because they are small and easy to place under their covers. In addition, the DOME, in the presence of mirrored or smoked glass, has the great advantage of NOT letting the target position know exactly, in this way the attackers will not see exactly the framed area and any hidden corners.

A particular model of dome cameras is the one with Fisheye fixed optics , which allows a panoramic view of 180 ° or 360 °.

Discover all our DOME cameras!

All the cameras presented now also exist in "MOTORIZED" mode. This typology can be structured on 3 axes, hence the abbreviation PTZ:

1.    PAN: horizontal movement both to the right and to the left

2.    TILT: vertical movement both upwards and downwards

3.    ZOOM: lens shift and focal control

DOMESTIC cameras

Domestic cameras They are ALWAYS IP cameras, typically with shapes as in the photo, and depending on the models also provide for the possibility of rotation on the Vertical and Horizontal axes (PT, Pan & Tilt), they can be reached remotely through an application and are ideal in those conditions servants where we want to see what is happening at home in the event of an alarm. It is NOT always possible to connect them to a recording system, many have a memory card on board to record the event (detected by the motion sensor).

PTZ cameras

PTZ cameras usually have a particular shape related to the movement and rotation they can perform. The PTZs have a partially protected lens which guarantees less maintenance, some of them also have a squeegee useful for cleaning the same. The ptz have technical characteristics usually very advanced compared to normal cameras such as a particularly powerful zoom and illuminators for long visions. They are very useful cameras in large areas because they allow the programming of well-defined routes, called patrols, which guarantee more targeted shots and therefore greater control of a given area. In recent years PTZs have been used more and more both for the advanced functions that characterize them such as video analysis and for the size of the area they can capture. The greater diffusion of these products in recent times has allowed a lowering of costs, a point in their favor;

MICRO CAMERAS

Micro cameras are ideal for being hidden anywhere thanks to their small size. These cameras support different types of technologies and differ in resolution, optics and functionality, characteristics to be evaluated according to the purpose of use.

Despite their small size they can make high definition audio and video footage. Micro cameras can be placed outdoors, indoors and inside moving objects such as vehicles or bags.

They operate on battery or DC power supply, can be equipped with SD slot or internal memory and allow you to start a recording with a button or remote control.

The disadvantages are largely due to the Privacy aspect which must be assessed from time to time to the current limit in terms of resolutions, but the latter aspect has recently been largely overcome. In the micro cameras there are different "lenses", which allow a narrower or wider vision depending on the installation point, the one in the photo is of the "PINHOLE" type which allows you to expose the only hole in the lens in a visible way,

CAMOUFLAGE cameras

The camouflaged cameras have the same circuitry as the "micro cameras" inside but are simply integrated in boxes with different characteristics (in the photo an alarm sensor, with the "hole" present where the recording takes place). By their nature, this type of cameras should never be used in the workplace and in the public sector, as they are not legal in terms of legislation, also in this case there are different resolutions and characteristics according to the needs,

Read also: Are you looking for Abdul Rimaaz Business Consultant England

 The characteristics of video surveillance cameras

 The resolution of the cameras

One aspect to keep in mind when purchasing a camera is the resolution of the recorded images. Choosing a video surveillance camera means taking into account the number of vertical and horizontal lines, today you will find resolutions up to 12Megapixels, a good resolution to be able to clearly detect what is happening goes from 1 to 2 Megapixels, then for long distances or for large areas it is recommended to go further.

 The sensitivity of the cameras

This feature measures the minimum amount of light needed to record an image, the higher the sensitivity the lower the light needed to obtain high resolution videos.

Of fundamental importance is the light condition in which the area to be recorded is located. Just to answer the various brightness problems, you can choose Day / Night video surveillance security cameras in Chicago with filter, IR illumination with artificial infrared, cameras with Starlight function (or starves, if you like) that guarantees excellent performance in shooting with minimum lighting and cameras with WDR (Wide Dynamic Range) technology capable of recording details even in critical backlight conditions.

If we have not yet clarified your doubts or need technical support, we at Getstealth are always available and ready to provide detailed information.

 

Wednesday, February 3, 2021

Types of access control: which to use in each situation

 

Have you ever heard that someone "was in the wrong place at the wrong time"? This expression has everything to do with today's text. It usually refers to someone who has suffered something because he or she is not supposed to, but sometimes it can be even worse.

 

Imagine that you have priceless assets at home or in your office. In addition to financial resources, they are important to you and losing them is unimaginable. How could it be possible to protect the environment so that nothing unforeseen or improper can happen?

 

 In addition to investing in monitoring with images, alarm systems and security equipment, it is essential to adopt specific types of access control, in order to prevent unauthorized persons from entering. This restrictive measure is valid both to eliminate the risks of a crime, such as theft or robbery, and to block circumstances such as accidents, which can result in property damage.

 Managing the entry and exit of people is, above all, providing more security for those who frequent a house, company or condominium. But some solutions are not the most suitable as they prevent access even to those who must enter certain areas. How, then, to combine practicality and efficiency in the management of access permissions?

 There are a number of devices that can be used in environments of different sizes. But given the numerous device offerings, each with its own specifics, what is the ideal solution for each situation?

 House, condominium or company: know the types of Access Control in Chicago

 In homes, access control can be done at external gates to identify residents and visitors, at the garage door and at the main doors of the house or apartment.

  • Doorphone  - equipment that works with an internal telephone and an external extension, such as a wireless intercom, and allows you to answer the door without leaving your home.
  • Video intercom - with the video intercom, in addition to talking to the outside environment, you can see the visitor - even in times of low light, and open the garage door or gate.
  • Digital locks for the entrance doors - the digital lock is practical: it does not require the use of keys, freeing access by means of passwords, proximity cards or biometrics. There are overlapping models , which can be placed next to the conventional lock, as well as recessed ones , all with anti-burglar alarm, open door sensor, password protected function and automatic locking.

 In the condominiums

 In this case, as it is necessary to manage a larger number of people, the devices also need to be able to register more users. There are still more access areas, so it is worth having different equipment.

  • Condominium access control system - this type of integrated solution makes the entry and exit of people and vehicles efficient, in addition to allowing the management of common areas. Accesses can be done in different ways: by biometrics (fingerprint access), vehicle tag, vehicle remote control, proximity tag, intercom and password, all integrated into an electronic concierge, providing security, practicality and comfort to residents of the condominium . In addition, it records and manages the entire flow of people and vehicles through state-of-the-art devices and has a condominium access management system, a software that shows in real time detailed information about users, such as photos, license plates and locations accessed with date and time. Understand how control is done for:
  • Vehicle entry and exit - the opening of the gates can be done by remote control or by vehicle tag connected to the long distance vehicle reader, which causes the gate to open automatically when the vehicle with the tag approaches the garage. When integrated into the management system, it also registers the vehicles that accessed the condominium;
  • People entering and leaving - access can be done in different ways - passwords, tags and biometrics - and must also be integrated into the management system;
  • Management of common areas - spaces such as a ballroom, gym and swimming pool also gain more security and there is better management of use with the use of access controllers. In these cases, the most appropriate is to use devices with a password or proximity tags release and also keep the records updated and integrated into the management system. Thus, in the case of some depredation, for example, the liquidator can easily identify the plaintiff.
  • IP video system for condominiums - the system brings the image quality of IP technology to video door equipment. If the visitor is not served by the apartment, the system offers the possibility of recording audio and video messages, which can be accessed later by the resident. If the visitor chooses not to leave a message, the system automatically takes photos, allowing the resident to see who called his apartment during his absence. The resident can also answer and make internal calls, allow access or monitor the security cameras of his condominium from inside his apartment.

 In companies

 To control access to the company or strategic areas of the organization - security room, CPDs and data centers, finance and stock, for example - equipment similar to condominiums can be used. Thus, the entrances and exits of the institution, both for employees and service providers, can be efficiently managed through passwords, tags, approach cards, biometrics or facial recognition.

 In addition, the solutions can also be linked to management software that stores reports and enables remote, real-time management, authorizing or removing permissions easily and quickly.

 Regarding access control for companies, we suggest reading these two other articles: " Access control systems: the various benefits of the application ", which shows more advantages of the solution, such as overtime management; and “ Shared business: how to control people's access ”, which brings specific solutions to this new and growing market niche.

 The different levels of access control security

 As we have seen, there are different products to allow and manage the access of people and vehicles in homes, condominiums and companies. Each product has its features and objectives.

 But another point that deserves attention is the level of security that identification technologies offer. Depending on the type of access control chosen, there are one or more user authentication and release methods. And they can be listed in this way, according to their degree of efficiency and reliability:

  • Level 1 for the password keypad - the most widely used method, it allows access by registering a numerical sequence for each user. In many equipments it is possible to identify the typed sequence, as well as the numbers can be passed (intentionally or not), facilitating access by third parties before being blocked in the system;
  • Level 2 for the proximity reader - cards or tags containing a radio frequency identification (RFID) chip are used for release. The user receives a card or tag (to be returned or not) that needs to be approached by the reader, positioned next to the gate, elevator, access ratchet or entrance door. The greatest weakness of this system is that users can lose or pass on the card, so that it can be used improperly by third parties before being blocked by the system;
  • Level 3 for the biometric reader - in this case, access is through fingerprint recognition, which is a unique data for each individual. Thus, the person's information is linked to his fingerprint, and each time he accesses the environment, he must insert his fingertip into the reader. To avoid failures, companies that have quality readers should be chosen for faster, more accurate and reliable verification;
  • Level 4 for facial recognition- it is the most accurate and the most difficult to be circumvented. This is because the recording is made by measuring points on the face, such as the length of the jaw line, size of the skull, distance between the eyes, width of the nose, among others, making it even more reliable. Through the camera and the equipment's facial reading software, a face is automatically encoded in a digital sequence and attached to the individual's record. Thus, every time it passes through the controller, the facial information will be compared with the database. The person is identified, regardless of the haircut, the use or not of glasses, for example, and access is allowed. It is worth noting that the system only performs facial reading, not recognizing photographs or other images such as documents, for example.

Related Post: 5 reasons to invest in your company's access control

 

4 reasons to invest in an alarm system for your store

  Why invest in an alarm system for your store? Anyone who owns an establishment knows how much energy and resources were used to acquire i...