The use of CCTV systems has grown dramatically over the last few years and is set to continue. Its focus has been to increase security and crime prevention in a variety of places from company premises to private residences.
The use of CCTV systems has grown dramatically over the last few years and is set to continue. Its focus has been to increase security and crime prevention in a variety of places from company premises to private residences.
Closed Circuit Television (CCTV) is a system including cameras, lenses, monitors and recording equipment to enable visual surveillance of live or recorded images. As the name would suggest it is a closed circuit meaning that all components are connected directly and, unlike a television broadcast, cannot be viewed by just any receiver.
The primary functions of CCTV are: Surveillance: To detect incidents and co-ordinate a response. Recording events: For use as evidence if required, and to assist with any investigation thereafter. Deterrence: To discourage criminal activity. All achieved with the use of CCTV security equipment.
Sygnovate Systems has extensive experience in supplying, installing and maintaining CCTV systems, from simple single camera units, to multi camera systems which integrate with other electronic systems over multi-site set ups. We have a proven record of understanding of customers’ individual needs and providing cost effective CCTV solutions.
A digital CCTV system uses a DVR (Digital Video Recorder), to store recorded images, rather than using video cassettes as analogue systems do. The advantages of a digital system are: higher image quality; ease of data retrieval and copying of evidence; convenient and more compact storage options; increased data such as time and date; playback of images whilst system is still recording.
A DVR, or Digital Video Recorder, is a device that records video in a digital format to a disc drive. A DVR is capable of recording images from multiple cameras whilst simultaneously allowing users to view live and recorded images. Any recorded images are stored on the internal hard drive of the DVR for a preset amount of time, to allow the user to retrieve any incidents when required.
All DVR’s installed by DS Systems are supplied with CCTV viewing software enabling the user to view images either locally or from remote locations. The DVR is connected via an Ethernet cable to the users router and software loaded on to the users remote PC. The software is then set up with the IP address of the router and the user can view images from the CCTV security equipment from wherever they are.
Remote monitoring consists of integrating a CCTV system with perimeter protection, with a professionally managed remote monitoring service thus providing security 24 hours a day, 7 days a week. Digital cameras are installed at strategic locations around the premises and linked to external movement detectors, if one of the detectors is triggered, images from the cameras are instantly sent to the remote monitoring center. The highly trained operators at the central station can then identify and act on the necessary action. Upon observing anything suspicious or on system activation, the monitoring team reacts immediately by issuing verbal warnings over an intercom link or alerting police or specified personnel.
With motion detection set on a DVR, any camera will record a higher number of frames per second from the particular camera when there is movement on the screen. This saves space on the hard drive by recording fewer images when there is no activity on a site and means that if there is an incident, and then a more detailed series of images is recorded.
An increasing number of organizations of all sizes have been recognizing the benefits of replacing their old key based systems for controlling access to buildings with electronic access control systems. The benefits in lower running costs and ease of administration are well proven.
Access control systems regulate entry into or within premises, through controlling doors, barriers, turnstiles or gates via use of a keypad, key-fob, token or a swipe-card.
Access control systems can be used anywhere there is a need to regulate access into or around premises. Specific areas of premises can be controlled, limiting who can enter certain parts at given times. Access can be gained with the use of a key fob, a swipe-card, or a PIN code, meaning that a large number of keys do not have to be carried.
The systems we install and maintain can be linked to a PC using access control management software, or stand-alone systems with a control unit that holds the information. With a stand-alone system, a series of enrolment and shadow cards are used to regulate the distribution of key fobs. PC based systems can control larger numbers of doors, barriers, turnstiles and gates with capacity for up to 10,000 users.
A proximity reader, swipe-card reader or keypad is connected to a door controller which, if a PC based system is in operation, is then connected via data cable to a PC. The door controller retains all the information of users allowed access via that particular entrance. The door controller also controls the operation of the entrance. If connected to a door it will release the trigger of an electric lock or magnetic lock when access is granted. if connected to a gate, barrier or turnstile the controller will give a signal which will open the entrance.
If a token or key fob is lost or stolen on a stand-alone system, it can be deleted from the system with the use of the shadow card that is supplied with each fob meaning access can no longer be gained with that token. If a token is lost or stolen on a PC based system, the token can either be deleted on the software or marked as lost. If marked as stolen it will register on the software when somebody attempts to use it.
Biometrics refers to a type of personal identification that relies upon physical characteristics that are not shared by any other individual, such as a fingerprint or an iris
Fingerprints are impressions made of the minute ridge formations and patterns found on the fingertips. No two persons have exactly the same arrangement of patterns, and the patterns of any one individual remain unchanged throughout life. While other characteristics may change, fingerprints do not, offering a virtually infallible means of personal identification.
Fingerprint technology is valuable whenever additional security; accuracy and personal identification are desired. This type of technology provides fast and accurate verification and identification of employees for purposes of Time and Attendance and Access Control for any size company. In addition, it is fast and easy for employees to use without supervision. This method can even be used to enhance the security of existing Time and Attendance systems.
Biometric technology such as fingerprint verification improves employee attendance and payroll accuracy. A study published in the magazine of the American Payroll Association, called PayTech (Jan. 2002), concluded that:
Buddy-punching accounts for up to 5% of the total payroll
Overpayments caused by human error can range from 1% to 8% of total payroll costs
Biometric technology saves money by eliminating buddy-punching, because the employee’s presence is absolutely essential in order for them to clock-in at work. Fingerprint technology also eliminates the need for time cards which can be manipulated, lost, stolen or damaged, and are costly to replace.
In addition to the financial benefits, biometrics also provides several other benefits to businesses. Companies that use biometric technology have more secure environments: fingerprint verification allows employers to easily restrict access to each area of a facility by setting clearance levels for each employee, protecting assets from theft or abuse.
Biometrics also eliminates the need for building keys or access cards, which can be lost, stolen, forgotten or misplaced. And, when used for both Access Control and Time and Attendance, employees will never forget to clock in or out, as applying their fingerprint to the reader for granting passage through the entrance and exit means automatic, accurate tracking of time spent ‘on the job’.
A hands-free access control system is very similar to a standard access control system but each door controller will be connected to a hands free interface meaning that tokens registered on the system can be read from a greater distance. This means anyone entering premises with their key fob can leave it in their pocket, bag, or even car, not having to physically present it to the reader in order to gain access.
The security of buildings has never been as vital as it is today. The right entry system can provide you with security by being able to identify visitors through speaking to them or viewing their image on a CCTV screen Audio door entry systems allow the user to receive a call and talk to the person at the entry panel. Video door entry systems allow the user who receives a call to see and talk to the person at the entry panel.
A door entry or intercom system consists of a front panel with an audio or video unit; and handsets in each of the premises within the system. This enables a visitor to call the required property from the front entrance and for the occupier of the property to speak to, or see the person calling.
If the entrance you use is either an automated door or gate, the door entry system can be set up to open that entrance if you wish, with just the push of a button.
There is no limit to the number of flats or properties on a door entry system. It is only constrained by the size of the entrance panel on which, each property requires a call button.
The door entry system can control any number of entrances. An entrance selector is fitted which determines from which entry panel the call has initiated.
Door entry systems can integrate with a number of other systems. The front panel can be fitted with an access control keypad or access control proximity or swipe card reader. If a video entry system is in place, the camera can be connected to a CCTV system so the images can be viewed and if necessary recorded. An audio entry system can be connected to your home phone line so no additional handsets are required.
Many Sygnovate systems employ what we call Nuisance Prevention Circuitry (NPC) which is smart enough to adjust itself to a variety of environmental conditions such as thunder, jackhammers, or airport parking lots. If NPC activates, only the zone that activated three times in 60 minutes is ignored. All other zones remain active, and disarming with the transmitter doesn’t reset the NPC; it’s only cleared when the ignition is turned on. Best of all, NPC brings that sensor back online in an hour if no further problems are detected.