Month: September 2020

mobile-based-access-control-system

Why Your Growing Company Needs a Mobile Based Access Control System

Save money when growth requires a new office space

Contrary to popular misconceptions, the installation and setup costs for a mobile access control solution are cheaper than installation for a traditional server-based access control solution. Plus, a mobile access control system means you don’t have to buy keycards and fobs, which can save money.

It wasn’t always like this. We used to have only two options for access control: A traditional server-based access control solution with prox keycards or an old-school cylinder lock and brass key system. While legacy keycard systems provide more functionality than their analog counterparts, they use outdated technologies like the Wiegand protocol that is insecure and vulnerable to hacking. Plus, all the hardware associated with legacy systems can be expensive. Fortunately, we now have a third option: mobile access control systems. These systems use cloud-based and smartphone-based access control—and they’re less expensive to install than the hard-wired alternatives.

Design and setup are faster and easier

Smartphone access solutions save time and prevent headaches when moving offices. For one, mobile access solutions let you add the convenience of smartphone credentials seamlessly, whether you’re implementing a new system or integrating with an existing one. No need to manually program individual keycards, or fobs. Access control system technology is easy to install (technicians can even use the existing wiring from your legacy system!), you’ll be up and running with a high-tech access control solution in no time.

Mobile access is more secure

There are other reasons why smartphones are better, such as the fact that you can’t copy a smartphone at the corner convenience store, but for just $11, you can duplicate most keycards and key fobs. Long story short: It’s pretty clear why smartphone-based access control is more secure.

What kind of access solutions do you want?


At Dicsan Technology, we’re passionate about matching our clients with our patented, mobile access control technologies. We will guide you through the process of selecting the perfect configuration for your needs to maximize security, ease of implementation, and cost savings—so you can safeguard your facilities without the delays, headaches or expenses of legacy access solutions.

Office-Relocation

Office Moving Checklist: Your Guide to Successful Relocation

Create a new office move checklist

If you’re a small or medium-sized company, we recommend planning office move checklists six months in advance to give plenty of time to get organized. However, a large-scale corporate office move checklist can take years to plan out and execute. Ultimately, you should start creating a business moving checklist as soon as the relocation is signed and sealed.

  • Determine your complete new office move checklist. Hold a meeting with team leaders and managers to make sure you include important steps from each department.
  • Designate someone to be the “moving coordinator” who will oversee the entire corporate relocation operation.
  • Work with the moving coordinator to create teams that will be responsible for the different moving tasks you’ve identified.
  • Work with the moving coordinator to put a deadline on every task, but be realistic about expectations. Planning extra time to accommodate unexpected delays and changes is important for staying on schedule.

Your designated moving coordinator will need to oversee all the details and completion of your building relocation checklist, so you’ll want someone who is skilled at planning and organizing. You also want someone who represents your company well in the community and excels at making intuitive, split-second decisions as challenges arise.

Choose your moving team

Depending on your management style, you might want to let the moving coordinator delegate every task on the business relocation checklist to the rest of the team. But if you prefer a more hands-on approach, you can work closely with the moving coordinator to help select the right team members for the job. Schedule weekly or bi-weekly meetings with the moving team to ensure the project stays on track.

  • Refine the list of moving tasks for each department.
  • Decide the order in which to carry out the tasks.
  • Delegate responsibilities for tasks within the department.
  • Work with the moving coordinator to put a deadline on every task.
  • Create and adhere to target dates for completion.
  • Decide which team members will be in charge of preparing the new spaces.

To perform the above tasks successfully, it’s best to have employees on the moving team that understand workflow and project management, office tech, workspace requirements, and office security concerns for the departments they handle. Tech-savvy team members will be crucial to disassembling and safeguarding computer equipment and other electronics during the move.

Plan and enforce your deadlines

Depending on where you’re moving or the circumstances of the relocation, you might need extra time for preparing the new office space. Make sure that your moving date and current lease termination date are planned with sufficient time to get prepared. With these considerations in mind, select a moving date with plenty of wiggle room in case a surprise circumstance delays the office relocation process.

Create your office moving budget

A moving budget is essential to keeping track of office relocation costs. This office moving budget template covers the most essential costs associated with relocating a business. A do-it-yourself move could be more cost-effective for smaller offices, but you might want to spend a little more on the following (especially if you’re a larger company):

  • Moving insurance: Moving insurance for offices will cover the cost of lost or damaged items during relocation.
  • Full-service mover: A full-service moving company that specializes in office relocations will manage the packing and moving of furniture and equipment. A professional mover like this will save time, prevent injuries to employees, and protect your furniture and equipment from damage.

Contact your service providers

  • Package delivery services like UPS, FedEx, and the U.S. Postal Service.
  • Subscription services like food and snack delivery, newspapers, magazines, paper, and office supply deliveries.
  • Telephone and internet service providers — be sure that all the information services are working before the tech department arrives to put together the computer network and workstations in the new office.
  • Utilities — contact your utility providers and make sure you have a couple of days of overlap between the utility cutoff dates and the moving date.
  • Marketing and printing companies — you’ll need to order new stationery, business cards, and promotional materials that feature the new address and location.

Install new office security systems

There’s no better time than an office move to consider a security or technology update. To get the most out of a new office security system, consider installing a cloud-based access control system. For example, Openpath’s access control offers cutting-edge technology to automate your new office’s security infrastructure, with a sleek and modern design that will look great in the new space. Utilizing the latest end-to-end encryption technology, Openpath lets your team members enter the office hands-free simply by having a configured smartphone in their pocket. Other features include access by wearing an Apple Watch, using an app, or using a traditional keycard.

fractal, abstract, background

How to future proof your security system

Regardless of the exact dollar amount spent, many end users have similar expectations. They want to make sure they can continue to leverage the benefits of their newly installed access control or surveillance system for several years in the future.

System Maintenance

Invest in regular system maintenance of both your access control and surveillance systems. Most manufactures have a publish update schedule on a quarterly basis or semi-annual basis. However, even though a manufacturer will issue software updates to either enhance a system or to fix a bug, never allow an update to be done to your system without first verifying the update with your systems integrator. It’s important to have a valid software agreement so you can be notified when there’s an update and when it’s completed. You also want to make sure any software updates are proven to be stable.

Reputation and Capacity

When buying a new access control system, it’s important to review the technology being installed to determine whether it is reliable and from a reputable company. While installing cutting-edge technology from a start-up access control company may be exciting, the viability of that company in two or five years should be taken into consideration. Also, make sure that the system you are implementing can grow as your business grows. For access control systems, keep in mind the system’s reader capacity and cardholder count.

Network Infrastructure

Before beginning any installation project, make sure to review your network infrastructure. While your network might have an appropriate amount of bandwidth to handle a small load of surveillance cameras, what would happen if you needed to add five or even 10 high-definition cameras in the future? A common problem in the residential market today is that many homeowners are adding surveillance cameras to their networks, but their low-cost internet service cannot handle the data upload requirements for these cameras. The same can happen in the business world, where a network can quickly exceed capacity due to a lack of knowledge about its limitations.

By taking a few simple steps, in conjunction with working with your security systems integrator, corporate security directors can protect the investment they are making in their security system by ensuring it has the proper foundation to handle future needs.

meeting, business, architect

Is it legal to install surveillance cameras in the office?

In most states in the USA is legal for employers to install video surveillance cameras in the office/workplace if they are for a legitimate business concern. Many employers use video cameras to prevent internal theft or for security purposes, which generally is permissible as long as the employers notify workers about the surveillance. There may be legal limits on the places where cameras can be placed, as well as notice requirements and limits to extent to which surveillance can occur. But there are some instances where it is not allowed. Employers may not use surveillance to monitor union activity, some state laws limit how and where employees may be monitored.

When employers use video cameras to monitor employees, they must have a legitimate business reason. State privacy laws may determine the extent at which video monitoring is considered legitimate and therefore lawful. As a business owner, you always risk the liability of a lawsuit if you choose to install surveillance cameras in the office.

Reasons and methods for workplace video surveillance

Prevent internal theft

If a business is having an issue with internal theft or employees that are engaging in dishonest behavior, employers have a legitimate reason to install security cameras in the office.

Secure employees

The state will allow employers to use video surveillance to protect any individuals who may be threatened by criminal acts.

Ensure productivity

Business owners have indicated that surveillance cameras can help to improve workplace productivity and motivate employees to perform their day-to-day duties without slacking off.

Location of cameras at work

It is quite common for retail stores, banks, restaurants, and other employers that interact with the public to use video surveillance in locations where security or theft-prevention is important. But while it is fair to say that an employee working behind the counter at a jewelry store has no reasonable expectation of privacy, employees who work in cubicles probably expect some privacy. Additionally, employers may have a difficult time proving that employees who only interact with other employees at the workplace need to be monitored.

Notice requirements and hidden cameras

The cameras need to be placed in public areas. In most states, installing video surveillance cameras in the workplace is considered illegal if they are placed in certain areas. Specifically, areas that are intended for employee rest or comfort. These are some of the areas that are not considered public include:

  • Restrooms
  • Locker rooms
  • Break rooms
  • Employee lounges

Hiring a surveillance camera installer

When you are looking to get a surveillance system installed every aspect is important. Every project is different there are some questions that most of the business’s leaders might be wondering before signing a contract. You will have to make sure your installer is using the appropriate hard drive otherwise you will face performance problems no matter if you invested in the latest high-end IP network cameras with features like Pan-Tilt-Zoom and Fisheye lenses. Every project is different but you will have to confirm what kind of hard drive your installer plans to use and that they are equipping you with the right tools for your project. Not using the right storage built for the security industry could mean losing important footage, as dedicated surveillance hard drives are more reliable, durable, and advanced than desktop hard drives.

Having security cameras installed at your home or business is no longer a matter of a luxury security device but necessary equipment that is a must when it comes to the protection of your family, employees, and property. Without a doubt, a surveillance camera or security camera system plays a crucial role in protecting your loved ones and your properties. The installation of security cameras has helped millions of people to protect what matters most to them. Truth is, having a security camera system is one of the best investments you can make in an attempt to protect your assets.

At Dicsan Technology, we believe a quality surveillance camera system exists for every budget. We offer our clients cutting-edge and easy-to-use security cameras solutions. We also provide customized security camera systems tailor to meet the specific security requirements, needs, and budget of our clients. Dicsan Technology offers a wide variety of commercial, residential, and industrial security cameras designed for any environment, lighting condition, and security cameras application. Our security camera system truly doesn’t disappoint.

Your surveillance system might be a significant investment for your company, and protecting the connections running to and from each of your cameras is essential to maintain your system for the long-term. Be sure that you understand that weatherproofing precautions your installer is using and what happens if they fail. Your installer should stand by their work. If their installation or weatherproofing work fails, the cost of repairs or replacement isn’t covered by your camera’s manufacturer’s warranty.

If you’re going to pay an installer thousands of dollars to install your system and run network cable, you want to make sure that the cable they’re using will be sufficient for future generations of security cameras. Truth is, we often take our security needs for granted. Don’t leave your family or employees’ safety up to chance. When installing a security camera system, there’s a lot to consider when selecting the right surveillance camera equipment and security cameras features to best suit your security needs. The surveillance system products you choose must be reliable, of the highest quality, and easy to use. Whether you’re thinking about installing a new security camera system or upgrading your old security cameras, you will need expert advice at the best price.

visitor-management-system.jpg

What is a visitor management system?

Visitor management systems improve the safety and security of your organization. The world is changing there are economic and health pressures that have motivated many organizations to use digital visitor management systems. With the addition of access control panels, you can even provide temperature monitoring and protective mask detection.

Visitor verification

Visitors can be verified before they access to the building. Visitors will have QR codes that can be used for verification purposes, and if the visitor management system is quite advanced it will provide advanced registration for appointments. When the guest arrives, they present their QR code and their authentication key along with capturing a live photo, and they are digitally logged into the premises.

Blacklisting

Whether it is a school or a commercial facility, you can blacklist anyone to deter unwanted visitors from gaining access. All the information collected from a visitor can be compared with another database to assure safety. The system allows you to establish a watch list that can be used in schools and other organizations where there is a need to control the entry of a person, organization, or country. The system also allows you to tag an individual for a “keep your eye on” in suspicious situations.

The system can be very helpful in controlling the entry of individuals that are involved in custody disputes where one of the parents is not allowed to see the child.

Emergency notifications

Visitor management system can trigger emergency notifications in case an unexpected situation may arise. You can customize who receives the warnings and what the message says. And if the front desk does not have the time to type a message there is an optional emergency (SOS) button to alert.

Visitor management reports

Better visitor management software allows you to run extensive reports from students to contractors to visitors. The reports can be exported in a CSV format or excel- whichever fits your needs. These reports allow you to review all the organization’s visitors.

Visitor management and access control

By integrating the visitor management system into the access control system, you can assure that the person can only enter certain controlled areas of the organization. The visitor badge can be used to open certain doors but not others. It can even control an elevator so that the visitor can only reach a specific floor.

long-range-access-system

How long-range access control systems work

Long-range access control systems are similar to the standard IP door access control systems. They read a credential and determine if the door or gate should be opened. While the standard systems have a very short range, measured in inches, the long-range readers can operate at a range of over 25 ft. When you want to open a gate to a parking garage from your vehicle, you really can’t use a standard reader. You need a system that provides a much longer range.

All the readers use the same technology for communicating with the credential. The standard short-range IP door access control readers use frequencies of 125KHz or 13.56MHz. These standard credentials are called proximity cards or smartcards.

This proximity card system consists of two components, the reader, and the credential.

The proximity system has an inventive way of providing power to the credential (or card). It actually uses the energy sent from the reader’s antenna. The credential includes an antenna, a capacitor, and an integrated circuit that contains the ID number. When the card is placed within range of the reader, the antenna coil, and capacitor, which form a tuned circuit, absorb and store energy from the field. This energy is rectified to direct current which powers the integrated circuit. The chip sends its ID number or other data to the antenna coil, which transmits it by radio frequency signals back to the reader unit.

Long-range access control reader systems are very similar except they use larger antennas for the reader. The larger antenna allows more energy to be directed at the credential. Some systems use passive credentials while others use active credentials. The active credentials include batteries so the credential must be replaced when the battery dies.

The long-range reader uses higher frequencies, such as 865MHz, or 902MHz. Since this is a different frequency than the standard door readers, the credentials are different. These special credentials are available as a card or as a stick-on tag for the vehicle.

The same access control software (TVIPTirSoft) is used for standard readers and long-range readers. This means that all the readers can be integrated into the organization’s system (except using different credentials). You can select IP door access readers that use proximity credentials, or even biometric readers.