Welcome Eastern Security Systems Customers

Welcome to the Alarm New England family! We are a local and family-owned company with offices in Connecticut, Rhode Island, and Massachusetts. Our teams of technicians, service, and support personnel will work hard to be sure you are satisfied.

One thing that was very important in this transition is that nothing changes for you, our valued clients. Your monthly rate will not change, your monitoring center will not change, your contract terms will not change. We are proud to say the amazing staff of Eastern Security Systems you have come to know over the years will be staying on to serve you – as will Frank Simeone!

We will be joined by the 100 dedicated employees of Alarm New England to provide you with the best service our industry has to offer.We look forward to getting to know you. In the meantime, if you need anything at all, please contact us at: 857-445-4010.

Please take a look around our site! We offer affordable solutions to help get you get rid of phone lines, control the system via an app or add cameras and smart home automation to your system. If you need anything at all, please click below to let us know how we can help!

Contact Us

About Alarm New England, Inc.

Founded in 1972 by Douglas Curtiss, Alarm New England, headquartered in Rocky Hill, CT, is one of the largest privately owned security companies in the Northeast. The company provides intrusion detection, fire alarm, video surveillance and access control products and services. With offices throughout Connecticut, Massachusetts and Rhode Island, Alarm New England offers a network of resources, utilizes leading technology and provides a strong commitment to customer service.

Learn More About Alarm New England

Components of an Access Control System

Keeping track of your employee turnover, stored inventory, employee information, and valuables in display cases can be tricky.

Each business owner has unique security needs that can easily be met by an access control system. But what exactly are the components of an access control system? In this overview, we will discuss this question in more detail.

Access Control System Hardware

Here is a brief guide to various access control system parts.

Key cards and fobs

One of the things that buildings have to replace quite often is keys. However, when you have an access control system in place, key cards or access cards take the place of keys. Key cards will not only save you money on key replacement costs but are also easier to store.

Key cards allow you to access your building or certain rooms in a building by simply scanning or swiping them through a reader. Because each card is uniquely encoded, you can determine what door it can access. Essentially, this means that some areas of your building can remain inaccessible if need be.

Key cards are normally no larger than a normal bank card, which means they can easily fit inside a wallet. You can disable a key card at any time. In other words, if you lost your card or it got stolen, you won’t need to worry about any unwelcome visitors being able to access your facility.

You can also get fobs or key cards that grant access based on proximity. These work using radio-frequency identification (RFID), and you simply need to hold up the card or fob to the reader to gain entry.

Key card readers

One of the most important parts of a door access control system is the card reader. This electronic device scans the entry cards to grant your access to a building or room. While there are several types of card readers, they are all programmed to read the unique code of an entry card.

Decide which type of card reader will work best for your business before investing in an access control system. Card readers normally attach to the door itself or can be mounted to the wall next to the door they control.

The more restricted areas you have, the more card readers you will need. The great thing about them is that you don’t have to enter a password to enter. You can simply swipe, scan, or insert your key card to enter the room.

Keypads

If you prefer to not use entry cards to gain access to a building or restricted area, then keypads may be the perfect solution for you.

With a keypad, you don’t have to keep tabs on any access control parts. Instead of scanning an entry card, you can enter a passcode on a numeric keypad to enter a building or room.

However, it doesn’t have to be an either-or situation. You can use both card readers and keypads in your access control system.

Keypads act as an extra layer of security. You can use both a card reader and a keypad at the same door if need be.

Biometric readers

Keyless access systems

If you don’t want to carry around a key card or remember a pin code, then you could opt for a keyless system or smart lock. This can function using your smartphone. The reader uses Bluetooth to communicate with your phone and grant access via an app.

Keyless systems are convenient and secure as you need to have the right credentials on your phone in order to gain access.

Locking components

Every door needs a lock. With access control systems, this lock is electronic so that it functions alongside the card reader or keypad to lock or unlock the doors when access is granted to a building or a room.

There is more than one type of electronic hardware available, such as electromagnetic locks or electric strikes. The electric lock hardware you install will be dependent on the type of door.

Electric lock hardware allows you to freely exit the building whenever you need to. This means that in case of an emergency, you can unlock all doors instantaneously, ensuring that everyone will be able to get to safety and not be hindered by your access control system hardware.

Field control panels

Field control panels are the parts of door access control systems that help connect all elements together via a control panel. These panels are responsible for processing and relaying access control activity throughout the entire building to the access control software.

If you have a relatively large building with lots of access control activity, then you will need more panels. If you have a smaller location, then you may need to install only a couple of panels.

These panels are typically installed via electrical, communication, or telephone closets.

Alarms

To ensure the safety of staff or customers, access control systems often connect to fire or intrusion alarms. This helps your entire business security system to work in unison should an emergency occur.

If a fire breaks out or an unauthorized person attempts to access doors that are controlled by electric lock hardware, your access control system can sound an alarm.

Installing an Access Control System in Your Building

Key Fob & Key Card Access Systems

While advancing technology has led to many incredible security improvements in recent years, key fob systems are by far one of the easiest and simplest innovations yet. A key fob entry system combines physical hardware and sophisticated software into a convenient modern package.

Key fob systems are easy enough for everyone to use. In fact, if you have visited a hotel within the last few years, you have likely used this tech yourself to access your room. In addition to the aesthetic perks, key card security systems keep unwanted intruders out while also assisting visitors in real time.

When you need to protect your home or business, contact Alarm New England for a free quote. Discover how we can set up a customized, secure key fob system to suit your needs.

How Do Key Fob Entry Systems Work?

Key fob door entry systems may look different from model to model, but most operate under the same basic principles. The process for using these systems generally includes the same steps:

  • Your security card and key fob use electromagnetic or radio wave technology to emit certain wireless signals. You can customize these signals with unique credentials for every user who needs access.
  • The access reader system is installed at key entryways, normally right by the door for easy access.
  • Anyone wishing to enter the restricted area must first present their credentials. Some key cards only need to be in proximity to the access reader, while others require swiping through a card reader.
  • The reader communicates with the card and key fob via wireless signals to verify the credentials. The verification process will vary based on the model of the key card access system.
  • If the system recognizes and approves the credentials, the access reader unlocks the door and allows entry.

The process is simple, efficient, and quick. There’s no need to worry about making multiple copies of metal keys, manually paging in visitors, or constantly changing passwords. Instead, users can swipe their cards, scan their credentials, and get on with their work.

Types of Key Fobs and Key Card Access Systems

While all card and key fob systems use similar technology, many types of key access systems are on the market. The best one for you will depend on your security needs and personal preference.

Electromagnetic key cards

Electromagnetic key cards (like Wiegand and swipe key cards) require physical interaction with the reader to work.

Wiegand key cards

Wiegand key cards are one of the oldest versions of electronic key cards on the market today. In these systems, magnetic polarization and specially-made wires transmit data. This data can be almost anything (such as credit card information or medical data) and provides the basis for much of today’s access control tech.

The user usually swipes their Wiegand card through the reader, where the magnetic field in the reader interacts with the wires in the card. These wires will react, and when the wires change in certain ways, the reader translates these signals as the owner’s credentials.

Swipe key cards

Like their Wiegand counterparts, swipe key cards have a magnetized strip coded with a unique pattern. Users swipe these cards (like a credit card) for access. The readers automatically detect predetermined patterns as authorized credentials.

Unlike Wiegand cards, system administrators can wipe and recode swipe cards to program different credentials or rewrite them to work with a separate lock.

Radio frequency cards

Another class of key card access systems uses radio frequency technology to assign credentials.

RFID key cards

Radio-frequency identification (RFID) key fobs and cards emit radio waves to communicate their credentials. The card readers send signals via excite fields. When the corresponding RFID cards are in range of these fields, they relay a signal back to the reader to open the door.

Proximity key cards

Proximity cards work similarly, except their radio frequencies are different from the RFID cards. Users also need to be close to the card reader for the signals to connect.

Passive readers use radio frequencies and require cards to be held closer to the reader to work. “Active readers, on the other hand, generally have their own power source (such as a lithium battery) and work at longer distances.

At Alarm New England, we have experience designing, customizing, and installing both electromagnetic and radio frequency key fob systems. In your consultation, we will discuss your needs to create a key card system suited to your building.

Benefits of Commercial Key Fob Door Entry Systems

Due to their compact size and their prevalence on the market, many companies use these key card systems for business operations that require automated and restricted access. Rather than using biometrics or cumbersome passwords, key fob systems let business owners implement intelligent security measures that still have the same ease as a regular lock and key.

Key fob door entry systems offer many other convenience and security benefits.

Simplified access control

Business owners can quickly and easily add or remove access for individuals from a single dashboard. This makes it easy to:

  • Upgrade a user to access more restricted areas
  • Quickly onboard a new hire
  • Allow temporary access
  • Activate new cards in bulk
  • Program cards to deactivate automatically after a certain date

Automate access rules and schedules

Key access systems combine the functionality of the physical card with the convenience of an automated system. In addition to unlocking automated doors, users can program their security system to arm and disarm in response to designated employee badges.

Your first employee can disarm the system easily when they first come in for the day, and with a simple double tap of their card, they can arm the system again on their way out of the door.

Intuitive for employees or tenants

Key card systems are easy to use. They completely avoid some of the difficulties of other security measures. Tumbler locks and metal keys are bulky and difficult to operate in poor weather, but tapping your fob against an electronic reader is simple and fast.

As electronic security measures grow more and more popular, having a key card that fits in the credit card slot of your wallet makes life easier for everyone. Most people already know how to use a key card from their own travels, and if they do not, teaching them the process is quick and easy.

Easy administration

Commercial key fob door entry systems help business owners automate their security measures while still giving them the option to track their progress. This trackability is crucial to ensuring your security measures are working as designed.

If breaches ever happen, managers can quickly look up the data for specific readers and see where the disconnect occurred. They can monitor which doors opened, for how long, and who opened them.

If a user ever loses their key card, replacing it is quick and easy. The manager can deactivate their card immediately and reissue a new one with new credentials, which is much faster and cheaper than replacing the entire lock!

Key Card Access Systems for Small Business Security Needs

At Alarm New England, our experienced technicians design, install, and service key card fob systems for businesses of any size.

Key access security locks give small business owners better control over their assets. If you’re constantly on the go, this awareness lets you make informed business decisions anytime, anywhere.

Where can you use a key fob system?

These units are versatile at any scale, even with only a few access readers and a minimal portfolio of access cards. Some common scenarios include:

  • Many establishments install access readers outside of employee-only entrances, such as entryways for kitchens and staff-only break areas.
  • Businesses with large equipment storage areas (especially those with high-value assets, like computers or construction equipment) install access systems to prevent theft or misuse by employees.
  • Private communal living areas, such as college dorms or apartments, employ key card access systems to ensure the safety of their residents.
  • Companies with physical file storage, such as small medical clinics or real estate offices, need to ensure that only trained employees have access to these documents.

What can fob key card access systems do for you?

Key fob systems let any business control who has access to their space, staff, and information. Using time-tested electromagnetic technology, these access systems have exponentially improved in recent years, offering users a more streamlined and customizable experience.

These systems are perfect for users who still prefer a physical component to their security measures. Key cards are easily programmed, easy to use, and just as easily replaced if the original card ever gets lost or stolen. This convenience helps lower your operational costs, all without sacrificing your physical security and peace of mind.

If your business could use an efficient and effective key card security system, consider what key fob access control systems could do to keep you safe and productive.

Call Alarm New England at 857-445-4010 to discuss your security and alarm needs and discover what our family-owned, locally operated alarm company can do for you.

Types of Access Control Systems

Access control is necessary for protecting your business from unauthorized visitors. In addition to providing protection, access control systems bring a host of benefits to help you manage access to areas in your business. There are several main types of access control systems, and each works differently to authorize and control visitors’ and employees’ access to what they need.

access control project

Types of Access Control Systems for Your Needs

Access control systems must meet all security needs regarding allowing employees and visitors access to your commercial facility. Your ideal access control type is dependent on your property’s safety and security requirements, as well as the people you intend to involve in your business.

All access control systems create a record in the system’s database when someone uses an access card or other method to enter and exit the premises or access digital resources. The way the owner or system administrator assigns permissions and gives access to employees and other people differs depending on the system type.

Some access control systems are more restrictive while others are more lenient in granting permissions. Many systems are based on the principle of least privilege, which dictates that employees should have no more than the minimal permissions required to perform their job duties adequately.

These strict principles allow employees access to only the exact tools and resources they need for their position and nothing else. Consider the following options when installing an access control system for your business.

access systems install

Discretionary access control

With a discretionary access control (DAC) system, the company owner determines who can access a particular location. This system also manages access to digital files and other resources. When an employee tries to enter through a particular access point, whether a digital or physical location, the DAC system checks against the list of people who have access and grants it by comparing it to the scanned fingerprint, card, or another form of identification.

DAC has its advantages of being flexible and easy to use, but it requires the owner to manage access actively. It also gives complete access to only one user over all other permissions, which owners can abuse when the permissions provide access to other programs.

Mandatory access control

Also called managed access control, mandatory access control (MAC) is a highly secure access control system standard in companies where confidentiality is necessary. Company owners do not control who has access to classified information or a restricted location, but they can access the MAC system. A system administrator sets all permissions for door entry, which prevents the wrong people from changing permissions and accessing information they don’t have the authority to see.

Mandatory access control is most popular with confidential military data due to its restrictive characteristics. The system sorts everyone who will use the program and either grants or denies access based on the criteria set by the system administrator. That said, the downside with this system is that the system administrator must permit the changes to the access control settings.

Role-based access control

A fast, new system for managing access control in a business is role-based access control (RBAC). Company owners create job titles within the system and assign specific permissions to each job, giving new access more quickly and easily, especially when employees change positions. Users must confirm their role in the system to gain access.

RBAC ensures that those who do not have the proper knowledge cannot perform tasks that require more experience than they have. When an employee gets a promotion, company owners can change their RBAC system role rather than wasting time assigning specific permissions to them. This is incredibly convenient due to the limited amount of time required to alter physical entry permissions or give access to programs for certain company positions.

Rule-based access control

Customization among access control systems is essential in providing the flexibility you need to protect your property, employees, and guests. Rule-based access control adds another layer of specificity to access control. System administrators set rules that determine when and how employees access locations and resources.

Combining rule-based and role-based access control is common to add further access restrictions that narrow permissions down to specific details. While role-based access control allows certain types of employees access on account of their job, rule-based access control can define other conditions such as hours of access.

Attribute-based access control

Another popular and easy-to-use system, attribute-based access control (ABAC) focuses on providing access based on user characteristics. Like rule-based access control, ABAC doesn’t involve employee roles and instead focuses on other factors, including location and group, to allow the system to grant access to employees.

Company owners can assign different types of attributes to employees, such as:

  1. Resource attributes: File names, file owners, and other digital characteristics
  2. Subject attributes: Department, group, security clearance level, and personal characteristics
  3. Action attributes: Characteristics involving how someone wants to act in order to access a resource
  4. Environmental attributes: External and contextual attributes such as visitor access time or company policies

Identity-based access control

Identity-based access control (IBAC) bases access control permission off of biometrics. Fingerprints and face structure are unique ways to give an individual access to areas within a business. Because face structure, fingerprints, and eye patterns are specific to each person, an IBAC system creates a simple way to control access without the chance of mistaken identity.

Smartphones, touchscreen systems, face scanners, touchpads, and more allow biometrics to form the basis for security at your business. Access control systems with video cameras and biometric detection give double assurance that customers will not have access to employee-only areas and that employees will have access solely to their assigned areas.

Choosing a Type of Access Control for Your Needs

Whether you live in Massachusetts, Connecticut, or Rhode Island, Alarm New England can help you decide which type of access control is right for your security needs. Call a security specialist at 857-445-4010 to discuss your requirements for an access control system you can trust.

looking for security

Ultimate Guide To Adding Cameras To Your Smart System

If you have an alarm system, chances are you have thought about adding cameras. Why not? Cameras have a wide range of uses and can be an additional layer of security.

While the installation of cameras may be relatively simple, having them stay online 24/7 and not drop off can be a real challenge.

Garage Outdoor Cam Powered by ADC

If you’re interested in knowing more about the network and internet requirements for WiFi based cameras, keep reading.

Option 1: Cameras Over Wi-Fi Home Network

Commonly the most cost-effective way to add cameras to your system is to simply draw power through an outlet and connect the cameras via your home WiFi network. With this option there is no need for pulling any cable or wire. Just the power source will be hard-wired.

A general rule of thumb we tell our clients is that for every camera you have on the system, you want 2MP of upload speed. So, if you were looking for 4 cameras indoor/outdoor, you will need a minimum of 8MP upload speed from your internet provider (Xfinity, Verizon, Spectrum) on a dedicated network for the best experience.

You may be told from your internet provider the “maximum” speed that your plan includes; however, you still need to run an internet speed test.

We recommend using https://www.speedtest.net/

  1. Press Go in the middle of the screen
  2. The first number given to you is the DOWNLOAD speed
  3. The second number given to you is the UPLOAD speed *this is the one you need to note*
  4. Write down the upload speed number and give to your Alarm New England sales representative

Considering and answering these questions will help you determine your security needs and in turn, where to place them for maximum efficiency.

Option 2: Hardwiring CAT5/CAT6 Cable

For clients wishing to have the most reliable connection for their cameras or to have a more advanced solution (24/7 constant recording), we offer the option to hardwire the Alarm.com power AND internet source. Wired cameras typically have fewer issues with dropped signals or recording issues due to a weak internet connection.

So what does it mean to run CAT5/CAT6 Cable? In order to establish a direct connection between the internet and your cameras, we would require cabling run from the network room to each individual camera’s location.

You may be asking, but why doesn’t everyone choose this option?

Your Camera Options:

Now that we have covered a couple different ways to test and set-up your security cameras, let’s cover types of cameras.

Indoor Fixed w/IR (ADC-V522IR)

ADC indoor

Often used to check up on pets and activity within the home or business, the Alarm.com Indoor camera supports 1080p HD video, infrared night vision and secure cloud recording.

With its compact design and flexible mounting options, the ADC-V522IR is easy to install, and is the lowest-cost option within our camera portfolio.

Features

  • HD 1080p video
  • IR night vision
  • Wide dynamic range (WDR)
  • Two-Way Audio (limited)

1080p Indoor Wi-Fi Camera (ADC-V523)

ADC Indoor Camera with Built in Analytics

Powerful Video Analytics from Alarm.com and direct ethernet connection differentiate ADC’s second generation of indoor camera. Internal testing has proven this generation of camera from Alarm.com to be slightly sharper for both resolution and overall connectivity.

Features

  • 117° field of view
  • High Dynamic Range (HDR)
  • Two-Way Audio
  • Ethernet Connection or Wi-Fi (2.4 GHz or 5 GHz)

1080p Outdoor Wi-Fi Camera (ADC-V723)

ADC Wi-FI Outdoor Camera

With a wide field of view, night vision, and High Dynamic Range (HDR), the ADC-V723 lets you see what’s important – no matter the time of day or lighting conditions.

Features

  • 117° field of view
  • High Dynamic Range (HDR)
  • Wi-Fi (2.4 or 5 GHz)
  • Waterproof & Dust-tight

Requirements:
Power 12 V – 1 A DC power adapter (included)
Network Wi-Fi (2.4 or 5 GHz) connection to broadband Internet

Alarm.com 180° HD Camera ADC-V622

ADC Wellness Camera

The Alarm.com Wellness Camera is a wide-angle camera, designed for keeping an eye on family or pets within the home. Covering a full 180° view, this indoor camera is best to cover larger rooms or areas of space. Improved audio connection and zoom capabilities differentiate this camera from Alarm.com’s first gen indoor camera.

Features

  • Audio
  • Power over Ethernet
  • IR night vision
  • 180° FOV
  • Digital pan/tilt/zoom
  • Tap to call out
  • Bluetooth music streaming

Alarm.com Video Doorbell (ADC-VDB770)

Alarm.com Gen 2 Doorbell Camera

The second generation video doorbell camera from Alarm.com has an expansive 150° vertical Field of View, two-way audio and full portrait viewing in the app make it easier than ever to see a speak with visitors. Built-in analytics from Alarm.com result in the most advanced doorbell camera on the market to date.

Features

  • Expansive FOV (150° V, 115° H)
  • Full HD (1440 x 1920) video resolution
  • High dynamic range (HDR)
  • IR night vision
  • Video Analytics for faster, more relevant alerts
  • Live video and saved clip viewing
  • Two-Way Audio through the mobile app
  • Battery heater for low-temperature operation
  • 2×2 antenna for improved Wi-Fi range
  • Compatible with mechanical and digital chimes

Stream Video Recorder (ADC-SVR122)

ADC CSVR

Created specifically to work with the Alarm.com video cameras, the Alarm.com Stream Video Recorder provides 24×7 professional local video storage solution. With the Stream Video Recorder, you can connect up to eight Alarm.com video cameras for continuous recording.

Specifications:
Storage 500GB, 1TB, or 2TB of storage
Transcoded playback MPEG4 H.264
Speed control 1x, 4x, 8x, 16x

Indoor/Outdoor Mini Bullet (ADC-VC725)

ADC%20Bullet%20Camera-jpeg.jpeg

The ADC-VC725 from Alarm.com is a high-performance mini bullet camera optimized for indoor and outdoor video monitoring. The camera features a dust-resistant exterior casing with an IP66 rating and Power over Ethernet (PoE) capabilities. Often used in small business settings, the bullet indoor/outdoor camera from Alarm.com is an affordable alternative to complex DVR or NVR business solutions.

Features:

  • Power over Ethernet
  • IR night vision
  • HD video
  • IP66-rated waterproof & dust tight
    • This allows the camera to be mounted outdoors

Next Steps!

Still have questions about your network bandwidth and adding cameras? Simply, call 800-322-3500 ext #2 for sales or email “sales@alarmnewengland.com”.

If you’re interested in a new security system, visit our site to learn about us and how we can help.

X

GET FREE QUOTE

What are you protecting?*

Step 1 of 4

Is your property currently monitored?*

Step 2 of 4

What size is your property?

Step 3 of 4

Who is this personalized quote for?*

By clicking this button, you consent for Alarm New England to use automated technology to contact you at the number provided. This consent is not required to make a purchase from us.

Step 4 of 4