Many security problems start for homes, businesses and government when no one is watching. Video surveillance services from 5163co assure monitoring around the clock and from all angles to keep an eye on places you value, even when you are not looking. Security and video surveillance systems, known as closed-circuit television (CCTV), consist of a camera, digital video recorder (DVR), and monitor. 5163co and Access offers a large variety of high-quality equipment to bring you cutting-edge solutions.


Closed-circuit television (CCTV) is a popular form of surveillance that uses video cameras to transmit a signal to a specific destination on a limited set of monitors in a closed network. Banks, airports, industrial plants, military installations, and convenience stores commonly use CCTV, which can operate continuously or can be activated to monitor particular events. CCTV is a popular tool not only for security, but also for monitoring the operations of a business or organization. When choosing CCTV for security or business needs, the key questions are what kind of camera to use, where to store the images and how to monitor and access them. A consultation with 5163co. and Access can determine the answers to these questions, which depend on many factors including purpose, location and local conditions.


Reliable communication between different areas of your home or office is a key to security and better business practices. Intercom systems from 5163co. and Access offer innovative features, such as color video interfaces, powered by digital technology to connect remote locations for increased peace of mind. Intercom systems can be installed for internal or external use, using existing phone lines or computer networks.


Audio intercom systems allow users to communicate with their voices from different rooms within a large structure, such as an apartment building or office complex. External audio intercom systems let residents or employees screen prospective visitors from the outside point of entry. Internal audio intercom systems permit communication between rooms at home, or enable public announcements and other quick conversations in the workplace. 5163co. and Access offers audio intercom systems in a variety of attractive styles, durable and sleek, for external and internal use. Some models include handsets, while others allow for convenient hands-free use.


Like audio intercom systems, video/audio intercoms may be installed outside or inside a home or place of business. In addition to clear sound, video/audio intercoms offer sharp images, made possible by an audio and video transmitter and receiver in a single cabinet. Unlike audio intercom systems, the advantage is that users can see potential visitors and other conversation partners, which creates more security and increased peace of mind. 5163co. and Access offers video/audio intercom systems with innovative features such as color imagery, video memory, and pan, tilt and zoom views.


Burglaries and robberies represent some of the most common crimes in the Urban environment. Fortunately, experience shows that alarm systems may significantly decrease the chances of such invasions by deterring intruders and thieves from entering your home or business. Alarm systems emit a shrill noise in response to a present and immediate danger. Additional advantages of a loud alarm sound include its ability to alert neighbors and passersby, and potentially even frighten intruders from the scene. The sight of an alarm system alone may be enough to discourage would-be thieves. Highly effective and often easy to use, this electronic security solution is a popular way to provide peace of mind for homeowners and business operators. All alarms use sensors connected to a control unit via hardwire or wireless link. Sensors commonly detect changes in the environment such as the opening of a window or inside motion. Types of alarm systems range from small, all-in-one noisemakers to sophisticated, multi-zoned systems with color-coded computer outputs. The most basic alarm systems feature elements including a control panel, keypad, siren, indoor motion detector, door and window contacts, and a central monitoring station, if the system is monitored. More sophisticated features that can be added include glass break detectors, panic buttons, pressure mats under carpeting, and alarm screens for windows


Phone entry intercom systems connect directly to the resident phone lines in a building. Residents are called without making a call to the central office, which bypasses the expense of telephone charges. Phone entry intercom systems offer lower costs, convenience and privacy, as the dialed phone number remains unrevealed.


IP intercom systems distribute audio and video signals on a computer network in an apartment building or office. The intercom system acts like any other computer on the local area network, which allows for flexibility. Multiple locations in different buildings can be connected for maximum reach.


Once 5163co. and Access professionally installs a high-quality alarm system, customers can choose whether or not they want monitoring. If they opt for this service, their alarm system will be connected to a remote central monitoring station, which receives signals that report the conditions of the area being monitored.


Sensors are the heart of an alarm system. These sensitive devices detect rapid changes in the environment, such as a window opening or glass breaking, that indicate an intrusion or breach of security. The information is sent to the alarm system’s controller, which notifies the central monitoring station, if a client uses a monitoring service.


If sensors act as the heart of an alarm system, controllers act as the brains. Controllers take information from the sensors and process this into a code that alerts the central monitoring station about what part of the monitored area is being intruded.


5163co. and Access customers who opt for alarm system monitoring receive reports to notify them of the activity related to the system being monitored. Reports are delivered to their specifications, in the form, such as e-mail or text message, that is convenient for them.


Locks are the popular face of security. Everyone is familiar with these mechanical or electronic devices that attach to doors, containers and other objects to restrict access, protect property and send the universal message, “keep out!” Although quite common, locks come in a variety of types for many different purposes in residences, businesses such as hotels, and government installations. 5163co. and Access offers locks that can be operated by using a keypad, various types of keycards, biometric data, or electric strikes.


Keypad locks require the user to enter a numeric sequence on a keypad to gain entry to an area. Often used for doors, keypads may be mechanical or rely on electronic circuitry to protect an area. In both cases, keypad locks installed by 5163co. and Access hold several advantages over traditional keyed locks.


Locks are synonymous with the hotel industry, where the security of guests nd their personal property is always at a premium. The quality and reliability of locks can make or break a hotel brand, which is why the lodging business turns to 5163co. and Access for superior selection, installation and maintenance.


Biometric locks utilize the uniqueness of human body features to offer convenience and enhanced security in residences, businesses and government installations. These keyless locks predominantly make use of fingerprint scanning technology, and sometimes retinal scanning, iris scanning and voiceprint identification.


Magnetic strip locks operate with plastic keycards identical in size to a credit card or driver’s license. They are popular in areas where different users must be accommodated without having to change the lock each time, such as in hotels or small businesses.


Electric strikes, also known as door strikes or door releases, are used in locations where access control is required. Many people are familiar with electric strikes for the “buzz-in” sound made when the current flows through the electric strike to open a door. Integrated Security Systems Integrated security systems are one of the latest developments in closed-circuit television systems (CCTV) design. These systems available from 5163co. and Access offer an overall security solution that is easy to use, which makes them increasingly popular for small business owners and small offices.
Customers interested in CCTV choose integrated security systems because they involve simple hook ups and basic user interfaces. The systems consist of a digital video recorder (DVR), a display monitor and a network card. Integrated security systems look like an LCD monitor, and in fact they can be used strictly for that purpose, but their compact size makes them appealing for many people who need a CCTV solution for security and video surveillance. Integrated security systems provide a flexible and reliable storage option. The DVR component can record up to 14 days of footage using high-resolution recording. A USB outlet allows the recordings to be moved to a USB key or external hard drive for later transfer to a DVD. Although one never wants to experience a crime, if something does happen, the ability to copy recordings is essential for police investigations, which require a copy of the recording. The built-in network card in an integrated security system allows users to connect remotely from the internet and see what their cameras are viewing at any time. This feature is particularly helpful for small business owners and home-office owners who travel. All that is needed for peace of mind is a computer and an internet connection. Compact size, flexibility and convenience make integrated security systems an attractive, state-of-the-art security solution. Consider a system from vertex security for your home office or small business today


How can people have freedom to come and go without compromising the security of an area? Access management and control answers this question by letting you determine who can enter and exit an area, and what level of access they will have inside. Advanced access control systems like keypad alarm systems and biometric readers bring many advantages over traditional locks and keys. These newer systems allow a manager to lock and unlock doors automatically, for example, and to track and document which individuals went where, and when. That information is highly valuable if the need arises to review and investigate a security incident. Access control systems (ACS) can be integrated into a comprehensive security plan that involves aspects of physical layout like heating and cooling systems, electronic locks, closed circuit television, and security surveillance. While access control and management provide peace of mind to homeowners, due to their sophistication, these systems are more often used in government installations and high-profile commercial targets such as banks, hotels and some apartment complexes. Laboratory and testing areas that store sensitive items like radioactive materials and other top-secret devices use access control systems, including remote access control and thumb print readers. Businesses that work with sensitive government contracts also generally are required to have these systems in place. 5163co.. offers state-of-the-art access control systems and components including keypad alarm systems, biometrics, and card access. Which system you choose depends on what the purpose will be.


A keypad alarm system is a basic alarm system with a low-voltage circuit that involves sensors on doors and windows. When a window or door is opened, the electricity through the sensor is interrupted and the alarm will sound if activated unless a code is typed into the security keypad. Some of these alarms also use motion sensors and are triggered when motion is detected inside an area. Keypad alarms, which are available in wired or wireless types, offer several advantages over other alarm systems. They allow the user to control all the access points in a structure, giving access only to select people. These alarms also can be activated whether or not the user is in the area. Wired keypad alarm systems connect to a control panel. The wires, hidden in walls and various crawl spaces, go to sensors placed on doors and windows, and the keypads themselves. Instead of wires, wireless keypad alarm systems use radio transmitters to send signals to each other. The same alarm effect is created when doors or windows are opened without entering the code into the numeric keypad.


The term “biometrics” comes from the Greek words “bios” meaning life and “metron” meaning measurement. Biometrics is the science of confirming a person’s identity through the analysis of that individual’s unique physical or behavioral traits. In access control, biometric systems can include fingerprint-readers and voice and retina-recognition systems. These solutions offer advantages over other keyless methods like card readers, which can be lost or stolen. In contrast, biometric systems grant access based on unique traits that cannot be easily lost, such as fingerprints, vocal sounds and retinas. These traits also are not easily duplicated by anyone seeking to tamper with the security system


Card access relies on keycards, normally flat and rectangular-shaped pieces of plastic, that are presented to a card reader. Access control card readers are used in physical security systems to read a credential that allows access through controlled points, often a locked door. Access control readers offered by 5163co. are classified by functions they are able to perform and by identification technology. Types include a magnetic stripe, bar code, smart card, and proximity cards.


Magnetic stripe technology uses a stripe of magnetic oxide tape laminated on a keycard card. Three tracks of data, which can be encoded in any format, are on the magnetic stripe. Mag-stripe cards, as they are called, are inexpensive and easy to program and use. On the down side, the technology is susceptible to misreads, card wear, data corruption, and copying.


Barcode technology uses a series of alternating dark and light stripes that are read by an optical scanner. The organization and width of the lines is determined by the bar code protocol chosen. Bar codes are inexpensive and easy to generate, but this also makes them susceptible to fraud, and smudges and dirt may cause problems with the reader.


Smart cards come in two types: contact and contactless. Both have an embedded microprocessor and memory that can handle multiple applications and allow the smart card to work as a cash card, a pre-paid membership card, and an access control card. The difference between contact and contactless smart cards is how their microprocessors communicate. A contact smart card has eight contacts that must physically touch the right points on the card reader, which makes them slow and undesirable for most access control purposes, which require speed of transaction. A contactless smart card uses the same radio-based technology as the proximity card but with a higher frequency that allows for transfer of more data and communication with several cards at a time. Contactless cards do not have to touch the reader and remain in a wallet or purse, which makes them a better choice for access control systems. The cards usually do not use the available memory for access control, which frees the memory for uses like biometrics data.


Many companies use proximity cards to control physical access. In this system, an employee holds a card within a few inches of the reader; the reader receives a unique ID from the card and transmits it to a central computer that commands whether or not to open the door. A primary reason for the popularity of proximity cards is the convenience of their touch-less functionality. One drawback to proximity cards is the increasing number of cards manufactured with no governing body to control card numbers and facility codes, key parts of their operating format. Different manufacturers could supply cards with identical facility codes and control numbers to different organizations, which causes a problem of duplicates. Now more than ever, commercial and government clients need fast, reliable telecommunications and data services to connect within their units and among external parties. A solid telecom and data infrastructure is essential to the smooth operations of businesses, safe transmission of sensitive government messages, and overall peace of mind. 5163co. specializes in low voltage, infrastructure cabling, audio/video, telecom and data solutions that improve the way you communicate and do business. Our experts stay on top of developments in this swift-moving area to bring you state-of-the-art designs and the latest equipment for your needs.