Using proprietary or closed distribution systems ultimately limit your options and ability to choose the right partner to work with you. Choice means competition, value and service which equals savings.

What We Do

Preventative Maintenance check list:

  1. When was the last time your contact list with the monitoring company was updated?
  2. Do they use passwords to validate/authenticate the person they are speaking with?
  3. Does the existing monitoring company record all conversations when an event has occurred?
  4. Does the monitoring company provide you with event reports in a timely manner? Do they have your email account information?
  5. Do you have a zone list, with detailed descriptions of each piece of equipment on the security system. Examples: motion detectors, door contacts, magnetic locks, tamper switches, etc.
  1. Are all your security cameras labelled when they present on the monitor or are they simply numbered?
  2. Is all of your security cameras working? Are they dirty?
  3. Can you see images clearly at night – IR vision?
  4. When was the last time you viewed any playback on the recording appliance? If tested, how far back can your view? One day? One week? One month?
  5. Is they quality of the playback images clear and concise? Is the timelines of the playback smooth or jumpy – how many frames per second are you recording?
  6. When was the last time your system was cleaned?
  1. Do you have lost cards? Are they removed from the system?
  2. When was the last time you backed up the hard drive of the card access system?
  3. How many schedules exist within your card access system?
  4. Do you have separate schedules for tenants that are no longer in the building?
  5. Where are the spare access cards stored when they have not been programed into the system?
  6. Who performs the programming of the access cards?
  7. When was the last time the administrative password was changed?
  8. Have you ever performed an audit of the reporting?
  9. How many times has a lost de-activated access card attempted to gain access?
  10. How old is your card access system?
  11. When was the last time the operating system for the computer was updated?
  12. What version of the card access system are you operating? Is there a new version?