<?xml version="1.0" encoding="UTF-8"?><aeoFeed>
	<item>
		<id>999956877</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/verified-security-privacy-policy/</url>
		<title>Verified Security Privacy Policy</title>
		<h1>Verified Security Privacy Policy</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:””,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_yu9Iw”,”column_width”:”col-md-10″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”OVQTN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security Privacy Policy \nEffective Date: March 31, 2025 \n\n1. Introduction\nThis Privacy Policy describes how Verified Security, a business located in Atlanta, GA, collects, uses, and shares personal information. By using our website or services, you consent to the practices described in this Privacy Policy.\n\n2. Information We Collect\n•\tPersonally Identifiable Information: We may collect personally identifiable […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:””,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_yu9Iw”,”column_width”:”col-md-10″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”OVQTN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security Privacy Policy \nEffective Date: March 31, 2025 \n\n1. Introduction\nThis Privacy Policy describes how Verified Security, a business located in Atlanta, GA, collects, uses, and shares personal information. By using our website or services, you consent to the practices described in this Privacy Policy.\n\n2. Information We Collect\n•\tPersonally Identifiable Information: We may collect personally identifiable information, such as your name, email address, and physical address, when you voluntarily provide it to us, for example, through our website contact form or when making a purchase. \n•\tNon-Personally Identifiable Information: We may also collect non-personally identifiable information, such as IP addresses, browser type, and device type, through cookies or similar technologies.\n\n3. How We Use Your Information\n•\tTo Provide Services: We use your information to fulfill your requests, process your orders, and provide customer support. \n•\tTo Improve Our Services: We may use your information to improve our website and services, conduct market research, and develop new products or services. \n•\tTo Communicate with You: We may use your email address to send you updates, newsletters, or other promotional materials, but you can opt-out of these communications at any time.\n\n4. Sharing Your Information\n•\tWith Your Consent: We will share your personal information with third parties only with your express consent. \n•\tWith Service Providers: We may share your information with third-party service providers who help us operate our business, such as payment processors or email marketing providers. \n•\tFor Legal Reasons: We may disclose your information if required by law or legal process.\n\n5. Your Rights\n•\tAccess: You have the right to access the personal information we hold about you. \n•\tCorrection: You have the right to request that we correct any inaccurate or incomplete information. \n•\tDeletion: You have the right to request that we delete your personal information. \n•\tOpt-Out: You can opt-out of receiving marketing communications from us at any time.\n\n6. Security\nWe take reasonable measures to protect your personal information from unauthorized access, use, or disclosure.\n\n7. Changes to this Privacy Policy\nWe may update this Privacy Policy from time to time, and we will post any changes on our website.\n\n8. Contact Us\nIf you have any questions about this Privacy Policy, please contact us at info@verifiedsecurity.com or by calling 678-924-7480. \n”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:””,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_yu9Iw”,”column_width”:”col-md-10″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”OVQTN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security Privacy Policy \nEffective Date: March 31, 2025 \n\n1. Introduction\nThis Privacy Policy describes how Verified Security, a business located in Atlanta, GA, collects, uses, and shares personal information. By using our website or services, you consent to the practices described in this Privacy Policy.\n\n2. Information We Collect\n•\tPersonally Identifiable Information: We may collect personally identifiable information, such as your name, email address, and physical address, when you voluntarily provide it to us, for example, through our website contact form or when making a purchase. \n•\tNon-Personally Identifiable Information: We may also collect non-personally identifiable information, such as IP addresses, browser type, and device type, through cookies or similar technologies.\n\n3. How We Use Your Information\n•\tTo Provide Services: We use your information to fulfill your requests, process your orders, and provide customer support. \n•\tTo Improve Our Services: We may use your information to improve our website and services, conduct market research, and develop new products or services. \n•\tTo Communicate with You: We may use your email address to send you updates, newsletters, or other promotional materials, but you can opt-out of these communications at any time.\n\n4. Sharing Your Information\n•\tWith Your Consent: We will share your personal information with third parties only with your express consent. \n•\tWith Service Providers: We may share your information with third-party service providers who help us operate our business, such as payment processors or email marketing providers. \n•\tFor Legal Reasons: We may disclose your information if required by law or legal process.\n\n5. Your Rights\n•\tAccess: You have the right to access the personal information we hold about you. \n•\tCorrection: You have the right to request that we correct any inaccurate or incomplete information. \n•\tDeletion: You have the right to request that we delete your personal information. \n•\tOpt-Out: You can opt-out of receiving marketing communications from us at any time.\n\n6. Security\nWe take reasonable measures to protect your personal information from unauthorized access, use, or disclosure.\n\n7. Changes to this Privacy Policy\nWe may update this Privacy Policy from time to time, and we will post any changes on our website.\n\n8. Contact Us\nIf you have any questions about this Privacy Policy, please contact us at info@verifiedsecurity.com or by calling 678-924-7480. \n”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2026-01-01T10:41:02-05:00</modified>
	</item>
	<item>
		<id>999956865</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/access-control-choosing-the-right-credential-for-your-business/</url>
		<title>Top 4 Access Control Credentials</title>
		<h1>Top 4 Access Control Credentials</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg|450|800|999956868″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”In the realm of modern security, access control credentials are the gatekeepers of our security. As technology advances, the options for these credentials have expanded, each with its own set of advantages and challenges.\n Physical credentials, such as ID cards and key fobs, have long been the backbones of access control. These tangible tokens offer […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg|450|800|999956868″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”In the realm of modern security, access control credentials are the gatekeepers of our security. As technology advances, the options for these credentials have expanded, each with its own set of advantages and challenges.\n</p>
<p>Physical credentials, such as ID cards and key fobs, have long been the backbones of access control. These tangib<a href="https://verifiedsecurity.com/wp-content/uploads/2024/07/dreamstime_xxl_148640213-Hand-with-Card-Reader-and-Card-scaled.jpg"><img src="https://verifiedsecurity.com/wp-content/uploads/2024/07/dreamstime_xxl_148640213-Hand-with-Card-Reader-and-Card-300x200.jpg" alt="" width="300" height="200"></a>le tokens offer immediate visual verification and are generally user-friendly. Many employees appreciate the simplicity of tapping or swiping a card to gain entry. Moreover, these credentials can often serve double duty, functioning as company ID badges or even integrating with time and attendance systems. However, physical credentials aren’t without their drawbacks. They can be lost, stolen, or shared, potentially compromising security. The cost of replacing lost cards and managing inventory can add up over time. Additionally, in our increasingly digital world, carrying an extra item might be seen as cumbersome by some users.</p>
<p>\n</p>
<p>PIN-based systems offer the advantage of not requiring any physical object. They’re cost-effective to implement and can be easily changed if compromised. For users, there’s no risk of forgetting or losing a card. PIN systems can also be ideal for temporary access, such as for contractors or visitors. On the flip side, PINs can be forgotten, shared, or observed by unauthorized individuals. There’s also the risk of ‘shoulder surfing,’ where someone watches as the code is entered. To mitigate these risks, many organizations use PINs in combination with other credential types for multi-factor authentication.</p>
<p>\n</p>
<p>Biometric systems, using fingerprints, retinal scans, or facial recognition, offer a high level of security. They’re difficult to forge and can’t be lost or forgotten like physical cards or PINs. Biometrics also provide a clear audit trail, as they’re linked directly to individuals rather than objects that could be shared. However, biometric systems can be expensive to implement and may raise privacy concerns among users. They can also face challenges in certain environments – for instance, fingerprint scanners may struggle with dirty or worn fingerprints in industrial settings.</p>
<p>\n</p>
<p>Mobile credentials, which turn smartphones into access devices, are gaining popularity. They offer convenience – most people always have their phones with them – and can be u<a href="https://verifiedsecurity.com/wp-content/uploads/2024/07/HID-Mobile-Credential-Picture.jpg"><img src="https://verifiedsecurity.com/wp-content/uploads/2024/07/HID-Mobile-Credential-Picture-300x132.jpg" alt="" width="300" height="132"></a>pdated or revoked remotely. Mobile credentials can also integrate with other smartphone functions, potentially streamlining processes beyond just access control. The downsides include the <a href="https://verifiedsecurity.com/wp-content/uploads/2024/07/Virtual-Keypad_App_51-scaled.jpg"><img src="https://verifiedsecurity.com/wp-content/uploads/2024/07/Virtual-Keypad_App_51-146x300.jpg" alt="" width="146" height="300"></a>need for compatible infrastructure and the reliance on users’ personal devices. There are also concerns about battery life and what happens if a phone is lost or stolen. However, many of these issues can be mitigated with proper policies and backup systems.</p>
<p>\n</p>
<p>Smart cards represent a step up in security from traditional proximity cards. They use encryption to protect data transmission, making them much harder to clone or hack. Smart cards can also store additional information, potentially serving multiple functions beyond access control. The primary drawbacks of smart cards are higher costs compared to simpler card technologies and the need for compatible readers. However, their enhanced security features often justify the investment for many organizations.</p>
<p>\n</p>
<p>When selecting an access control credential system, consider your organization’s specific needs. High-security environments might prioritize the robust protection of biometrics or encrypted smart cards. Companies with a mobile-first culture might lean towards smartphone-based solutions. Organizations with high turnover or frequent visitors might find the flexibility of PIN systems appealing.</p>
<p>\n</p>
<p>It’s also worth considering hybrid systems. Many modern access control setups allow for multiple credential types, offering the flexibility to use different solutions for different areas or user groups within the same organization.</p>
<p>\nAs your business grows and evolves, so do these access control credentials. Regular updates and integrations with other smart devices ensure that your security system remains cutting-edge and adaptable to your changing needs. If you have questions about how our access control credential solutions can benefit your business, please do not hesitate to contact us at <a href="mailto:info@verifiedsecurity.com">info@verifiedsecurity.com.</a>\n\n-Scott Hightower, <a href="https://verifiedsecurity.com">Verified Security</a>“}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg|450|800|999956868″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg|450|800|999956868″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”In the realm of modern security, access control credentials are the gatekeepers of our security. As technology advances, the options for these credentials have expanded, each with its own set of advantages and challenges.\n Physical credentials, such as ID cards and key fobs, have long been the backbones of access control. These tangible tokens offer immediate visual verification and are generally user-friendly. Many employees appreciate the simplicity of tapping or swiping a card to gain entry. Moreover, these credentials can often serve double duty, functioning as company ID badges or even integrating with time and attendance systems. However, physical credentials aren’t without their drawbacks. They can be lost, stolen, or shared, potentially compromising security. The cost of replacing lost cards and managing inventory can add up over time. Additionally, in our increasingly digital world, carrying an extra item might be seen as cumbersome by some users. \n PIN-based systems offer the advantage of not requiring any physical object. They’re cost-effective to implement and can be easily changed if compromised. For users, there’s no risk of forgetting or losing a card. PIN systems can also be ideal for temporary access, such as for contractors or visitors. On the flip side, PINs can be forgotten, shared, or observed by unauthorized individuals. There’s also the risk of ‘shoulder surfing,’ where someone watches as the code is entered. To mitigate these risks, many organizations use PINs in combination with other credential types for multi-factor authentication. \n Biometric systems, using fingerprints, retinal scans, or facial recognition, offer a high level of security. They’re difficult to forge and can’t be lost or forgotten like physical cards or PINs. Biometrics also provide a clear audit trail, as they’re linked directly to individuals rather than objects that could be shared. However, biometric systems can be expensive to implement and may raise privacy concerns among users. They can also face challenges in certain environments – for instance, fingerprint scanners may struggle with dirty or worn fingerprints in industrial settings. \n Mobile credentials, which turn smartphones into access devices, are gaining popularity. They offer convenience – most people always have their phones with them – and can be updated or revoked remotely. Mobile credentials can also integrate with other smartphone functions, potentially streamlining processes beyond just access control. The downsides include the need for compatible infrastructure and the reliance on users’ personal devices. There are also concerns about battery life and what happens if a phone is lost or stolen. However, many of these issues can be mitigated with proper policies and backup systems. \n Smart cards represent a step up in security from traditional proximity cards. They use encryption to protect data transmission, making them much harder to clone or hack. Smart cards can also store additional information, potentially serving multiple functions beyond access control. The primary drawbacks of smart cards are higher costs compared to simpler card technologies and the need for compatible readers. However, their enhanced security features often justify the investment for many organizations. \n When selecting an access control credential system, consider your organization’s specific needs. High-security environments might prioritize the robust protection of biometrics or encrypted smart cards. Companies with a mobile-first culture might lean towards smartphone-based solutions. Organizations with high turnover or frequent visitors might find the flexibility of PIN systems appealing. \n It’s also worth considering hybrid systems. Many modern access control setups allow for multiple credential types, offering the flexibility to use different solutions for different areas or user groups within the same organization. \nAs your business grows and evolves, so do these access control credentials. Regular updates and integrations with other smart devices ensure that your security system remains cutting-edge and adaptable to your changing needs. If you have questions about how our access control credential solutions can benefit your business, please do not hesitate to contact us at info@verifiedsecurity.com.\n\n-Scott Hightower, Verified Security“}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg|450|800|999956868″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg</image>
		<modified>2024-07-31T11:36:07-04:00</modified>
	</item>
	<item>
		<id>999956855</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/the-power-of-remote-access/</url>
		<title>The Power of Remote Access</title>
		<h1>The Power of Remote Access</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1024×538.jpg|630|1200|999956859″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Imagine having complete control of your business security at your fingertips, no matter where you are. With advanced apps like Total Connect and Virtual Keypad, you can arm or disarm your system, lock or unlock doors, and view onsite video—all from your smartphone. This level of control ensures that you’re always connected to your business, […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1024×538.jpg|630|1200|999956859″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Imagine having complete control of your business security at your fingertips, no matter where you are. With advanced apps like Total Conne<a href="https://verifiedsecurity.com/wp-content/uploads/2024/07/Virtual-Keypad_App_54-scaled.jpg"><img src="https://verifiedsecurity.com/wp-content/uploads/2024/07/Virtual-Keypad_App_54-146x300.jpg" alt="" width="146" height="300"></a>ct and Virtual Keypad, you can arm or disarm your system, lock or unlock doors, and view onsite video—all from your smartphone. This level of control ensures that you’re always connected to your business, providing peace of mind and enhancing operational efficiency.\n\nRemote access capabilities provide real-time insights that can drive smarter business decisions. Receive instant notifications about employee arriva<a href="https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Virtual-Keypad_561-scaled.jpg"><img src="https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Virtual-Keypad_561-105x300.jpg" alt="" width="105" height="300"></a>ls and departures, unexpected entries, or changes in environmental conditions. This immediate awareness allows you to respond quickly to any situation, improving both security and operational effectiveness.\n\nFor businesses with multiple locations, remote access is a game-changer. Manage security for all your properties from a single app, ensuring consistent security practices across your organization while saving time and resources.\n\nThese systems also enhance emergency response capabilities. In case of an alarm, monitoring centers are automatically alerted, ensuring rapid response from emergency services if needed. You’ll be notified immediately, allowing you to assess the situation and provide additional information to responders.\n\nAs your business grows and evolves, so do these remote access solutions. Regular updates and integrations with other smart devices ensure that your security system remains cutting-edge and adaptable to your changing needs. If you have questions about how our remote access security solutions can benefit your business, please do not hesitate to contact us at <a href="mailto:info@verifiedsecurity.com">info@verifiedsecurity.com.</a>\n\n-Scott Hightower, <a href="https://verifiedsecurity.com">Verified Security</a>“}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1024×538.jpg|630|1200|999956859″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1024×538.jpg|630|1200|999956859″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Imagine having complete control of your business security at your fingertips, no matter where you are. With advanced apps like Total Connect and Virtual Keypad, you can arm or disarm your system, lock or unlock doors, and view onsite video—all from your smartphone. This level of control ensures that you’re always connected to your business, providing peace of mind and enhancing operational efficiency.\n\nRemote access capabilities provide real-time insights that can drive smarter business decisions. Receive instant notifications about employee arrivals and departures, unexpected entries, or changes in environmental conditions. This immediate awareness allows you to respond quickly to any situation, improving both security and operational effectiveness.\n\nFor businesses with multiple locations, remote access is a game-changer. Manage security for all your properties from a single app, ensuring consistent security practices across your organization while saving time and resources.\n\nThese systems also enhance emergency response capabilities. In case of an alarm, monitoring centers are automatically alerted, ensuring rapid response from emergency services if needed. You’ll be notified immediately, allowing you to assess the situation and provide additional information to responders.\n\nAs your business grows and evolves, so do these remote access solutions. Regular updates and integrations with other smart devices ensure that your security system remains cutting-edge and adaptable to your changing needs. If you have questions about how our remote access security solutions can benefit your business, please do not hesitate to contact us at info@verifiedsecurity.com.\n\n-Scott Hightower, Verified Security“}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1024×538.jpg|630|1200|999956859″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1.jpg</image>
		<modified>2024-07-17T14:03:42-04:00</modified>
	</item>
	<item>
		<id>999956837</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/practical-ai-solutions-for-your-security-needs/</url>
		<title>Practical AI Solutions for Your Security Needs</title>
		<h1>Practical AI Solutions for Your Security Needs</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-1024×724.jpg|1809|2560|999956848″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”At Verified Security, we are thrilled about the game-changing impact of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage. They can proactively detect and alert you to specific activities of your interest in […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-1024×724.jpg|1809|2560|999956848″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”At Verified Security, we are thrilled about the game-changing impact of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage. They can proactively detect and alert you to specific activities of your interest in real-time.\n\nKey capabilities powered by AI video analytics include person detection, vehicle detection, object tracking, crowd counting, and more. Instead of overwhelming staff with thousands of hours of footage to manually review. AI can automatically surface the key events that need attention, allowing you to do more work with fewer resources.\n\nBeyond enhancing security, AI analytics provides insights that drive operational intelligence across facilities. For example, people counting data reveals occupancy trends to optimize staffing and space usage. Queue monitoring identifies frustrating customer experiences to improve. The opportunities to derive value are limitless.\n\nAt Verified Security, we take a comprehensive approach to ensure customers understand the powerful capabilities of modern AI video analytics while implementing solutions aligned with their specific needs and priorities. The future of security lies in blending physical surveillance with operational insights for true situational intelligence.\n\nWe’re thrilled to partner with customers on unlocking the next frontier of value from their video cameras through cutting-edge AI analytics.\n\nReach out today to learn more about our AI video analytics offerings.”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-1024×724.jpg|1809|2560|999956848″,”excerpt”:”At Verified Security, we are excited about the potential of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage”,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-1024×724.jpg|1809|2560|999956848″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”At Verified Security, we are thrilled about the game-changing impact of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage. They can proactively detect and alert you to specific activities of your interest in real-time.\n\nKey capabilities powered by AI video analytics include person detection, vehicle detection, object tracking, crowd counting, and more. Instead of overwhelming staff with thousands of hours of footage to manually review. AI can automatically surface the key events that need attention, allowing you to do more work with fewer resources.\n\nBeyond enhancing security, AI analytics provides insights that drive operational intelligence across facilities. For example, people counting data reveals occupancy trends to optimize staffing and space usage. Queue monitoring identifies frustrating customer experiences to improve. The opportunities to derive value are limitless.\n\nAt Verified Security, we take a comprehensive approach to ensure customers understand the powerful capabilities of modern AI video analytics while implementing solutions aligned with their specific needs and priorities. The future of security lies in blending physical surveillance with operational insights for true situational intelligence.\n\nWe’re thrilled to partner with customers on unlocking the next frontier of value from their video cameras through cutting-edge AI analytics.\n\nReach out today to learn more about our AI video analytics offerings.”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-1024×724.jpg|1809|2560|999956848″,”excerpt”:”At Verified Security, we are excited about the potential of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage”,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-scaled.jpg</image>
		<modified>2024-07-09T12:27:14-04:00</modified>
	</item>
	<item>
		<id>999956805</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/randy-test/</url>
		<title>Verified Security</title>
		<h1>Verified Security</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Top Security Trends in 2022″,”tag”:”h1″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”text-align: left;”,”content”:”What are the top trends in physical security management for 2022? Based on our view of market demand and new product availability, we believe that there are four key trends shaping the security market this year. They are increased platform integration, continued migration to cloud-based services, increased […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Top Security Trends in 2022″,”tag”:”h1″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”text-align: left;”,”content”:”What are the top trends in physical security management for 2022? Based on our view of market demand and new product availability, we believe that there are four key trends shaping the security market this year. They are increased platform integration, continued migration to cloud-based services, increased use of artificial intelligence and machine learning, and growth in video verification and remote video monitoring. We will explore each of these below.”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_button”,”id”:”XePgh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-lg”,”position”:”center”,”animation”:false,”text”:”Request A Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”kkdJq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_XWFMG”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”UaXMl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_zRj15″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”column_Fyg45″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”ZNPdO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Video-CCTV-systems-png-e1551391421833.png|141|250|999955901″,”alt”:””,”thumb_size”:”large”}]},{“component”:”hc_column”,”id”:”column_yUWkf”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”aBLoK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Platform Integration”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<p>First, we see a continuing trend in platform integration which makes it easier to operate the physical security systems. Linking your camera system with your badge access control system provides intelligence and monitoring of the entrance and exit activity at your facility. Also, with today\u2019s advanced platforms, it is possible to easily share reports and videos of activity with others from anywhere at any time. Another example of the benefits of integration are with mobile access credentials. It is now possible to store your secure access credential on your smartphone and use your Bluetooth connection to gain access to a facility without having to carry a physical card or keyfob.&lt;\/p&gt;“},{“component”:”hc_button”,”id”:”mZvcE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]}]},{“component”:”hc_space”,”id”:”0MEot”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_8mfNX”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”ObsqD”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”yO9Z4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Migration to Cloud-Based Platforms”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”DxDb7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<p> Closely linked with the continued move to platform integration is the migration to cloud-based platforms and services. End users are finding that these cloud platforms are far easier to use and manage than the tradition systems which rely on software and servers. With the old software and server model, the user must keep the server up to date with operating system updates and malware prevention while also paying for support agreements and regular software upgrades. With a cloud-based system, the security is maintained by the cloud platform provider and regular updates with new features and benefits are automatically pushed down to the users. &lt;\/p&gt;“},{“component”:”hc_button”,”id”:”63zpp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]},{“component”:”hc_column”,”id”:”rXtKv”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”CLUO7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]}]},{“component”:”hc_space”,”id”:”csEM5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_yTzrA”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”cB8iY”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”L7Vgo”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]},{“component”:”hc_column”,”id”:”pEMvu”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”Qvi1P”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Artificial Intelligence Technologies”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”glQ8Q”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<p>Leveraging the use of cloud-based services, new artificial intelligence technologies are enabling the use of more sophisticated analytics for better identification and notification of actual security threats. Traditionally, video systems could identify motion but could not easily distinguish between the causes of that motion activity. A threat from an intruder would be treated the same as a tree blowing in the wind. This lack of intelligence in detection leads to false activations and notifications which decreases the effectiveness of the video security system. With new software intelligence, video systems can detect specific activities that are identified as potential security threats. Human activity, vehicle detection, and loitering are three examples of more advanced analytics which can decrease false alerts and make your security systems more effective.&lt;\/p&gt;“},{“component”:”hc_button”,”id”:”H9U6i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]}]},{“component”:”hc_space”,”id”:”LhBLc”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_2YzY5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”kf6hG”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”wRdIf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Video Alarm Verification and Remote Video Monitoring”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”TsQje”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<p>Another trend which leverages the more advanced video analytics that are becoming available is the increased adoption of video alarm verification and remote video monitoring. Traditional burglar systems can detect doors opening or motion from motion detection sensors. But these traditional systems provide very little intelligence on the cause of these actions. When alarms are received at a central monitoring center from these types of sensors, the only option is to notify someone and dispatch the police. With the ubiquity of broadband and the advanced video solutions that are available, you can link video cameras with traditional intrusion detection systems which allows an operator in the central monitoring center to view the video for the purpose of identification the cause of the alarm. This allows for reductions in false alarm detections and reporting which frees up police department resources. It also provides a way for faster identification of actual crimes in progress which can generate a quicker response from police authorities. When video is used to verify alarms, operators can also communicate to the site with the alarm to proactively notify the offender that he or she is trespassing and that the police will be dispatched, helping with the prevention of further criminal activity.&lt;\/p&gt;“},{“component”:”hc_button”,”id”:”SlC3C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]},{“component”:”hc_column”,”id”:”YotE7″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”P9SQP”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]}]},{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”76C9q”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”text-align: left;”,”content”:”We believe that investing in these four trends can make it easier to monitor and manage your physical security systems from anywhere at any time. With this increased ease of use comes increased effectiveness for the security of your facilities and employees.”},{“component”:”hc_space”,”id”:”OjjWN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””}]}]}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http:\/\/themes.framework-y.com\/demo-import\/signflow\/2018\/01\/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”column_OIFiN”:{“id”:”column_OIFiN”,”main_content”:{“component”:”hc_space”,”id”:”0MEot”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”column_UdeyH”:{“id”:”column_UdeyH”,”main_content”:{“component”:”hc_space”,”id”:”csEM5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”column_WrtwK”:{“id”:”column_WrtwK”,”main_content”:{“component”:”hc_space”,”id”:”LhBLc”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Top Security Trends in 2022″,”tag”:”h1″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”text-align: left;”,”content”:”What are the top trends in physical security management for 2022? Based on our view of market demand and new product availability, we believe that there are four key trends shaping the security market this year. They are increased platform integration, continued migration to cloud-based services, increased use of artificial intelligence and machine learning, and growth in video verification and remote video monitoring. We will explore each of these below.”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_button”,”id”:”XePgh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-lg”,”position”:”center”,”animation”:false,”text”:”Request A Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”kkdJq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_XWFMG”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”UaXMl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_zRj15″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”column_Fyg45″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”ZNPdO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Video-CCTV-systems-png-e1551391421833.png|141|250|999955901″,”alt”:””,”thumb_size”:”large”}]},{“component”:”hc_column”,”id”:”column_yUWkf”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”aBLoK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Platform Integration”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” First, we see a continuing trend in platform integration which makes it easier to operate the physical security systems. Linking your camera system with your badge access control system provides intelligence and monitoring of the entrance and exit activity at your facility. Also, with today\u2019s advanced platforms, it is possible to easily share reports and videos of activity with others from anywhere at any time. Another example of the benefits of integration are with mobile access credentials. It is now possible to store your secure access credential on your smartphone and use your Bluetooth connection to gain access to a facility without having to carry a physical card or keyfob.“},{“component”:”hc_button”,”id”:”mZvcE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]}]},{“component”:”hc_space”,”id”:”0MEot”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_8mfNX”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”ObsqD”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”yO9Z4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Migration to Cloud-Based Platforms”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”DxDb7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Closely linked with the continued move to platform integration is the migration to cloud-based platforms and services. End users are finding that these cloud platforms are far easier to use and manage than the tradition systems which rely on software and servers. With the old software and server model, the user must keep the server up to date with operating system updates and malware prevention while also paying for support agreements and regular software upgrades. With a cloud-based system, the security is maintained by the cloud platform provider and regular updates with new features and benefits are automatically pushed down to the users. “},{“component”:”hc_button”,”id”:”63zpp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]},{“component”:”hc_column”,”id”:”rXtKv”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”CLUO7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]}]},{“component”:”hc_space”,”id”:”csEM5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_yTzrA”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”cB8iY”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”L7Vgo”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]},{“component”:”hc_column”,”id”:”pEMvu”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”Qvi1P”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Artificial Intelligence Technologies”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”glQ8Q”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Leveraging the use of cloud-based services, new artificial intelligence technologies are enabling the use of more sophisticated analytics for better identification and notification of actual security threats. Traditionally, video systems could identify motion but could not easily distinguish between the causes of that motion activity. A threat from an intruder would be treated the same as a tree blowing in the wind. This lack of intelligence in detection leads to false activations and notifications which decreases the effectiveness of the video security system. With new software intelligence, video systems can detect specific activities that are identified as potential security threats. Human activity, vehicle detection, and loitering are three examples of more advanced analytics which can decrease false alerts and make your security systems more effective.“},{“component”:”hc_button”,”id”:”H9U6i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]}]},{“component”:”hc_space”,”id”:”LhBLc”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_2YzY5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”kf6hG”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”wRdIf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Video Alarm Verification and Remote Video Monitoring”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”TsQje”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Another trend which leverages the more advanced video analytics that are becoming available is the increased adoption of video alarm verification and remote video monitoring. Traditional burglar systems can detect doors opening or motion from motion detection sensors. But these traditional systems provide very little intelligence on the cause of these actions. When alarms are received at a central monitoring center from these types of sensors, the only option is to notify someone and dispatch the police. With the ubiquity of broadband and the advanced video solutions that are available, you can link video cameras with traditional intrusion detection systems which allows an operator in the central monitoring center to view the video for the purpose of identification the cause of the alarm. This allows for reductions in false alarm detections and reporting which frees up police department resources. It also provides a way for faster identification of actual crimes in progress which can generate a quicker response from police authorities. When video is used to verify alarms, operators can also communicate to the site with the alarm to proactively notify the offender that he or she is trespassing and that the police will be dispatched, helping with the prevention of further criminal activity.“},{“component”:”hc_button”,”id”:”SlC3C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Request a Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]},{“component”:”hc_column”,”id”:”YotE7″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”P9SQP”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]}]},{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”76C9q”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”text-align: left;”,”content”:”We believe that investing in these four trends can make it easier to monitor and manage your physical security systems from anywhere at any time. With this increased ease of use comes increased effectiveness for the security of your facilities and employees.”},{“component”:”hc_space”,”id”:”OjjWN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””}]}]}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http:\/\/themes.framework-y.com\/demo-import\/signflow\/2018\/01\/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”column_OIFiN”:{“id”:”column_OIFiN”,”main_content”:{“component”:”hc_space”,”id”:”0MEot”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”column_UdeyH”:{“id”:”column_UdeyH”,”main_content”:{“component”:”hc_space”,”id”:”csEM5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”column_WrtwK”:{“id”:”column_WrtwK”,”main_content”:{“component”:”hc_space”,”id”:”LhBLc”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2022-01-26T14:33:42-05:00</modified>
	</item>
	<item>
		<id>999956766</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/lp-top-security-trends-2022/</url>
		<title>Top Security Trends in 2022</title>
		<h1>Top Security Trends in 2022</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”About us four”,”subtitle”:””,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkFa”:{“component”:”hc_section”,”id”:”section_5ZtkFa”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_jGtij”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”J6H2p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”What are the top trends in physical security management for 2022? Based on our view of market demand and new product availability, we believe that there are four key trends shaping the security market this year. They are increased platform integration, continued migration to cloud-based services, increased use of artificial intelligence and machine […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”About us four”,”subtitle”:””,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkFa”:{“component”:”hc_section”,”id”:”section_5ZtkFa”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_jGtij”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”J6H2p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”What are the top trends in physical security management for 2022? Based on our view of market demand and new product availability, we believe that there are four key trends shaping the security market this year. They are increased platform integration, continued migration to cloud-based services, increased use of artificial intelligence and machine learning, and growth in video verification and remote video monitoring. We will explore each of these below.\n\nFirst, we see a continuing trend in platform integration which makes it easier to operate the physical security systems. Linking your camera system with your badge access control system provides intelligence and monitoring of the entrance and exit activity at your facility. Also, with today’s advanced platforms, it is possible to easily share reports and videos of activity with others from anywhere at any time. Another example of the benefits of integration are with mobile access credentials. It is now possible to store your secure access credential on your smartphone and use your Bluetooth connection to gain access to a facility without having to carry a physical card or keyfob.\n\nClosely linked with the continued move to platform integration is the migration to cloud-based platforms and services. End users are finding that these cloud platforms are far easier to use and manage than the tradition systems which rely on software and servers. With the old software and server model, the user must keep the server up to date with operating system updates and malware prevention while also paying for support agreements and regular software upgrades. With a cloud-based system, the security is maintained by the cloud platform provider and regular updates with new features and benefits are automatically pushed down to the users.\n\nLeveraging the use of cloud-based services, new artificial intelligence technologies are enabling the use of more sophisticated analytics for better identification and notification of actual security threats. Traditionally, video systems could identify motion but could not easily distinguish between the causes of that motion activity. A threat from an intruder would be treated the same as a tree blowing in the wind. This lack of intelligence in detection leads to false activations and notifications which decreases the effectiveness of the video security system. With new software intelligence, video systems can detect specific activities that are identified as potential security threats. Human activity, vehicle detection, and loitering are three examples of more advanced analytics which can decrease false alerts and make your security systems more effective.\n\nAnother trend which leverages the more advanced video analytics that are becoming available is the increased adoption of video alarm verification and remote video monitoring. Traditional burglar systems can detect doors opening or motion from motion detection sensors. But these traditional systems provide very little intelligence on the cause of these actions. When alarms are received at a central monitoring center from these types of sensors, the only option is to notify someone and dispatch the police. With the ubiquity of broadband and the advanced video solutions that are available, you can link video cameras with traditional intrusion detection systems which allows an operator in the central monitoring center to view the video for the purpose of identification the cause of the alarm. This allows for reductions in false alarm detections and reporting which frees up police department resources. It also provides a way for faster identification of actual crimes in progress which can generate a quicker response from police authorities. When video is used to verify alarms, operators can also communicate to the site with the alarm to proactively notify the offender that he or she is trespassing and that the police will be dispatched, helping with the prevention of further criminal activity.\n\nWe believe that investing in these four trends can make it easier to monitor and manage your physical security systems from anywhere at any time. With this increased ease of use comes increased effectiveness for the security of your facilities and employees.\n”},{“component”:”hc_space”,”id”:”SR9h7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”About us four”,”subtitle”:””,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkFa”:{“component”:”hc_section”,”id”:”section_5ZtkFa”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_jGtij”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”J6H2p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”What are the top trends in physical security management for 2022? Based on our view of market demand and new product availability, we believe that there are four key trends shaping the security market this year. They are increased platform integration, continued migration to cloud-based services, increased use of artificial intelligence and machine learning, and growth in video verification and remote video monitoring. We will explore each of these below.\n\nFirst, we see a continuing trend in platform integration which makes it easier to operate the physical security systems. Linking your camera system with your badge access control system provides intelligence and monitoring of the entrance and exit activity at your facility. Also, with today’s advanced platforms, it is possible to easily share reports and videos of activity with others from anywhere at any time. Another example of the benefits of integration are with mobile access credentials. It is now possible to store your secure access credential on your smartphone and use your Bluetooth connection to gain access to a facility without having to carry a physical card or keyfob.\n\nClosely linked with the continued move to platform integration is the migration to cloud-based platforms and services. End users are finding that these cloud platforms are far easier to use and manage than the tradition systems which rely on software and servers. With the old software and server model, the user must keep the server up to date with operating system updates and malware prevention while also paying for support agreements and regular software upgrades. With a cloud-based system, the security is maintained by the cloud platform provider and regular updates with new features and benefits are automatically pushed down to the users.\n\nLeveraging the use of cloud-based services, new artificial intelligence technologies are enabling the use of more sophisticated analytics for better identification and notification of actual security threats. Traditionally, video systems could identify motion but could not easily distinguish between the causes of that motion activity. A threat from an intruder would be treated the same as a tree blowing in the wind. This lack of intelligence in detection leads to false activations and notifications which decreases the effectiveness of the video security system. With new software intelligence, video systems can detect specific activities that are identified as potential security threats. Human activity, vehicle detection, and loitering are three examples of more advanced analytics which can decrease false alerts and make your security systems more effective.\n\nAnother trend which leverages the more advanced video analytics that are becoming available is the increased adoption of video alarm verification and remote video monitoring. Traditional burglar systems can detect doors opening or motion from motion detection sensors. But these traditional systems provide very little intelligence on the cause of these actions. When alarms are received at a central monitoring center from these types of sensors, the only option is to notify someone and dispatch the police. With the ubiquity of broadband and the advanced video solutions that are available, you can link video cameras with traditional intrusion detection systems which allows an operator in the central monitoring center to view the video for the purpose of identification the cause of the alarm. This allows for reductions in false alarm detections and reporting which frees up police department resources. It also provides a way for faster identification of actual crimes in progress which can generate a quicker response from police authorities. When video is used to verify alarms, operators can also communicate to the site with the alarm to proactively notify the offender that he or she is trespassing and that the police will be dispatched, helping with the prevention of further criminal activity.\n\nWe believe that investing in these four trends can make it easier to monitor and manage your physical security systems from anywhere at any time. With this increased ease of use comes increased effectiveness for the security of your facilities and employees.\n”},{“component”:”hc_space”,”id”:”SR9h7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2022-01-26T11:32:44-05:00</modified>
	</item>
	<item>
		<id>999956725</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/contact-testing/</url>
		<title>Contact Us Testing</title>
		<h1>Contact Us Testing</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Faq”,”subtitle”:”Get help 24/7/365 from our frequently asked questions and support team”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_HY5f8″:{“component”:”hc_section”,”id”:”section_HY5f8″,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”ATNNm”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”4AJr5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Send a Messagea”,”tag”:”h2″},{“component”:”hc_space”,”id”:”lqh3K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_block”,”id”:”xQQNb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””},{“component”:”hc_space”,”id”:”L6eHF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”5ZtkF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”General Questions”,”tag”:”h2″},{“component”:”hc_space”,”id”:”F4m1n”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_accordion”,”id”:”mZsCi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do I change my alarm codes?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”jpEIh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To change your alarm code on a Honeywell Vista-20P or Vista-21IP alarm control panel (the type of system you have is listed on the inside door of the brown metal alarm control cabinet), you first enter […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Faq”,”subtitle”:”Get help 24/7/365 from our frequently asked questions and support team”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_HY5f8″:{“component”:”hc_section”,”id”:”section_HY5f8″,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”ATNNm”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”4AJr5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Send a Messagea”,”tag”:”h2″},{“component”:”hc_space”,”id”:”lqh3K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_block”,”id”:”xQQNb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“},{“component”:”hc_space”,”id”:”L6eHF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”5ZtkF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”General Questions”,”tag”:”h2″},{“component”:”hc_space”,”id”:”F4m1n”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_accordion”,”id”:”mZsCi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do I change my alarm codes?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”jpEIh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To change your alarm code on a Honeywell Vista-20P or Vista-21IP alarm control panel (the type of system you have is listed on the inside door of the brown metal alarm control cabinet), you first enter your four digit master code, then press 8, then enter the two digit user number you want to change (03-32 are the valid user numbers), and then enter the new four digit code for the user. The keypad should beep twice to let you know that the code was accepted. As an additional verification step, you can enter the new code and then press the Off button to verify that the new code works (the system should beep after you press Off). If you do not have a Honeywell Vista-20P or Vista-21IP alarm control panel, please contact us for instructions.”}],”name_2″:”How do I retrieve video from my Digital Video Recorder and record it to a CD or to my computer?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”fgMBL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every Digital Video Recorder (DVR) has a different procedure for retrieving video. You will need to check the user manual for your DVR to get the instructions. If you need the user manual for your DVR, please contact us.  We would be happy to send you one.”}],”name_3″:”How do I know if my Digital Video Recorder is recording?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”2WkjS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”You should see a red record light on the front of your Digital Video Recorder (DVR) when it is recording. As an additional step, you should periodically view recorded video on your DVR to ensure that it is recording properly.”}],”name_4″:”Why can’t I view my video remotely over the Internet?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”Ye2vz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To view video remotely over the Internet from your Digital Video Recorder (DVR), you must first have your DVR connected to a high-speed Internet connection and ensure that it is programmed for remote network access. If you have confirmed that it is connected and configured properly, then there may be a problem with your router or your Internet connection. When you can interrupt your Internet connection, you should power down your modem (cable or DSL), your router, and your DVR and wait two minutes. Then, you should first power up your modem and wait for a minute or two. Then, you should power up your router and wait for a minute or two. Then, you should power up your DVR and try the remote access again. If this process does not work, please contact us for technical support.”}],”name_5″:””,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[],”name_6″:””,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[],”name_7″:””,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:””,”time”:””,”open”:””}]},{“component”:”hc_column”,”id”:”column_5ZtkF”,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”boxed-inverse “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”fdxJg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Request support”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”suFGi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our support line is staffed 24 hours a day, 7 days a week, and 365 days a year”},{“component”:”hc_space”,”id”:”EXErn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”Ue3qY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”4UlBG”,”image_link”:””,”title”:”Office”,”subtitle”:”678-924-7480″,”extra”:””},{“component”:”repeater_item”,”id”:”FjGNK”,”image_link”:””,”title”:”Fax”,”subtitle”:”678-924-0192″,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false},{“component”:”hc_space”,”id”:”fcNiQ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”w7HYm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”VMQhk”,”image_link”:””,”title”:”Inquiries”,”subtitle”:”info@verifiedsecurity.com”,”extra”:””},{“component”:”repeater_item”,”id”:”DWAUh”,”image_link”:””,”title”:”Service”,”subtitle”:”service@verifiedsecurity.com”,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false}]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Faq”,”subtitle”:”Get help 24/7/365 from our frequently asked questions and support team”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_HY5f8″:{“component”:”hc_section”,”id”:”section_HY5f8″,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”ATNNm”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”4AJr5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Send a Messagea”,”tag”:”h2″},{“component”:”hc_space”,”id”:”lqh3K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_block”,”id”:”xQQNb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“},{“component”:”hc_space”,”id”:”L6eHF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”5ZtkF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”General Questions”,”tag”:”h2″},{“component”:”hc_space”,”id”:”F4m1n”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_accordion”,”id”:”mZsCi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do I change my alarm codes?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”jpEIh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To change your alarm code on a Honeywell Vista-20P or Vista-21IP alarm control panel (the type of system you have is listed on the inside door of the brown metal alarm control cabinet), you first enter your four digit master code, then press 8, then enter the two digit user number you want to change (03-32 are the valid user numbers), and then enter the new four digit code for the user. The keypad should beep twice to let you know that the code was accepted. As an additional verification step, you can enter the new code and then press the Off button to verify that the new code works (the system should beep after you press Off). If you do not have a Honeywell Vista-20P or Vista-21IP alarm control panel, please contact us for instructions.”}],”name_2″:”How do I retrieve video from my Digital Video Recorder and record it to a CD or to my computer?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”fgMBL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every Digital Video Recorder (DVR) has a different procedure for retrieving video. You will need to check the user manual for your DVR to get the instructions. If you need the user manual for your DVR, please contact us.  We would be happy to send you one.”}],”name_3″:”How do I know if my Digital Video Recorder is recording?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”2WkjS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”You should see a red record light on the front of your Digital Video Recorder (DVR) when it is recording. As an additional step, you should periodically view recorded video on your DVR to ensure that it is recording properly.”}],”name_4″:”Why can’t I view my video remotely over the Internet?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”Ye2vz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To view video remotely over the Internet from your Digital Video Recorder (DVR), you must first have your DVR connected to a high-speed Internet connection and ensure that it is programmed for remote network access. If you have confirmed that it is connected and configured properly, then there may be a problem with your router or your Internet connection. When you can interrupt your Internet connection, you should power down your modem (cable or DSL), your router, and your DVR and wait two minutes. Then, you should first power up your modem and wait for a minute or two. Then, you should power up your router and wait for a minute or two. Then, you should power up your DVR and try the remote access again. If this process does not work, please contact us for technical support.”}],”name_5″:””,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[],”name_6″:””,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[],”name_7″:””,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:””,”time”:””,”open”:””}]},{“component”:”hc_column”,”id”:”column_5ZtkF”,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”boxed-inverse “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”fdxJg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Request support”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”suFGi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our support line is staffed 24 hours a day, 7 days a week, and 365 days a year”},{“component”:”hc_space”,”id”:”EXErn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”Ue3qY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”4UlBG”,”image_link”:””,”title”:”Office”,”subtitle”:”678-924-7480″,”extra”:””},{“component”:”repeater_item”,”id”:”FjGNK”,”image_link”:””,”title”:”Fax”,”subtitle”:”678-924-0192″,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false},{“component”:”hc_space”,”id”:”fcNiQ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”w7HYm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”VMQhk”,”image_link”:””,”title”:”Inquiries”,”subtitle”:”info@verifiedsecurity.com”,”extra”:””},{“component”:”repeater_item”,”id”:”DWAUh”,”image_link”:””,”title”:”Service”,”subtitle”:”service@verifiedsecurity.com”,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false}]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-11-01T11:28:23-04:00</modified>
	</item>
	<item>
		<id>999956740</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/lp-verified-security/</url>
		<title>Verified Security</title>
		<h1>Verified Security</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:true,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems”,”tag”:”h1″},{“component”:”hc_title_tag”,”id”:”nx7T8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Advanced security systems to protect your business”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”quDQ3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We deliver superior products with extremely responsive service to provide you with the best security systems”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Wf3vO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2018/01/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”section_kFsHV”:{“component”:”hc_section”,”id”:”section_kFsHV”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0r6hE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security has been serving the greater Atlanta area for over 18 years. We understand the importance of quality video surveillance systems, access […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:true,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems”,”tag”:”h1″},{“component”:”hc_title_tag”,”id”:”nx7T8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Advanced security systems to protect your business”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”quDQ3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We deliver superior products with extremely responsive service to provide you with the best security systems”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Wf3vO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2018/01/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”section_kFsHV”:{“component”:”hc_section”,”id”:”section_kFsHV”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0r6hE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security has been serving the greater Atlanta area for over 18 years. We understand the importance of quality video surveillance systems, access control technology, fire alarms, and other commercial security and life safety needs. Our experts will guide you through our custom design process and help you to choose the proper security cameras, alarms, and locks to ensure that your company is monitored and protected. After we’ve built the optimal security solution for your business, our team will personally handle the entire installation process. Contact us today to learn why we’re the premier commercial security company in Atlanta GA.”},{“component”:”hc_space”,”id”:”OjjWN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””}]},{“component”:”hc_column”,”id”:”column_nTG6b”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http://themes.framework-y.com/demo-import/signflow/2018/01/long-2-1024×614.jpg|1152|1920|41″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:{},”css”:{},”css_page”:”.wpcf7-spinner {\n    display: none;\n}\n\n.navbar-nav {\n    display:none;\n}\n\n.h3 {\n    line-height: 37px!important;\n}\n\n”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:true,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems”,”tag”:”h1″},{“component”:”hc_title_tag”,”id”:”nx7T8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Advanced security systems to protect your business”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”quDQ3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We deliver superior products with extremely responsive service to provide you with the best security systems”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Wf3vO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2018/01/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”section_kFsHV”:{“component”:”hc_section”,”id”:”section_kFsHV”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0r6hE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security has been serving the greater Atlanta area for over 18 years. We understand the importance of quality video surveillance systems, access control technology, fire alarms, and other commercial security and life safety needs. Our experts will guide you through our custom design process and help you to choose the proper security cameras, alarms, and locks to ensure that your company is monitored and protected. After we’ve built the optimal security solution for your business, our team will personally handle the entire installation process. Contact us today to learn why we’re the premier commercial security company in Atlanta GA.”},{“component”:”hc_space”,”id”:”OjjWN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””}]},{“component”:”hc_column”,”id”:”column_nTG6b”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http://themes.framework-y.com/demo-import/signflow/2018/01/long-2-1024×614.jpg|1152|1920|41″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:{},”css”:{},”css_page”:”.wpcf7-spinner {\n display: none;\n}\n\n.navbar-nav {\n display:none;\n}\n\n.h3 {\n line-height: 37px!important;\n}\n\n”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2021/11/verified-security-logo-preview.png</image>
		<modified>2025-05-07T16:33:01-04:00</modified>
	</item>
	<item>
		<id>999956555</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/business-security-systems/</url>
		<title>Business Security Systems</title>
		<h1>Business Security Systems</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Business Security Systems”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Business Security Systems | Every business faces threats to its security. Whether you need to secure an office, industrial facility, or retail establishment, vandalism, break-ins, and trespassing constantly threaten to disrupt operations and cost your business money.\nPreventing crime and immediately responding to emergencies keeps your business running smoothly and prevents capital losses. A […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Business Security Systems”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Business Security Systems | Every business faces threats to its security. Whether you need to secure an office, industrial facility, or retail establishment, vandalism, break-ins, and trespassing constantly threaten to disrupt operations and cost your business money.\nPreventing crime and immediately responding to emergencies keeps your business running smoothly and prevents capital losses. A commercial security system from Verified Security delivers state-of-the-art solutions that keep your company safe. Atlanta area businesses depend on Verified Security because we offer security solutions tailored to each of our client’s needs with systems that may include:”},{“component”:”hc_column”,”id”:”column_UKqqs”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”KI4Yt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”9Z26f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”6kjvA”,”icon”:”fa fa-check”,”text”:”Hard wired alarms”},{“component”:”repeater_item”,”id”:”l9oD7″,”icon”:”fa fa-check”,”text”:”Wireless alarms”},{“component”:”repeater_item”,”id”:”HfZqv”,”icon”:”fa fa-check”,”text”:”Sensors: Door\/window, glass breakage, motion sensor, beams”},{“component”:”repeater_item”,”id”:”mCYTL”,”icon”:”fa fa-check”,”text”:”24\/7 monitoring services”},{“component”:”repeater_item”,”id”:”fCC0o”,”icon”:”fa fa-check”,”text”:”Remote access for system control from anywhere at any time”},{“component”:”repeater_item”,”id”:”ZDaL4″,”icon”:”fa fa-check”,”text”:”Video surveillance systems (Security Camera) “},{“component”:”repeater_item”,”id”:”yIWuV”,”icon”:”fa fa-check”,”text”:”Access control”},{“component”:”repeater_item”,”id”:”cfoB0″,”icon”:”fa fa-check”,”text”:”Fire alarm systems, false alarm”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”W6DWO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Zpkxr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security’s consultants analyze the vulnerabilities of each client’s business facilities to determine which features will provide the most benefits. In the paragraphs below, we look at how different security technology works to keep your business safe.  “}]},{“component”:”hc_column”,”id”:”column_B1kzq”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”D4ECJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_image”,”id”:”jex4F”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Good-picture.png|582|667|999956531″,”alt”:”door access control system”,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”6Twux”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}]},{“component”:”hc_space”,”id”:”NIBlm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”JZyD2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Burglar Alarms”,”tag”:”h2″},{“component”:”hc_space”,”id”:”FY8cL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”7s0SL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Keeps Troublesome Individuals Out of Your Workplace”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”00gdE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Before modern technology, dogs provided the best security: they literally smell when something is amiss and give off warnings no one can miss. But dogs cannot call police and fire departments, tell you about specific problems, or record events. They also may not detect stealthy thieves or the beginnings of a disaster.\nToday’s technology provides rapid detection of all types of emergencies, blocks access to unauthorized persons, and keeps a record of what transpired.\nWhen choosing a security system, it’s essential to understand the differences between hard-wired and wireless alarms.”},{“component”:”hc_space”,”id”:”27aUl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”BM4F0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Hard Wired Alarms”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”INGt8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Hard-wired security systems are the ones you see in 1990s thriller movies. The bad guy uses his special wire clippers to sever the system’s communications, disabling or shutting off the alarm. This fictional (and unrealistic) circumvention of the system happens in the movies because hard-wired systems rely on cabling that runs throughout the facility.\nBut disabling a hard-wired system through wire cutting is much more challenging when it runs on a closed-circuit\u2014closed-circuit alarms sound when something interrupts the flow of electricity, such as when a burglar cuts wires. In addition, they offer the advantage of being resistant to interference, a weakness of wireless burglar alarms. \nHard wired systems work everywhere. Verified Security just needs to install the cabling. They are a bit more costly than wireless systems because of the more complex installation methods.”},{“component”:”hc_space”,”id”:”kB5xO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”cZXFR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Wireless Alarms”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”nsCxD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Wireless tech allows for faster installations at a lower price, with no cabling required.\nHowever, wireless systems function only in specific locations because a strong signal must be present for the system to operate. In addition, because wireless signals grow weaker with distance, wireless systems work best at smaller facilities.”},{“component”:”hc_space”,”id”:”PAdGH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”chDHk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Sensors”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”CAuIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Modern tech makes successful break-ins very difficult when we place sensors at all the vulnerable points.\nWhen we think of points of entry, doors and windows naturally come to mind first. Many burglars possess the skills necessary to bypass a lock or to remove doors and windows. By deploying door and window sensors, we block this route of breaking and entering. “},{“component”:”hc_space”,”id”:”zjA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”gIYbl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Glass”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”tlyCr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Glass breakage is a common form of illegal entrance and vandalism. By using glass breakage detectors, Verified Security ensures that as soon as a criminal breaks the window, the alarm sounds, and an emergency response commences.”},{“component”:”hc_space”,”id”:”PhZQz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”i6RpE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Motion”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”rOMfN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Motion sensors work based on temperature fluctuations. When people move within a room, they distribute body heat. Motion detectors pick up this heat transfer, resulting in an alarm.”},{“component”:”hc_space”,”id”:”EnsDy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”bxCIj”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Beam Detectors”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”jczzX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Beam detectors use infrared beams or lasers to sense motion. They work like the chimes in a retail store that sound when someone enters. When a person interrupts the beam, the alarm is triggered.”},{“component”:”hc_space”,”id”:”JXZt3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”eltom”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Monitoring Options”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”hUPJK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Of course, all the intrusion detection in the world does no good if no one monitors the alarm system.  Verified Security provides 24\/7\/365 monitoring service through several different technologies.”},{“component”:”hc_space”,”id”:”jogUx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”yqLS8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Telephone Lines”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”hy5Cp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Telephone lines connect your alarm system to our central monitoring station, alerting security personnel when an intrusion occurs. Because telephone lines usually remain in operation during power outages, they are considered an essential communication source.”},{“component”:”hc_space”,”id”:”KhU7i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”1S5VB”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cellular Modules”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”JiP48″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Cellular modules communicate with the central station monitoring center via cell towers. These provide a helpful resource because they operate even when power is out, and cutting telephone lines won\u2019t disable them.”},{“component”:”hc_space”,”id”:”rMD4b”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”JoPQs”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Internet Connections”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”t9kaG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Internet connections also serve as a vital communications link with the central station. They allow for connectivity if phone lines go down, though they may be susceptible to outages during power failures.”},{“component”:”hc_space”,”id”:”tuKz3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”wed2L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Remote Access (App Control)”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”CEAaJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Apps have extended their influence into the security industry. Because of wireless connections, smart lock control and remote access to your security system is possible from any computer or smartphone. Should an alarm sound, you would receive a notification and can even access live stream video. You can also control systems within your facility, such as the temperature and security systems.”},{“component”:”hc_space”,”id”:”D9jif”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”BTMDW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Fire Alarm”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”dXltL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”While you want to protect your premises from intruders, fires present a danger that can shut down a location for good. Fast emergency response is essential for saving the building and anyone unfortunate enough to be inside. Our monitoring services provide rapid responses to fire alarm signals.”},{“component”:”hc_text_block”,”id”:”uz6Hl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security’s fire alarm systems detect smoke and temperature increases and send an alert to our central monitoring center which can then dispatch the fire department. In addition, clients who opt for video access can see what is occurring inside their facilities. The fire department can use this information to locate the source of the conflagration. “},{“component”:”hc_space”,”id”:”vR60A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”8TlTq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Access Control and Video Surveillance Integration”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”2LAVI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Access control systems allow you to grant facility access (or access to certain areas) to authorized people only. They also document who enters and leaves and when unauthorized users try to gain access. When Verified Security integrates these technologies with video surveillance, surveillance cameras, and professional monitoring, you control access and obtain a visual record of facility activity.”},{“component”:”hc_space”,”id”:”OJzBt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”OUHTa”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Don’t Take Your Commercial Security for Granted”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”P35dK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every business owner faces the threat of intrusions or disasters. Being prepared deters would-be thieves and dramatically reduces the chances that your business will become the victim of an intrusion. Atlanta, Georgia businesspeople turn to Verified Security to protect their investments in technology, supplies, and people.”},{“component”:”hc_text_block”,”id”:”NO2XS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In addition to deterring and helping apprehend intruders, Verified Security’s commercial security systems detect emergencies, such as fires, so that emergency personnel can respond immediately. You’ve invested too much in your business to risk it being irreparably damaged. Verified Security provides the tools that keep it protected.”}]},{“component”:”hc_column”,”id”:”column_36BXS”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”XKUOX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”v7338″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Verified Security Access Control Systems Protect Your Investment”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”p5t53″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A business requires the investment of capital, time and effort. Protecting these investments should always be a priority. Verified Security access control systems defend your company against intrusion while providing ease of access for employees and protecting the company from liability. The resources of your business are too valuable to risk, so Verified Security provides the solutions that keep your investments safe. “},{“component”:”hc_space”,”id”:”5IujV”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}]},{“component”:”hc_column”,”id”:”column_D7cBW”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”2rxgK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Y6qhb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<p>We proudly serve the greater <a href="%5C%22https:%5C/%5C/en.wikipedia.org%5C/wiki%5C/Atlanta_metropolitan_area%5C%22">Atlanta&lt;\/a&gt; area and look forward to working with your company. To learn more about how we can protect your business with sophisticated video surveillance and access control systems, </a><a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/contact%5C/%5C%22">contact Verified Security today.&lt;\/a&gt;&lt;\/p&gt;“}]},{“component”:”hc_column”,”id”:”column_h5Qw0″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”00BLx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]},{“component”:”hc_column”,”id”:”column_6rQYJ”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_nSBmK”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”1FN0Y”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]}],”section_settings”:””},”column_dELv6″:{“id”:”column_dELv6″,”main_content”:{“component”:”hc_title_tag”,”id”:”bxCIj”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Beam Detectors”,”tag”:”h4″}},”column_0lvHN”:{“id”:”column_0lvHN”,”main_content”:{“component”:”hc_title_tag”,”id”:”yqLS8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Telephone Lines”,”tag”:”h4″}},”column_frAkr”:{“id”:”column_frAkr”,”main_content”:{“component”:”hc_text_block”,”id”:”hy5Cp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Telephone lines connect your alarm system to our central monitoring station, alerting security personnel when an intrusion occurs. Because telephone lines usually remain in operation during power outages, they are considered an essential communication source.”}},”column_l8mFq”:{“id”:”column_l8mFq”,”main_content”:{“component”:”hc_space”,”id”:”KhU7i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”column_MkYjW”:{“id”:”column_MkYjW”,”main_content”:{“component”:”hc_title_tag”,”id”:”1S5VB”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cellular Modules”,”tag”:”h4″}},”column_fzIRe”:{“id”:”column_fzIRe”,”main_content”:{“component”:”hc_text_block”,”id”:”JiP48″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Cellular modules communicate with the central station monitoring center via cell towers. These provide a helpful resource because they operate even when power is out, and cutting telephone lines won\u2019t disable them.”}},”column_xKPfd”:{“id”:”column_xKPfd”,”main_content”:{“component”:”hc_space”,”id”:”rMD4b”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”column_k86iS”:{“id”:”column_k86iS”,”main_content”:{“component”:”hc_title_tag”,”id”:”JoPQs”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Internet Connections”,”tag”:”h4″}},”column_5At7B”:{“id”:”column_5At7B”,”main_content”:{“component”:”hc_text_block”,”id”:”t9kaG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Internet connections also serve as a vital communications link with the central station. They allow for connectivity if phone lines go down, though they may be susceptible to outages during power failures.”}},”column_jeVwd”:{“id”:”column_jeVwd”,”main_content”:{“component”:”hc_space”,”id”:”tuKz3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”column_cxxrr”:{“id”:”column_cxxrr”,”main_content”:{“component”:”hc_text_block”,”id”:”uz6Hl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security’s fire alarm systems detect smoke and temperature increases and send an alert to our central monitoring center which can then dispatch the fire department. In addition, clients who opt for video access can see what is occurring inside their facilities. The fire department can use this information to locate the source of the conflagration. “}},”column_HfMzS”:{“id”:”column_HfMzS”,”main_content”:{“component”:”hc_title_tag”,”id”:”OUHTa”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Don’t Take Your Commercial Security for Granted”,”tag”:”h3″}},”column_iEqcX”:{“id”:”column_iEqcX”,”main_content”:{“component”:”hc_text_block”,”id”:”P35dK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every business owner faces the threat of intrusions or disasters. Being prepared deters would-be thieves and dramatically reduces the chances that your business will become the victim of an intrusion. Atlanta, Georgia businesspeople turn to Verified Security to protect their investments in technology, supplies, and people.”}},”column_XoqHz”:{“id”:”column_XoqHz”,”main_content”:{“component”:”hc_text_block”,”id”:”NO2XS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In addition to deterring and helping apprehend intruders, Verified Security’s commercial security systems detect emergencies, such as fires, so that emergency personnel can respond immediately. You’ve invested too much in your business to risk it being irreparably damaged. Verified Security provides the tools that keep it protected.”}},”column_Slm58″:{“id”:”column_Slm58″,”main_content”:{“component”:”hc_space”,”id”:”XKUOX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_rkBm4″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_BPOQB”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</a></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Business Security Systems”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Business Security Systems | Every business faces threats to its security. Whether you need to secure an office, industrial facility, or retail establishment, vandalism, break-ins, and trespassing constantly threaten to disrupt operations and cost your business money.\nPreventing crime and immediately responding to emergencies keeps your business running smoothly and prevents capital losses. A commercial security system from Verified Security delivers state-of-the-art solutions that keep your company safe. Atlanta area businesses depend on Verified Security because we offer security solutions tailored to each of our client’s needs with systems that may include:”},{“component”:”hc_column”,”id”:”column_UKqqs”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”KI4Yt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”9Z26f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”6kjvA”,”icon”:”fa fa-check”,”text”:”Hard wired alarms”},{“component”:”repeater_item”,”id”:”l9oD7″,”icon”:”fa fa-check”,”text”:”Wireless alarms”},{“component”:”repeater_item”,”id”:”HfZqv”,”icon”:”fa fa-check”,”text”:”Sensors: Door\/window, glass breakage, motion sensor, beams”},{“component”:”repeater_item”,”id”:”mCYTL”,”icon”:”fa fa-check”,”text”:”24\/7 monitoring services”},{“component”:”repeater_item”,”id”:”fCC0o”,”icon”:”fa fa-check”,”text”:”Remote access for system control from anywhere at any time”},{“component”:”repeater_item”,”id”:”ZDaL4″,”icon”:”fa fa-check”,”text”:”Video surveillance systems (Security Camera) “},{“component”:”repeater_item”,”id”:”yIWuV”,”icon”:”fa fa-check”,”text”:”Access control”},{“component”:”repeater_item”,”id”:”cfoB0″,”icon”:”fa fa-check”,”text”:”Fire alarm systems, false alarm”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”W6DWO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Zpkxr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security’s consultants analyze the vulnerabilities of each client’s business facilities to determine which features will provide the most benefits. In the paragraphs below, we look at how different security technology works to keep your business safe. “}]},{“component”:”hc_column”,”id”:”column_B1kzq”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”D4ECJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_image”,”id”:”jex4F”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Good-picture.png|582|667|999956531″,”alt”:”door access control system”,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”6Twux”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}]},{“component”:”hc_space”,”id”:”NIBlm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”JZyD2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Burglar Alarms”,”tag”:”h2″},{“component”:”hc_space”,”id”:”FY8cL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”7s0SL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Keeps Troublesome Individuals Out of Your Workplace”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”00gdE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Before modern technology, dogs provided the best security: they literally smell when something is amiss and give off warnings no one can miss. But dogs cannot call police and fire departments, tell you about specific problems, or record events. They also may not detect stealthy thieves or the beginnings of a disaster.\nToday’s technology provides rapid detection of all types of emergencies, blocks access to unauthorized persons, and keeps a record of what transpired.\nWhen choosing a security system, it’s essential to understand the differences between hard-wired and wireless alarms.”},{“component”:”hc_space”,”id”:”27aUl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”BM4F0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Hard Wired Alarms”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”INGt8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Hard-wired security systems are the ones you see in 1990s thriller movies. The bad guy uses his special wire clippers to sever the system’s communications, disabling or shutting off the alarm. This fictional (and unrealistic) circumvention of the system happens in the movies because hard-wired systems rely on cabling that runs throughout the facility.\nBut disabling a hard-wired system through wire cutting is much more challenging when it runs on a closed-circuit\u2014closed-circuit alarms sound when something interrupts the flow of electricity, such as when a burglar cuts wires. In addition, they offer the advantage of being resistant to interference, a weakness of wireless burglar alarms. \nHard wired systems work everywhere. Verified Security just needs to install the cabling. They are a bit more costly than wireless systems because of the more complex installation methods.”},{“component”:”hc_space”,”id”:”kB5xO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”cZXFR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Wireless Alarms”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”nsCxD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Wireless tech allows for faster installations at a lower price, with no cabling required.\nHowever, wireless systems function only in specific locations because a strong signal must be present for the system to operate. In addition, because wireless signals grow weaker with distance, wireless systems work best at smaller facilities.”},{“component”:”hc_space”,”id”:”PAdGH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”chDHk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Sensors”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”CAuIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Modern tech makes successful break-ins very difficult when we place sensors at all the vulnerable points.\nWhen we think of points of entry, doors and windows naturally come to mind first. Many burglars possess the skills necessary to bypass a lock or to remove doors and windows. By deploying door and window sensors, we block this route of breaking and entering. “},{“component”:”hc_space”,”id”:”zjA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”gIYbl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Glass”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”tlyCr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Glass breakage is a common form of illegal entrance and vandalism. By using glass breakage detectors, Verified Security ensures that as soon as a criminal breaks the window, the alarm sounds, and an emergency response commences.”},{“component”:”hc_space”,”id”:”PhZQz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”i6RpE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Motion”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”rOMfN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Motion sensors work based on temperature fluctuations. When people move within a room, they distribute body heat. Motion detectors pick up this heat transfer, resulting in an alarm.”},{“component”:”hc_space”,”id”:”EnsDy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”bxCIj”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Beam Detectors”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”jczzX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Beam detectors use infrared beams or lasers to sense motion. They work like the chimes in a retail store that sound when someone enters. When a person interrupts the beam, the alarm is triggered.”},{“component”:”hc_space”,”id”:”JXZt3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”eltom”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Monitoring Options”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”hUPJK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Of course, all the intrusion detection in the world does no good if no one monitors the alarm system. Verified Security provides 24\/7\/365 monitoring service through several different technologies.”},{“component”:”hc_space”,”id”:”jogUx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”yqLS8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Telephone Lines”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”hy5Cp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Telephone lines connect your alarm system to our central monitoring station, alerting security personnel when an intrusion occurs. Because telephone lines usually remain in operation during power outages, they are considered an essential communication source.”},{“component”:”hc_space”,”id”:”KhU7i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”1S5VB”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cellular Modules”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”JiP48″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Cellular modules communicate with the central station monitoring center via cell towers. These provide a helpful resource because they operate even when power is out, and cutting telephone lines won\u2019t disable them.”},{“component”:”hc_space”,”id”:”rMD4b”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”JoPQs”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Internet Connections”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”t9kaG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Internet connections also serve as a vital communications link with the central station. They allow for connectivity if phone lines go down, though they may be susceptible to outages during power failures.”},{“component”:”hc_space”,”id”:”tuKz3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”wed2L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Remote Access (App Control)”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”CEAaJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Apps have extended their influence into the security industry. Because of wireless connections, smart lock control and remote access to your security system is possible from any computer or smartphone. Should an alarm sound, you would receive a notification and can even access live stream video. You can also control systems within your facility, such as the temperature and security systems.”},{“component”:”hc_space”,”id”:”D9jif”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”BTMDW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Fire Alarm”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”dXltL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”While you want to protect your premises from intruders, fires present a danger that can shut down a location for good. Fast emergency response is essential for saving the building and anyone unfortunate enough to be inside. Our monitoring services provide rapid responses to fire alarm signals.”},{“component”:”hc_text_block”,”id”:”uz6Hl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security’s fire alarm systems detect smoke and temperature increases and send an alert to our central monitoring center which can then dispatch the fire department. In addition, clients who opt for video access can see what is occurring inside their facilities. The fire department can use this information to locate the source of the conflagration. “},{“component”:”hc_space”,”id”:”vR60A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”8TlTq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Access Control and Video Surveillance Integration”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”2LAVI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Access control systems allow you to grant facility access (or access to certain areas) to authorized people only. They also document who enters and leaves and when unauthorized users try to gain access. When Verified Security integrates these technologies with video surveillance, surveillance cameras, and professional monitoring, you control access and obtain a visual record of facility activity.”},{“component”:”hc_space”,”id”:”OJzBt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”OUHTa”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Don’t Take Your Commercial Security for Granted”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”P35dK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every business owner faces the threat of intrusions or disasters. Being prepared deters would-be thieves and dramatically reduces the chances that your business will become the victim of an intrusion. Atlanta, Georgia businesspeople turn to Verified Security to protect their investments in technology, supplies, and people.”},{“component”:”hc_text_block”,”id”:”NO2XS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In addition to deterring and helping apprehend intruders, Verified Security’s commercial security systems detect emergencies, such as fires, so that emergency personnel can respond immediately. You’ve invested too much in your business to risk it being irreparably damaged. Verified Security provides the tools that keep it protected.”}]},{“component”:”hc_column”,”id”:”column_36BXS”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”XKUOX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”v7338″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Verified Security Access Control Systems Protect Your Investment”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”p5t53″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A business requires the investment of capital, time and effort. Protecting these investments should always be a priority. Verified Security access control systems defend your company against intrusion while providing ease of access for employees and protecting the company from liability. The resources of your business are too valuable to risk, so Verified Security provides the solutions that keep your investments safe. “},{“component”:”hc_space”,”id”:”5IujV”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}]},{“component”:”hc_column”,”id”:”column_D7cBW”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”2rxgK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Y6qhb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” We proudly serve the greater Atlanta area and look forward to working with your company. To learn more about how we can protect your business with sophisticated video surveillance and access control systems, contact Verified Security today.“}]},{“component”:”hc_column”,”id”:”column_h5Qw0″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”00BLx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]},{“component”:”hc_column”,”id”:”column_6rQYJ”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_nSBmK”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”1FN0Y”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]}],”section_settings”:””},”column_dELv6″:{“id”:”column_dELv6″,”main_content”:{“component”:”hc_title_tag”,”id”:”bxCIj”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Beam Detectors”,”tag”:”h4″}},”column_0lvHN”:{“id”:”column_0lvHN”,”main_content”:{“component”:”hc_title_tag”,”id”:”yqLS8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Telephone Lines”,”tag”:”h4″}},”column_frAkr”:{“id”:”column_frAkr”,”main_content”:{“component”:”hc_text_block”,”id”:”hy5Cp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Telephone lines connect your alarm system to our central monitoring station, alerting security personnel when an intrusion occurs. Because telephone lines usually remain in operation during power outages, they are considered an essential communication source.”}},”column_l8mFq”:{“id”:”column_l8mFq”,”main_content”:{“component”:”hc_space”,”id”:”KhU7i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”column_MkYjW”:{“id”:”column_MkYjW”,”main_content”:{“component”:”hc_title_tag”,”id”:”1S5VB”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cellular Modules”,”tag”:”h4″}},”column_fzIRe”:{“id”:”column_fzIRe”,”main_content”:{“component”:”hc_text_block”,”id”:”JiP48″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Cellular modules communicate with the central station monitoring center via cell towers. These provide a helpful resource because they operate even when power is out, and cutting telephone lines won\u2019t disable them.”}},”column_xKPfd”:{“id”:”column_xKPfd”,”main_content”:{“component”:”hc_space”,”id”:”rMD4b”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”column_k86iS”:{“id”:”column_k86iS”,”main_content”:{“component”:”hc_title_tag”,”id”:”JoPQs”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Internet Connections”,”tag”:”h4″}},”column_5At7B”:{“id”:”column_5At7B”,”main_content”:{“component”:”hc_text_block”,”id”:”t9kaG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Internet connections also serve as a vital communications link with the central station. They allow for connectivity if phone lines go down, though they may be susceptible to outages during power failures.”}},”column_jeVwd”:{“id”:”column_jeVwd”,”main_content”:{“component”:”hc_space”,”id”:”tuKz3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”column_cxxrr”:{“id”:”column_cxxrr”,”main_content”:{“component”:”hc_text_block”,”id”:”uz6Hl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security’s fire alarm systems detect smoke and temperature increases and send an alert to our central monitoring center which can then dispatch the fire department. In addition, clients who opt for video access can see what is occurring inside their facilities. The fire department can use this information to locate the source of the conflagration. “}},”column_HfMzS”:{“id”:”column_HfMzS”,”main_content”:{“component”:”hc_title_tag”,”id”:”OUHTa”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Don’t Take Your Commercial Security for Granted”,”tag”:”h3″}},”column_iEqcX”:{“id”:”column_iEqcX”,”main_content”:{“component”:”hc_text_block”,”id”:”P35dK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every business owner faces the threat of intrusions or disasters. Being prepared deters would-be thieves and dramatically reduces the chances that your business will become the victim of an intrusion. Atlanta, Georgia businesspeople turn to Verified Security to protect their investments in technology, supplies, and people.”}},”column_XoqHz”:{“id”:”column_XoqHz”,”main_content”:{“component”:”hc_text_block”,”id”:”NO2XS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In addition to deterring and helping apprehend intruders, Verified Security’s commercial security systems detect emergencies, such as fires, so that emergency personnel can respond immediately. You’ve invested too much in your business to risk it being irreparably damaged. Verified Security provides the tools that keep it protected.”}},”column_Slm58″:{“id”:”column_Slm58″,”main_content”:{“component”:”hc_space”,”id”:”XKUOX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_rkBm4″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_BPOQB”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-07-27T17:34:11-04:00</modified>
	</item>
	<item>
		<id>999956528</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/videosurveillance2/</url>
		<title>Video Surveillance</title>
		<h1>Video Surveillance</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”nC8NO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Good-picture.png|582|667|999956531″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, High Quality Video Surveillance and Security Services”,”tag”:”h2″},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Mobile app to access feed from anywhere”},{“component”:”repeater_item”,”id”:”c90pk”,”icon”:”fa fa-check”,”text”:”View from anywhere”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Share and Store Video Clips”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”24\/7 Support”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Playback recorded video clips anytime”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”High definition video”},{“component”:”repeater_item”,”id”:”f8550″,”icon”:”fa fa-check”,”text”:”Easy to Use Camera Systems”},{“component”:”repeater_item”,”id”:”vRs7G”,”icon”:”fa fa-check”,”text”:”Newest Technology”},{“component”:”repeater_item”,”id”:”dCYro”,”icon”:”fa fa-check”,”text”:”14+ Years of Experience”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Picture.jpeg|456|960|999956534″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our surveillance systems allow you to easily […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”nC8NO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Good-picture.png|582|667|999956531″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, High Quality Video Surveillance and Security Services”,”tag”:”h2″},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Mobile app to access feed from anywhere”},{“component”:”repeater_item”,”id”:”c90pk”,”icon”:”fa fa-check”,”text”:”View from anywhere”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Share and Store Video Clips”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”24\/7 Support”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Playback recorded video clips anytime”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”High definition video”},{“component”:”repeater_item”,”id”:”f8550″,”icon”:”fa fa-check”,”text”:”Easy to Use Camera Systems”},{“component”:”repeater_item”,”id”:”vRs7G”,”icon”:”fa fa-check”,”text”:”Newest Technology”},{“component”:”repeater_item”,”id”:”dCYro”,”icon”:”fa fa-check”,”text”:”14+ Years of Experience”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Picture.jpeg|456|960|999956534″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our surveillance systems allow you to easily view your security cameras, share video clips, and playback recorded footage anytime. With our newest technology, your camera feeds can even be accessed from anywhere with a mobile app. Additionally, our cameras offer 24\/7 support with super clear high definition video definition video.”},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Verified Security\u2019s commercial video surveillance protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe.  \n \nVerified Security offers state-of-the-art video surveillance systems customizable to match the needs of your business, whether you are responsible for securing a small store or a giant office park. We source from all the top manufacturers, allowing us to offer a large selection of indoor cameras, outdoor cameras, video recording, video management software, storage devices, motion sensors, and most other video security equipment. \n\nWhatever your surveillance needs, Verified Security has the solution. Our security consultants know how to design and install the most effective video surveillance systems for our clients. Call us at 678-924-7480 or fill out the form on this page to request more information. For more information about our different security cameras visit: https:\/\/verifiedsecurity.com\/video-surveillance\/ .”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:””,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”nC8NO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Good-picture.png|582|667|999956531″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, High Quality Video Surveillance and Security Services”,”tag”:”h2″},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Mobile app to access feed from anywhere”},{“component”:”repeater_item”,”id”:”c90pk”,”icon”:”fa fa-check”,”text”:”View from anywhere”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Share and Store Video Clips”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”24\/7 Support”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Playback recorded video clips anytime”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”High definition video”},{“component”:”repeater_item”,”id”:”f8550″,”icon”:”fa fa-check”,”text”:”Easy to Use Camera Systems”},{“component”:”repeater_item”,”id”:”vRs7G”,”icon”:”fa fa-check”,”text”:”Newest Technology”},{“component”:”repeater_item”,”id”:”dCYro”,”icon”:”fa fa-check”,”text”:”14+ Years of Experience”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2021\/06\/Picture.jpeg|456|960|999956534″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our surveillance systems allow you to easily view your security cameras, share video clips, and playback recorded footage anytime. With our newest technology, your camera feeds can even be accessed from anywhere with a mobile app. Additionally, our cameras offer 24\/7 support with super clear high definition video definition video.”},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Verified Security\u2019s commercial video surveillance protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe. \n \nVerified Security offers state-of-the-art video surveillance systems customizable to match the needs of your business, whether you are responsible for securing a small store or a giant office park. We source from all the top manufacturers, allowing us to offer a large selection of indoor cameras, outdoor cameras, video recording, video management software, storage devices, motion sensors, and most other video security equipment. \n\nWhatever your surveillance needs, Verified Security has the solution. Our security consultants know how to design and install the most effective video surveillance systems for our clients. Call us at 678-924-7480 or fill out the form on this page to request more information. For more information about our different security cameras visit: https:\/\/verifiedsecurity.com\/video-surveillance\/ .”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:””,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-07-06T10:23:17-04:00</modified>
	</item>
	<item>
		<id>999956517</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/videosurveillance/</url>
		<title>Video Surveillance</title>
		<h1>Video Surveillance</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Customizable Video Surveillance and Security “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our surveillance systems allow you to easily view your security cameras, share video clips, and playback recorded footage anytime. With our newest technology, your camera feeds can even be accessed from anywhere with a mobile app. Additionally, our cameras offer 24\/7 support with super clear high definition […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Customizable Video Surveillance and Security “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our surveillance systems allow you to easily view your security cameras, share video clips, and playback recorded footage anytime. With our newest technology, your camera feeds can even be accessed from anywhere with a mobile app. Additionally, our cameras offer 24\/7 support with super clear high definition video definition video.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Mobile app to access feed from anywhere”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Share and Store Video Clips”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”24\/7 Support”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Playback recorded video clips anytime”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”High definition video”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Verified Security\u2019s commercial video surveillance protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe.  \n \nVerified Security offers state-of-the-art video surveillance systems customizable to match the needs of your business, whether you are responsible for securing a small store or a giant office park. We source from all the top manufacturers, allowing us to offer a large selection of indoor cameras, outdoor cameras, video recording, video management software, storage devices, motion sensors, and most other video security equipment. \n\nWhatever your surveillance needs, Verified Security has the solution. Our security consultants know how to design and install the most effective video surveillance systems for our clients. Call us at 678-924-7480 or fill out the form on this page to request more information. For more information about our different security cameras visit: https:\/\/verifiedsecurity.com\/video-surveillance\/ .”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Customizable Video Surveillance and Security “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our surveillance systems allow you to easily view your security cameras, share video clips, and playback recorded footage anytime. With our newest technology, your camera feeds can even be accessed from anywhere with a mobile app. Additionally, our cameras offer 24\/7 support with super clear high definition video definition video.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Mobile app to access feed from anywhere”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Share and Store Video Clips”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”24\/7 Support”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Playback recorded video clips anytime”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”High definition video”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Verified Security\u2019s commercial video surveillance protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe. \n \nVerified Security offers state-of-the-art video surveillance systems customizable to match the needs of your business, whether you are responsible for securing a small store or a giant office park. We source from all the top manufacturers, allowing us to offer a large selection of indoor cameras, outdoor cameras, video recording, video management software, storage devices, motion sensors, and most other video security equipment. \n\nWhatever your surveillance needs, Verified Security has the solution. Our security consultants know how to design and install the most effective video surveillance systems for our clients. Call us at 678-924-7480 or fill out the form on this page to request more information. For more information about our different security cameras visit: https:\/\/verifiedsecurity.com\/video-surveillance\/ .”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-06-23T10:02:49-04:00</modified>
	</item>
	<item>
		<id>999956465</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/door-access-control-system/</url>
		<title>Access Control</title>
		<h1>Access Control</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Door Access Control System”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Door Access Control System | As a business owner, you have invested vast amounts of time and capital into your workplace, including equipment, computers, vehicles, furniture, business records, and much more. You\u2019ve also built a team of employees and professionals who serve your customers from inside the facility you\u2019ve worked tirelessly to […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Door Access Control System”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Door Access Control System | As a business owner, you have invested vast amounts of time and capital into your workplace, including equipment, computers, vehicles, furniture, business records, and much more. You\u2019ve also built a team of employees and professionals who serve your customers from inside the facility you\u2019ve worked tirelessly to create. These people and resources are far too important to jeopardize and protecting them is a high priority task that should be handled with care. \n\nAccess control systems are essentially smart locks that require predetermined credentials to access different locations in your facility. You can lock down important areas that are not meant for visitors to keep your operations running smoothly while also keeping your staff and customers safe. These precautions protect your enterprise from unwanted events that can endanger your business’s reputation and cost you financially. Ensure that your company is protected from accidents, burglary, theft, vandalism, and trespassing with access control. \n\nAccess control systems also save time and business expenses due to the following:”},{“component”:”hc_column”,”id”:”column_UKqqs”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”KI4Yt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”9Z26f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”6kjvA”,”icon”:”fa fa-check”,”text”:”Liability protection”},{“component”:”repeater_item”,”id”:”l9oD7″,”icon”:”fa fa-check”,”text”:”Ease of employee access”},{“component”:”repeater_item”,”id”:”HfZqv”,”icon”:”fa fa-check”,”text”:”No traditional keys to worry about”},{“component”:”repeater_item”,”id”:”mCYTL”,”icon”:”fa fa-check”,”text”:”Reduced cost of security personnel”},{“component”:”repeater_item”,”id”:”fCC0o”,”icon”:”fa fa-check”,”text”:”Eligibility for insurance discounts”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”W6DWO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Zpkxr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security\u2019s access control systems also integrate with other security measures, including intrusion security solutions. As one of a limited number of Honeywell Authorized Security Providers, Verified Security offers many access control options for your business.\n”}]},{“component”:”hc_column”,”id”:”column_B1kzq”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”D4ECJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_image”,”id”:”jex4F”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/02\/mobile-access-control.jpg|333|500|999956058″,”alt”:”door access control system”,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”6Twux”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}]},{“component”:”hc_space”,”id”:”NIBlm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”JZyD2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Door Access Control System | The Benefits”,”tag”:”h2″},{“component”:”hc_space”,”id”:”FY8cL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”7s0SL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Keeps Troublesome Individuals Out of Your Workplace”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”00gdE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Limit who can enter your facilities with an access control system. With video monitoring integration, Verified Security\u2019s 24-hour remote surveillance team is alerted and can summon emergency services.”},{“component”:”hc_space”,”id”:”27aUl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”BM4F0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Safety and Liability Protection”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”INGt8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Many businesses use machinery or dangerous chemicals in their production processes. Often, these present a danger to those who are unqualified to be around such hazardous materials. Verified Security\u2019s access control systems allow you to create restrictive zones, so only authorized people can enter hazardous areas. “},{“component”:”hc_space”,”id”:”kB5xO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”cZXFR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Increase Ease of Access for Employees”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”nsCxD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Implement a state-of-the-art access control system that allows fast access for authorized employees, even with heavy foot traffic. Depending on how many employees need to access your building, you can choose between traditional- or new, high-speed access technology.”},{“component”:”hc_space”,”id”:”PAdGH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”chDHk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”No Traditional Keys to Worry About”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”CAuIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Old-fashioned keys have a tendency to disappear. With Verified Security access control systems, you never have to change the locks. For example, when an employee is terminated, you can electronically block that person from entry.”},{“component”:”hc_space”,”id”:”zjA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”gIYbl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Saves Money on Security Personnel”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”tlyCr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”With access control, your property is monitored for unauthorized access 24\/7\/365, so you can cut down on costly security guard expenses.”},{“component”:”hc_space”,”id”:”PhZQz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”i6RpE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Credentials”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”rOMfN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security offers a wide array of credential options, from traditional to cutting-edge:”},{“component”:”hc_space”,”id”:”EnsDy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”kIysH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”HRZES”,”icon”:”fa fa-caret-right”,”text”:”Badges”},{“component”:”repeater_item”,”id”:”BaM04″,”icon”:”fa fa-caret-right”,”text”:”Key Cards”},{“component”:”repeater_item”,”id”:”eeX9q”,”icon”:”fa fa-caret-right”,”text”:”Keypads”},{“component”:”repeater_item”,”id”:”oFkyc”,”icon”:”fa fa-caret-right”,”text”:”Smartphones”},{“component”:”repeater_item”,”id”:”RsyGZ”,”icon”:”fa fa-caret-right”,”text”:”Biometric entry”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”c4dr8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”jczzX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”These credentials contain technology that communicates with the door’s access control panel which is connected to the door lock. For instance, a key card may contain a magnetic stripe that the card reader will recognize to disengage the electronic door lock. This eliminates the need for a ring of keys to be carried around the facility.”},{“component”:”hc_space”,”id”:”JXZt3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”eltom”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Access Control Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”hUPJK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security offers three types of access control systems: software-based, cloud-based, and standalone. All are effective, but each comes with different features and costs.”},{“component”:”hc_space”,”id”:”jogUx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”wed2L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Software-Based Access Control”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”CEAaJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Software-based access control systems utilize dedicated onsite servers to communicate with access control devices. These systems work with traditional access methods, such as keycards, key fobs, and badges. These systems do not offer as much versatility as the more sophisticated cloud-based systems. This is because servers must be installed and maintained and regular software updates require an onsite visit from the security company.”},{“component”:”hc_space”,”id”:”D9jif”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”BTMDW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cloud-Based Access Control”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”dXltL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Cloud-based systems run on servers hosted by the provider, saving you the cost and storage space of internal servers.  They also save time and money through automatic updates that can be installed remotely. These systems also offer the ability to grant and revoke access remotely, and allow for system management with devices such as smartphones. They are compatible with both traditional access methods and state-of-the-art methods, such as biometrics.”},{“component”:”hc_space”,”id”:”vR60A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”8TlTq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Standalone Access Control Systems”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”2LAVI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”For companies in need of a simple and economic system, a standalone, keypad access control system does the trick. These systems are built for both indoors and outdoors, have illuminated keypads, and are easy and inexpensive to install.”},{“component”:”hc_space”,”id”:”OJzBt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_36BXS”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”yLEi7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Locks”,”tag”:”h2″},{“component”:”hc_space”,”id”:”JHCHI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”GgfBL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security provides many types of door locks, including the following:”},{“component”:”hc_column”,”id”:”i8L0O”,”column_width”:”col-md-9″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”cLPKZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”xT2Xq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”dC8n6″,”icon”:”fa fa-lock”,”text”:”Electric mortise locks, which contain a solenoid that requires access credentials to enter but no credentials to exit.”},{“component”:”repeater_item”,”id”:”0rIgg”,”icon”:”fa fa-lock”,”text”:”Cylindrical locks that can be locked\/unlocked electronically .”},{“component”:”repeater_item”,”id”:”oZZXu”,”icon”:”fa fa-lock”,”text”:”Electric strike locks, which are used in conjunction with a card reader and can be connected to an integrated or standalone system.”},{“component”:”repeater_item”,”id”:”WJtpv”,”icon”:”fa fa-lock”,”text”:”Magnetic locks that use an electrical current to lock\/unlock the door and are fail safe (unlock in a power outage).”},{“component”:”repeater_item”,”id”:”WH4WN”,”icon”:”fa fa-lock”,”text”:”Shear locks, which are magnetic locks that are concealed in the door and frame.”},{“component”:”repeater_item”,”id”:”jdEgd”,”icon”:”fa fa-lock”,”text”:”Electric drop-bolt locks that are designed for glass and swing (two-way opening) doors.”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””}]},{“component”:”hc_space”,”id”:”zRe0A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”yJzgy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Verified Security Access Control Integrates With Existing Systems”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”8nsjI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Implementing a Verified Security door access control system does not automatically require you to replace existing equipment. In fact, most Verified Security access control systems, including software-based, cloud-based, and standalone, integrate with many different types of security systems. Speak with one of our security professionals to discuss how we can bolster your current security measures.”},{“component”:”hc_space”,”id”:”yz44i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”k3Rc5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Video Surveillance Integration”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”qG0Uy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A combination of access control and video surveillance is the ideal setup to ensure maximum defense for your business. By adding IP cameras to your roster of security measures, you can both monitor and control your facility. With these two systems integrated, you gain all the benefits of access control plus the many features of advanced video surveillance, including the following:”},{“component”:”hc_space”,”id”:”qHnFm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_column”,”id”:”column_55eN9″,”column_width”:”col-md-9″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_icon_list_simple”,”id”:”E6fqW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”Pyjx3″,”icon”:”fa fa-check”,”text”:”Video evidence of unwanted events”},{“component”:”repeater_item”,”id”:”P6Zpz”,”icon”:”fa fa-check”,”text”:”Record of employee or visitor misconduct”},{“component”:”repeater_item”,”id”:”LlRPk”,”icon”:”fa fa-check”,”text”:”Video monitoring for more immediate response to emergencies”},{“component”:”repeater_item”,”id”:”5xTNa”,”icon”:”fa fa-check”,”text”:”Motion detection alarms”},{“component”:”repeater_item”,”id”:”XCzMY”,”icon”:”fa fa-check”,”text”:”Video analytics for more proactive notifications”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”CaNVg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”3mfff”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Learn more about Verified Security’s video surveillance options <a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/video-surveillance%5C/%5C%22">here.&lt;\/a&gt;&lt;\/p&gt;“},{“component”:”hc_space”,”id”:”wEIY0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_title_tag”,”id”:”v7338″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Verified Security Access Control Systems Protect Your Investment”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”p5t53″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A business requires the investment of capital, time and effort. Protecting these investments should always be a priority. Verified Security access control systems defend your company against intrusion while providing ease of access for employees and protecting the company from liability. The resources of your business are too valuable to risk, so Verified Security provides the solutions that keep your investments safe. “},{“component”:”hc_space”,”id”:”5IujV”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}]},{“component”:”hc_column”,”id”:”column_D7cBW”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”2rxgK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Y6qhb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</a></p>
<p>We proudly serve the greater <a href="%5C%22https:%5C/%5C/en.wikipedia.org%5C/wiki%5C/Atlanta_metropolitan_area%5C%22">Atlanta&lt;\/a&gt; area and look forward to working with your company. To learn more about how we can protect your business with sophisticated video surveillance and access control systems, </a><a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/contact%5C/%5C%22">contact Verified Security today.&lt;\/a&gt;&lt;\/p&gt;“}]},{“component”:”hc_column”,”id”:”column_h5Qw0″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”00BLx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]},{“component”:”hc_column”,”id”:”column_6rQYJ”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_nSBmK”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”1FN0Y”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”P6j6N”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Frequently Asked Questions”,”tag”:”h3″},{“component”:”hc_space”,”id”:”FrzYJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_accordion”,”id”:”D0lCG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”What is an access control system?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”SikhT”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”An access control system is a method of securing doors and other entry points with added security precautions. It is essentially the advanced version of having keys to unlock doors. Instead of carrying a physical key for each door on the premises, a singular keycard, key fob, smartphone, or employee badge can act as the key to multiple entry points. By integrating card readers, keypads, or biometric scanners to your entry points, you can outfit your facility with a variety of security measures to protect your facility and those inside it.”}],”name_2″:”Why is access control important?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”YfQ0T”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”There are many instances where keys can go missing, and then that lost key becomes a safety hazard. If an unauthorized person found it, they could enter sections of your facility that they have no business being in. If a keycard was to go missing, the card could be deactivated, nullifying the safety hazard. This also makes acquiring keys from previous employees easier and makes giving new keys to new employees quicker as well. Large key rings are outdated and cumbersome, whereas a keycard is easy to carry and use. You can also implement an audit using system reports to check and see who has entered a specific entry point at a specific time, which can be a useful resource. “}],”name_3″:”What are the types of access control?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”CLRwN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security implements three types of access control solutions, Software-Based, Cloud-Based and Standalone systems. Software-Based options are dependent on dedicated onsite servers to manage the process of reading credentials and controlling door locks.Cloud-Based options are more sophisticated and do not require on-site servers. Instead, the system runs off of our cloud platform so that no server is needed which can make operations far more manageable. Finally, Standalone systems work independent of one another and usually control a single entry point.”}],”name_4″:”What are the components of access control?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”TaeVR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In every access control system there is an entry point that must be outfitted with an electric lock, a credential reader, a type of credential to give to your personnel, and a power source. When combined, this allows the user to present the correct credential and have the door lock disengage, granting entry. “}],”name_5″:”What does access control cost?”,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[{“component”:”hc_text_block”,”id”:”GXpBf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The price of implementing access control security measures can vary depending on the size and sophistication of the system. Larger systems with more advanced software and hardware will be more expensive than a single standalone unit. To learn more about your facility\u2019s needs, contact Verified Security to speak with one of our experts.”}],”name_6″:”Can an access control system integrate with existing security infrastructure?”,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[{“component”:”hc_text_block”,”id”:”JHdo4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Yes. Oftentimes when installing a new security system, pieces of the old system can be integrated in to maintain their usefulness. There are instances when outdated tech will not be able to carry over, but this depends on both your new and existing equipment. Our professionals will be able to give you a more direct answer once we\u2019ve seen your facility.”}],”name_7″:”Why use an access control system instead of keys?”,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[{“component”:”hc_text_block”,”id”:”UtHgz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In short, keys are outdated. They are cumbersome and difficult to manage. Replacing a ring of keys with a key card or the smartphone that you already carry with you saves on time and money while also being more efficient. Also, an access control system allows you to generate reports of door entry activity which helps you better manage the security of your facilities.”}],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:””,”time”:””,”open”:””}]}],”section_settings”:””},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_rkBm4″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_BPOQB”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css\/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</a></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Door Access Control System”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Door Access Control System | As a business owner, you have invested vast amounts of time and capital into your workplace, including equipment, computers, vehicles, furniture, business records, and much more. You\u2019ve also built a team of employees and professionals who serve your customers from inside the facility you\u2019ve worked tirelessly to create. These people and resources are far too important to jeopardize and protecting them is a high priority task that should be handled with care. \n\nAccess control systems are essentially smart locks that require predetermined credentials to access different locations in your facility. You can lock down important areas that are not meant for visitors to keep your operations running smoothly while also keeping your staff and customers safe. These precautions protect your enterprise from unwanted events that can endanger your business’s reputation and cost you financially. Ensure that your company is protected from accidents, burglary, theft, vandalism, and trespassing with access control. \n\nAccess control systems also save time and business expenses due to the following:”},{“component”:”hc_column”,”id”:”column_UKqqs”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”KI4Yt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”9Z26f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”6kjvA”,”icon”:”fa fa-check”,”text”:”Liability protection”},{“component”:”repeater_item”,”id”:”l9oD7″,”icon”:”fa fa-check”,”text”:”Ease of employee access”},{“component”:”repeater_item”,”id”:”HfZqv”,”icon”:”fa fa-check”,”text”:”No traditional keys to worry about”},{“component”:”repeater_item”,”id”:”mCYTL”,”icon”:”fa fa-check”,”text”:”Reduced cost of security personnel”},{“component”:”repeater_item”,”id”:”fCC0o”,”icon”:”fa fa-check”,”text”:”Eligibility for insurance discounts”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”W6DWO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Zpkxr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security\u2019s access control systems also integrate with other security measures, including intrusion security solutions. As one of a limited number of Honeywell Authorized Security Providers, Verified Security offers many access control options for your business.\n”}]},{“component”:”hc_column”,”id”:”column_B1kzq”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”D4ECJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_image”,”id”:”jex4F”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/02\/mobile-access-control.jpg|333|500|999956058″,”alt”:”door access control system”,”thumb_size”:”large”},{“component”:”hc_space”,”id”:”6Twux”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}]},{“component”:”hc_space”,”id”:”NIBlm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”JZyD2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Door Access Control System | The Benefits”,”tag”:”h2″},{“component”:”hc_space”,”id”:”FY8cL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”7s0SL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Keeps Troublesome Individuals Out of Your Workplace”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”00gdE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Limit who can enter your facilities with an access control system. With video monitoring integration, Verified Security\u2019s 24-hour remote surveillance team is alerted and can summon emergency services.”},{“component”:”hc_space”,”id”:”27aUl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”BM4F0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Safety and Liability Protection”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”INGt8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Many businesses use machinery or dangerous chemicals in their production processes. Often, these present a danger to those who are unqualified to be around such hazardous materials. Verified Security\u2019s access control systems allow you to create restrictive zones, so only authorized people can enter hazardous areas. “},{“component”:”hc_space”,”id”:”kB5xO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”cZXFR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Increase Ease of Access for Employees”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”nsCxD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Implement a state-of-the-art access control system that allows fast access for authorized employees, even with heavy foot traffic. Depending on how many employees need to access your building, you can choose between traditional- or new, high-speed access technology.”},{“component”:”hc_space”,”id”:”PAdGH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”chDHk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”No Traditional Keys to Worry About”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”CAuIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Old-fashioned keys have a tendency to disappear. With Verified Security access control systems, you never have to change the locks. For example, when an employee is terminated, you can electronically block that person from entry.”},{“component”:”hc_space”,”id”:”zjA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”gIYbl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Saves Money on Security Personnel”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”tlyCr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”With access control, your property is monitored for unauthorized access 24\/7\/365, so you can cut down on costly security guard expenses.”},{“component”:”hc_space”,”id”:”PhZQz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”i6RpE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Credentials”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”rOMfN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security offers a wide array of credential options, from traditional to cutting-edge:”},{“component”:”hc_space”,”id”:”EnsDy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”kIysH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”HRZES”,”icon”:”fa fa-caret-right”,”text”:”Badges”},{“component”:”repeater_item”,”id”:”BaM04″,”icon”:”fa fa-caret-right”,”text”:”Key Cards”},{“component”:”repeater_item”,”id”:”eeX9q”,”icon”:”fa fa-caret-right”,”text”:”Keypads”},{“component”:”repeater_item”,”id”:”oFkyc”,”icon”:”fa fa-caret-right”,”text”:”Smartphones”},{“component”:”repeater_item”,”id”:”RsyGZ”,”icon”:”fa fa-caret-right”,”text”:”Biometric entry”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”c4dr8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”jczzX”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”These credentials contain technology that communicates with the door’s access control panel which is connected to the door lock. For instance, a key card may contain a magnetic stripe that the card reader will recognize to disengage the electronic door lock. This eliminates the need for a ring of keys to be carried around the facility.”},{“component”:”hc_space”,”id”:”JXZt3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”eltom”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Access Control Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”hUPJK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security offers three types of access control systems: software-based, cloud-based, and standalone. All are effective, but each comes with different features and costs.”},{“component”:”hc_space”,”id”:”jogUx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”wed2L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Software-Based Access Control”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”CEAaJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Software-based access control systems utilize dedicated onsite servers to communicate with access control devices. These systems work with traditional access methods, such as keycards, key fobs, and badges. These systems do not offer as much versatility as the more sophisticated cloud-based systems. This is because servers must be installed and maintained and regular software updates require an onsite visit from the security company.”},{“component”:”hc_space”,”id”:”D9jif”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”BTMDW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cloud-Based Access Control”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”dXltL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Cloud-based systems run on servers hosted by the provider, saving you the cost and storage space of internal servers. They also save time and money through automatic updates that can be installed remotely. These systems also offer the ability to grant and revoke access remotely, and allow for system management with devices such as smartphones. They are compatible with both traditional access methods and state-of-the-art methods, such as biometrics.”},{“component”:”hc_space”,”id”:”vR60A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”8TlTq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Standalone Access Control Systems”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”2LAVI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”For companies in need of a simple and economic system, a standalone, keypad access control system does the trick. These systems are built for both indoors and outdoors, have illuminated keypads, and are easy and inexpensive to install.”},{“component”:”hc_space”,”id”:”OJzBt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_36BXS”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”yLEi7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Types of Locks”,”tag”:”h2″},{“component”:”hc_space”,”id”:”JHCHI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”GgfBL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security provides many types of door locks, including the following:”},{“component”:”hc_column”,”id”:”i8L0O”,”column_width”:”col-md-9″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”cLPKZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”xT2Xq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”dC8n6″,”icon”:”fa fa-lock”,”text”:”Electric mortise locks, which contain a solenoid that requires access credentials to enter but no credentials to exit.”},{“component”:”repeater_item”,”id”:”0rIgg”,”icon”:”fa fa-lock”,”text”:”Cylindrical locks that can be locked\/unlocked electronically .”},{“component”:”repeater_item”,”id”:”oZZXu”,”icon”:”fa fa-lock”,”text”:”Electric strike locks, which are used in conjunction with a card reader and can be connected to an integrated or standalone system.”},{“component”:”repeater_item”,”id”:”WJtpv”,”icon”:”fa fa-lock”,”text”:”Magnetic locks that use an electrical current to lock\/unlock the door and are fail safe (unlock in a power outage).”},{“component”:”repeater_item”,”id”:”WH4WN”,”icon”:”fa fa-lock”,”text”:”Shear locks, which are magnetic locks that are concealed in the door and frame.”},{“component”:”repeater_item”,”id”:”jdEgd”,”icon”:”fa fa-lock”,”text”:”Electric drop-bolt locks that are designed for glass and swing (two-way opening) doors.”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””}]},{“component”:”hc_space”,”id”:”zRe0A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”yJzgy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Verified Security Access Control Integrates With Existing Systems”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”8nsjI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Implementing a Verified Security door access control system does not automatically require you to replace existing equipment. In fact, most Verified Security access control systems, including software-based, cloud-based, and standalone, integrate with many different types of security systems. Speak with one of our security professionals to discuss how we can bolster your current security measures.”},{“component”:”hc_space”,”id”:”yz44i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_title_tag”,”id”:”k3Rc5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Video Surveillance Integration”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”qG0Uy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A combination of access control and video surveillance is the ideal setup to ensure maximum defense for your business. By adding IP cameras to your roster of security measures, you can both monitor and control your facility. With these two systems integrated, you gain all the benefits of access control plus the many features of advanced video surveillance, including the following:”},{“component”:”hc_space”,”id”:”qHnFm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_column”,”id”:”column_55eN9″,”column_width”:”col-md-9″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_icon_list_simple”,”id”:”E6fqW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”Pyjx3″,”icon”:”fa fa-check”,”text”:”Video evidence of unwanted events”},{“component”:”repeater_item”,”id”:”P6Zpz”,”icon”:”fa fa-check”,”text”:”Record of employee or visitor misconduct”},{“component”:”repeater_item”,”id”:”LlRPk”,”icon”:”fa fa-check”,”text”:”Video monitoring for more immediate response to emergencies”},{“component”:”repeater_item”,”id”:”5xTNa”,”icon”:”fa fa-check”,”text”:”Motion detection alarms”},{“component”:”repeater_item”,”id”:”XCzMY”,”icon”:”fa fa-check”,”text”:”Video analytics for more proactive notifications”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”CaNVg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”3mfff”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Learn more about Verified Security’s video surveillance options here.“},{“component”:”hc_space”,”id”:”wEIY0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_title_tag”,”id”:”v7338″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Verified Security Access Control Systems Protect Your Investment”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”p5t53″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A business requires the investment of capital, time and effort. Protecting these investments should always be a priority. Verified Security access control systems defend your company against intrusion while providing ease of access for employees and protecting the company from liability. The resources of your business are too valuable to risk, so Verified Security provides the solutions that keep your investments safe. “},{“component”:”hc_space”,”id”:”5IujV”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}]},{“component”:”hc_column”,”id”:”column_D7cBW”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”2rxgK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Y6qhb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” We proudly serve the greater Atlanta area and look forward to working with your company. To learn more about how we can protect your business with sophisticated video surveillance and access control systems, contact Verified Security today.“}]},{“component”:”hc_column”,”id”:”column_h5Qw0″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”00BLx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]},{“component”:”hc_column”,”id”:”column_6rQYJ”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_nSBmK”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”1FN0Y”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”P6j6N”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Frequently Asked Questions”,”tag”:”h3″},{“component”:”hc_space”,”id”:”FrzYJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_accordion”,”id”:”D0lCG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”What is an access control system?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”SikhT”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”An access control system is a method of securing doors and other entry points with added security precautions. It is essentially the advanced version of having keys to unlock doors. Instead of carrying a physical key for each door on the premises, a singular keycard, key fob, smartphone, or employee badge can act as the key to multiple entry points. By integrating card readers, keypads, or biometric scanners to your entry points, you can outfit your facility with a variety of security measures to protect your facility and those inside it.”}],”name_2″:”Why is access control important?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”YfQ0T”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”There are many instances where keys can go missing, and then that lost key becomes a safety hazard. If an unauthorized person found it, they could enter sections of your facility that they have no business being in. If a keycard was to go missing, the card could be deactivated, nullifying the safety hazard. This also makes acquiring keys from previous employees easier and makes giving new keys to new employees quicker as well. Large key rings are outdated and cumbersome, whereas a keycard is easy to carry and use. You can also implement an audit using system reports to check and see who has entered a specific entry point at a specific time, which can be a useful resource. “}],”name_3″:”What are the types of access control?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”CLRwN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security implements three types of access control solutions, Software-Based, Cloud-Based and Standalone systems. Software-Based options are dependent on dedicated onsite servers to manage the process of reading credentials and controlling door locks.Cloud-Based options are more sophisticated and do not require on-site servers. Instead, the system runs off of our cloud platform so that no server is needed which can make operations far more manageable. Finally, Standalone systems work independent of one another and usually control a single entry point.”}],”name_4″:”What are the components of access control?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”TaeVR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In every access control system there is an entry point that must be outfitted with an electric lock, a credential reader, a type of credential to give to your personnel, and a power source. When combined, this allows the user to present the correct credential and have the door lock disengage, granting entry. “}],”name_5″:”What does access control cost?”,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[{“component”:”hc_text_block”,”id”:”GXpBf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The price of implementing access control security measures can vary depending on the size and sophistication of the system. Larger systems with more advanced software and hardware will be more expensive than a single standalone unit. To learn more about your facility\u2019s needs, contact Verified Security to speak with one of our experts.”}],”name_6″:”Can an access control system integrate with existing security infrastructure?”,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[{“component”:”hc_text_block”,”id”:”JHdo4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Yes. Oftentimes when installing a new security system, pieces of the old system can be integrated in to maintain their usefulness. There are instances when outdated tech will not be able to carry over, but this depends on both your new and existing equipment. Our professionals will be able to give you a more direct answer once we\u2019ve seen your facility.”}],”name_7″:”Why use an access control system instead of keys?”,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[{“component”:”hc_text_block”,”id”:”UtHgz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In short, keys are outdated. They are cumbersome and difficult to manage. Replacing a ring of keys with a key card or the smartphone that you already carry with you saves on time and money while also being more efficient. Also, an access control system allows you to generate reports of door entry activity which helps you better manage the security of your facilities.”}],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:””,”time”:””,”open”:””}]}],”section_settings”:””},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_rkBm4″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_BPOQB”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css\/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-07-12T18:26:51-04:00</modified>
	</item>
	<item>
		<id>999956420</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/commercial-video-surveillance/</url>
		<title>Video Surveillance</title>
		<h1>Video Surveillance</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Monitor your facility from anywhere at any time with our convenient and flexible cloud-based systems.”,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Video Surveillance”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Commercial Video Surveillance | Verified Security protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe. \n \nVerified Security offers state-of-the-art […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Monitor your facility from anywhere at any time with our convenient and flexible cloud-based systems.”,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Video Surveillance”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Commercial Video Surveillance | Verified Security protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe.  \n \nVerified Security offers state-of-the-art video surveillance systems customizable to match the needs of your business, whether you are responsible for securing a small store or a giant office park. We source from all the top manufacturers, allowing us to offer a large selection of indoor cameras, outdoor cameras, video recording, video management software, storage devices, motion sensors, and most other video security equipment. \n\nWhatever your surveillance needs, Verified Security has the solution. Our security consultants know how to design and install the most effective video surveillance systems for our clients.\n”},{“component”:”hc_space”,”id”:”NIBlm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”JZyD2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”The Three Types of Video Surveillance Cameras”,”tag”:”h2″},{“component”:”hc_space”,”id”:”FY8cL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_column”,”id”:”column_yXFfK”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”E9acI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Commercial video surveillance cameras come with a wide variety of resolution levels and advanced features.\n\nThe three types are as follows:”},{“component”:”hc_space”,”id”:”38TS3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”9Z26f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”6kjvA”,”icon”:”fa fa-chevron-right”,”text”:”IP (Network)”},{“component”:”repeater_item”,”id”:”l9oD7″,”icon”:”fa fa-chevron-right”,”text”:”IP – Cloud-Based”},{“component”:”repeater_item”,”id”:”HfZqv”,”icon”:”fa fa-chevron-right”,”text”:”Analog”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””}]},{“component”:”hc_column”,”id”:”column_d9ID5″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”JH4D9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/06\/H4W2PER2_H4W4PER2_pr-jpg1.png|400|400|999956207″,”alt”:”Atlanta video surveillance company”,”thumb_size”:”large”}]},{“component”:”hc_space”,”id”:”bQknd”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”7s0SL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”IP “,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”00gdE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Also known as Network Cameras, IP camera systems offer state-of-the-art video surveillance technology. They provide high-resolution images and the most sophisticated security management tools. These cameras tend to cost a bit more versus the less advanced analog systems, but if you have valuable property and people to protect, IP camera systems do the best job.\nCapabilities include:”},{“component”:”hc_space”,”id”:”27aUl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_column”,”id”:”column_bvj1t”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_icon_list_simple”,”id”:”ESmEd”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”WItgB”,”icon”:”fa fa-check”,”text”:”Night vision “},{“component”:”repeater_item”,”id”:”PGJIZ”,”icon”:”fa fa-check”,”text”:”Remote monitoring”},{“component”:”repeater_item”,”id”:”riuKV”,”icon”:”fa fa-check”,”text”:”Data analytics”},{“component”:”repeater_item”,”id”:”XJY5q”,”icon”:”fa fa-check”,”text”:”Motion detection”},{“component”:”repeater_item”,”id”:”cMU9v”,”icon”:”fa fa-check”,”text”:”Facial recognition “},{“component”:”repeater_item”,”id”:”nbpbC”,”icon”:”fa fa-check”,”text”:”Person counting”},{“component”:”repeater_item”,”id”:”ZG8nY”,”icon”:”fa fa-check”,”text”:”Dwell time surveillance”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””}]},{“component”:”hc_space”,”id”:”seifm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”INGt8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In addition to these sophisticated tools, IP security cameras integrate smoothly with most of the latest surveillance technology. They also record onto a Network Video Recorder (NVR) system. These systems function like a Digital Video Recorder (DVR) but produce far clearer images. As with most newer technology, IP surveillance cameras are dropping in price as their market grows.”},{“component”:”hc_space”,”id”:”kB5xO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”cZXFR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”IP – Cloud-Based”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”nsCxD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The latest IP camera system technology is now available on the cloud. Many IT departments are adopting the cloud-based IP model because running video surveillance on the cloud saves on both cost and space. Cloud-based video systems make it convenient to access IP camera footage remotely via a computer or smartphone. The technology is also highly secure and often comes with the option of receiving push notifications on mobile devices when an alarm event occurs.\n\nMany businesses also lean towards the IP cloud setup because it is far easier to maintain. Software and firmware updates are digitally sent to the relevant devices rather than the manual installation process required for on-site server systems. The cloud-based solutions also eliminate the risk of hardware failures, which could leave the premises unmonitored. “},{“component”:”hc_space”,”id”:”PAdGH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”chDHk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Analog”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”CAuIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Analog surveillance cameras provide live viewing and store the images via recording systems, such as a Digital Video Recorder, or DVR. Analog camera systems must be connected to the recording system by a coaxial cable. These surveillance systems are also known as closed-circuit television systems or CCTV. Video quality depends on the type of analog system and ranges from standard definition to high definition PTZ (Pan, Tilt, Zoom) style cameras.”},{“component”:”hc_space”,”id”:”zjA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”gIYbl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Upgrading from Analog to IP Surveillance Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”tlyCr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Many of our clients see the value in upgrading from an analog system to IP and IP cloud solutions. These upgrades allow clients to utilize higher-resolution cameras and the advanced features of IP surveillance systems. Verified Security performs upgrades that allow our clients to enhance the security of their businesses.”},{“component”:”hc_space”,”id”:”PhZQz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”i6RpE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”New Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”rOMfN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Sometimes, a whole new commercial video surveillance system is needed. Verified Security\u2019s consultants analyze your business\u2019s needs and recommend the technology best suited to enhance your facility\u2019s security within your budget. Whether you need a single outdoor camera or a fully functional video surveillance system with motion sensors, storage devices, and multiple cameras, Verified Security can help you find the video surveillance solution for your business.”},{“component”:”hc_space”,”id”:”EnsDy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”eltom”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Access Control Integration”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”hUPJK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Access control systems are used to restrict access and deter trespassers. In addition, they can create a record of who accesses the facility and provide reports on that activity.\n\nVerified Security\u2019s surveillance experts can integrate your video surveillance system with an access control system to provide your business with a robust defense system that deters intruders, memorializes events, and allows you to monitor your security from anywhere at any time.\n\nVerified Security offers a wide variety of commercial security options.  Video surveillance is the most fundamental as it protects against theft, trespassing, and other emergencies. Our surveillance and access control experts help their clients design security solutions that fit the size and needs of their businesses.\n\nLearn more about Verified Security’s access control options <a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/access-control-systems%5C/%5C%22">here.&lt;\/a&gt;&lt;\/p&gt;.”},{“component”:”hc_space”,”id”:”D9jif”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”BTMDW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Atlanta Video Surveillance Company”,”tag”:”h3″}]},{“component”:”hc_column”,”id”:”column_D7cBW”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”2rxgK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Y6qhb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</a></p>
<p>We proudly serve the greater <a href="%5C%22https:%5C/%5C/en.wikipedia.org%5C/wiki%5C/Atlanta_metropolitan_area%5C%22">Atlanta&lt;\/a&gt; area and look forward to working with your company. To learn more about how we can protect your business with sophisticated video surveillance and access control systems, </a><a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/contact%5C/%5C%22">contact Verified Security today.&lt;\/a&gt;&lt;\/p&gt;“}]},{“component”:”hc_column”,”id”:”column_h5Qw0″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”00BLx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]},{“component”:”hc_column”,”id”:”column_nSBmK”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”DQD1E”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”yS2Pb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Frequently Asked Questions”,”tag”:”h3″},{“component”:”hc_space”,”id”:”ufSH0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_accordion”,”id”:”WrwJ4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do you monitor video surveillance?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”AvcFi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The methods for monitoring your video surveillance system varies depending on the type of system you use. Modern cloud-based surveillance systems allow for users to access the video feed remotely via an app or browser window on a smartphone or computer. These devices must be granted access to do so for security purposes and provide excellent viewing options. More dated systems such as CCTV must be viewed at a designated monitor connected to the closed loop of cameras, usually stationed on premises. \n”}],”name_2″:”What are some of the advantages of commercial video surveillance systems?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”o6Tob”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”There are many benefits to a commercial video surveillance system. For one, the ability to check in on your facilities remotely allows for increased operational efficiency and security. In addition to live viewing, storing recorded footage of an incident is also an excellent resource. By integrating video surveillance with other security measures such as an access control system and an intrusion alarm system, you can ensure the protection of your facility to the highest degree.\n”}],”name_3″:”What is a commercial security system?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”PM0Q3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A commercial security system refers to the use of one or all of the methods of protecting your commercial facility. Video surveillance allows you to monitor and record events on premises, access control helps to prevent unwanted entries into the entire facility or specific locations, and intrusion alarms will alert you of trespassers. By using all of these systems in tandem, you can maintain the greatest level of control over the safety and security of your business. \n”}],”name_4″:”Do business security cameras require contracts?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”kfXSg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Most of the time, business security cameras do not require long-term contracts to purchase. They are usually installed by a professional and there can be recurring fees to maintain the hardware and software of the security camera system depending on the types of services required. \n”}],”name_5″:”What kind of security cameras work best for business?”,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[{“component”:”hc_text_block”,”id”:”LSpcF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Each business will have its own specific security needs and there is no one-size-fits-all approach to video surveillance. However, we recommend staying ahead of the curve with modern security camera options. Cloud-based IP cameras offer some of the best options for viewing and recording while offering the clearest images on the market. These cameras also give you the option to utilize video analytics, which can be a fantastic addition to your video security system. Video analytics allow for much more proactive use of your camera system.\n”}],”name_6″:”How much does a commercial security system cost?”,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[{“component”:”hc_text_block”,”id”:”tVJjI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The price of commercial security systems varies on the size of the facility, the sophistication of the equipment, and the amount of devices. Some systems only require two cameras for a single room. Others may require interior cameras, exterior cameras, electric door locks, card readers, video analytics, and intrusion detection systems. Contact us today for a consultation to find out which system would be best for your business. We work with budgets of all sizes and can find the right solution for you.\n”}],”name_7″:””,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:”accordion”,”time”:””,”open”:””}]}],”section_settings”:””},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_rkBm4″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_BPOQB”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css\/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</a></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Monitor your facility from anywhere at any time with our convenient and flexible cloud-based systems.”,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_ZReQs”:{“component”:”hc_section”,”id”:”section_ZReQs”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_f9am5″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0xNzl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Video Surveillance”,”tag”:”h1″},{“component”:”hc_space”,”id”:”vP9NF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_text_block”,”id”:”Oy6D3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Commercial Video Surveillance | Verified Security protects your business from theft and property damage while monitoring the premises for emergencies. For these reasons, video surveillance systems are vital in keeping employees and customers safe. \n \nVerified Security offers state-of-the-art video surveillance systems customizable to match the needs of your business, whether you are responsible for securing a small store or a giant office park. We source from all the top manufacturers, allowing us to offer a large selection of indoor cameras, outdoor cameras, video recording, video management software, storage devices, motion sensors, and most other video security equipment. \n\nWhatever your surveillance needs, Verified Security has the solution. Our security consultants know how to design and install the most effective video surveillance systems for our clients.\n”},{“component”:”hc_space”,”id”:”NIBlm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”JZyD2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”The Three Types of Video Surveillance Cameras”,”tag”:”h2″},{“component”:”hc_space”,”id”:”FY8cL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_column”,”id”:”column_yXFfK”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”E9acI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Commercial video surveillance cameras come with a wide variety of resolution levels and advanced features.\n\nThe three types are as follows:”},{“component”:”hc_space”,”id”:”38TS3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”9Z26f”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”6kjvA”,”icon”:”fa fa-chevron-right”,”text”:”IP (Network)”},{“component”:”repeater_item”,”id”:”l9oD7″,”icon”:”fa fa-chevron-right”,”text”:”IP – Cloud-Based”},{“component”:”repeater_item”,”id”:”HfZqv”,”icon”:”fa fa-chevron-right”,”text”:”Analog”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””}]},{“component”:”hc_column”,”id”:”column_d9ID5″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”JH4D9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/06\/H4W2PER2_H4W4PER2_pr-jpg1.png|400|400|999956207″,”alt”:”Atlanta video surveillance company”,”thumb_size”:”large”}]},{“component”:”hc_space”,”id”:”bQknd”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”7s0SL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”IP “,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”00gdE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Also known as Network Cameras, IP camera systems offer state-of-the-art video surveillance technology. They provide high-resolution images and the most sophisticated security management tools. These cameras tend to cost a bit more versus the less advanced analog systems, but if you have valuable property and people to protect, IP camera systems do the best job.\nCapabilities include:”},{“component”:”hc_space”,”id”:”27aUl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_column”,”id”:”column_bvj1t”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_icon_list_simple”,”id”:”ESmEd”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”WItgB”,”icon”:”fa fa-check”,”text”:”Night vision “},{“component”:”repeater_item”,”id”:”PGJIZ”,”icon”:”fa fa-check”,”text”:”Remote monitoring”},{“component”:”repeater_item”,”id”:”riuKV”,”icon”:”fa fa-check”,”text”:”Data analytics”},{“component”:”repeater_item”,”id”:”XJY5q”,”icon”:”fa fa-check”,”text”:”Motion detection”},{“component”:”repeater_item”,”id”:”cMU9v”,”icon”:”fa fa-check”,”text”:”Facial recognition “},{“component”:”repeater_item”,”id”:”nbpbC”,”icon”:”fa fa-check”,”text”:”Person counting”},{“component”:”repeater_item”,”id”:”ZG8nY”,”icon”:”fa fa-check”,”text”:”Dwell time surveillance”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””}]},{“component”:”hc_space”,”id”:”seifm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”INGt8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”In addition to these sophisticated tools, IP security cameras integrate smoothly with most of the latest surveillance technology. They also record onto a Network Video Recorder (NVR) system. These systems function like a Digital Video Recorder (DVR) but produce far clearer images. As with most newer technology, IP surveillance cameras are dropping in price as their market grows.”},{“component”:”hc_space”,”id”:”kB5xO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”cZXFR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”IP – Cloud-Based”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”nsCxD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The latest IP camera system technology is now available on the cloud. Many IT departments are adopting the cloud-based IP model because running video surveillance on the cloud saves on both cost and space. Cloud-based video systems make it convenient to access IP camera footage remotely via a computer or smartphone. The technology is also highly secure and often comes with the option of receiving push notifications on mobile devices when an alarm event occurs.\n\nMany businesses also lean towards the IP cloud setup because it is far easier to maintain. Software and firmware updates are digitally sent to the relevant devices rather than the manual installation process required for on-site server systems. The cloud-based solutions also eliminate the risk of hardware failures, which could leave the premises unmonitored. “},{“component”:”hc_space”,”id”:”PAdGH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”chDHk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Analog”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”CAuIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Analog surveillance cameras provide live viewing and store the images via recording systems, such as a Digital Video Recorder, or DVR. Analog camera systems must be connected to the recording system by a coaxial cable. These surveillance systems are also known as closed-circuit television systems or CCTV. Video quality depends on the type of analog system and ranges from standard definition to high definition PTZ (Pan, Tilt, Zoom) style cameras.”},{“component”:”hc_space”,”id”:”zjA1L”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”gIYbl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Upgrading from Analog to IP Surveillance Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”tlyCr”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Many of our clients see the value in upgrading from an analog system to IP and IP cloud solutions. These upgrades allow clients to utilize higher-resolution cameras and the advanced features of IP surveillance systems. Verified Security performs upgrades that allow our clients to enhance the security of their businesses.”},{“component”:”hc_space”,”id”:”PhZQz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”i6RpE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”New Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”rOMfN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Sometimes, a whole new commercial video surveillance system is needed. Verified Security\u2019s consultants analyze your business\u2019s needs and recommend the technology best suited to enhance your facility\u2019s security within your budget. Whether you need a single outdoor camera or a fully functional video surveillance system with motion sensors, storage devices, and multiple cameras, Verified Security can help you find the video surveillance solution for your business.”},{“component”:”hc_space”,”id”:”EnsDy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”eltom”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Access Control Integration”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”hUPJK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Access control systems are used to restrict access and deter trespassers. In addition, they can create a record of who accesses the facility and provide reports on that activity.\n\nVerified Security\u2019s surveillance experts can integrate your video surveillance system with an access control system to provide your business with a robust defense system that deters intruders, memorializes events, and allows you to monitor your security from anywhere at any time.\n\nVerified Security offers a wide variety of commercial security options. Video surveillance is the most fundamental as it protects against theft, trespassing, and other emergencies. Our surveillance and access control experts help their clients design security solutions that fit the size and needs of their businesses.\n\nLearn more about Verified Security’s access control options here..”},{“component”:”hc_space”,”id”:”D9jif”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”BTMDW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Atlanta Video Surveillance Company”,”tag”:”h3″}]},{“component”:”hc_column”,”id”:”column_D7cBW”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”2rxgK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”Y6qhb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” We proudly serve the greater Atlanta area and look forward to working with your company. To learn more about how we can protect your business with sophisticated video surveillance and access control systems, contact Verified Security today.“}]},{“component”:”hc_column”,”id”:”column_h5Qw0″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”00BLx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]},{“component”:”hc_column”,”id”:”column_nSBmK”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”DQD1E”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_title_tag”,”id”:”yS2Pb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Frequently Asked Questions”,”tag”:”h3″},{“component”:”hc_space”,”id”:”ufSH0″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_accordion”,”id”:”WrwJ4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do you monitor video surveillance?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”AvcFi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The methods for monitoring your video surveillance system varies depending on the type of system you use. Modern cloud-based surveillance systems allow for users to access the video feed remotely via an app or browser window on a smartphone or computer. These devices must be granted access to do so for security purposes and provide excellent viewing options. More dated systems such as CCTV must be viewed at a designated monitor connected to the closed loop of cameras, usually stationed on premises. \n”}],”name_2″:”What are some of the advantages of commercial video surveillance systems?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”o6Tob”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”There are many benefits to a commercial video surveillance system. For one, the ability to check in on your facilities remotely allows for increased operational efficiency and security. In addition to live viewing, storing recorded footage of an incident is also an excellent resource. By integrating video surveillance with other security measures such as an access control system and an intrusion alarm system, you can ensure the protection of your facility to the highest degree.\n”}],”name_3″:”What is a commercial security system?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”PM0Q3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”A commercial security system refers to the use of one or all of the methods of protecting your commercial facility. Video surveillance allows you to monitor and record events on premises, access control helps to prevent unwanted entries into the entire facility or specific locations, and intrusion alarms will alert you of trespassers. By using all of these systems in tandem, you can maintain the greatest level of control over the safety and security of your business. \n”}],”name_4″:”Do business security cameras require contracts?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”kfXSg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Most of the time, business security cameras do not require long-term contracts to purchase. They are usually installed by a professional and there can be recurring fees to maintain the hardware and software of the security camera system depending on the types of services required. \n”}],”name_5″:”What kind of security cameras work best for business?”,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[{“component”:”hc_text_block”,”id”:”LSpcF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Each business will have its own specific security needs and there is no one-size-fits-all approach to video surveillance. However, we recommend staying ahead of the curve with modern security camera options. Cloud-based IP cameras offer some of the best options for viewing and recording while offering the clearest images on the market. These cameras also give you the option to utilize video analytics, which can be a fantastic addition to your video security system. Video analytics allow for much more proactive use of your camera system.\n”}],”name_6″:”How much does a commercial security system cost?”,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[{“component”:”hc_text_block”,”id”:”tVJjI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”The price of commercial security systems varies on the size of the facility, the sophistication of the equipment, and the amount of devices. Some systems only require two cameras for a single room. Others may require interior cameras, exterior cameras, electric door locks, card readers, video analytics, and intrusion detection systems. Contact us today for a consultation to find out which system would be best for your business. We work with budgets of all sizes and can find the right solution for you.\n”}],”name_7″:””,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:”accordion”,”time”:””,”open”:””}]}],”section_settings”:””},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_rkBm4″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_BPOQB”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css\/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-07-13T19:30:35-04:00</modified>
	</item>
	<item>
		<id>999956392</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/working-smarter-with-maxpro-cloud/</url>
		<title>Working Smarter with Maxpro Cloud</title>
		<h1>Working Smarter with Maxpro Cloud</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:”30″,”ken_burn”:””,”overlay”:”tile”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.\n\nMaxpro Cloud is a smart, flexible, integrated security platform that allows you to manage your security from anywhere at any time using a […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:”30″,”ken_burn”:””,”overlay”:”tile”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.\n\nMaxpro Cloud is a smart, flexible, integrated security platform that allows you to manage your security from anywhere at any time using a web interface or mobile app.\n\nThis cloud-based platform integrates card access control, video, and intrusion detection to give you an easy way to get a full view of the security of your facilities from a single user interface.\n\nReporting tools and multiple notification options keep you up to date on the status of your building security.\n\nAll of these are tools designed to help business owners and manager save time and money.\n\nThis is a link to a video from Honeywell if you want to learn more:\n\n<a href="https:%5C/%5C/www.youtube.com%5C/watch?v=S9irtpwf1ok">Honeywell MAXPRO Cloud: Working Smarter – YouTube&lt;\/a&gt;“}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”excerpt”:”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.”,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</a></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:”30″,”ken_burn”:””,”overlay”:”tile”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.\n\nMaxpro Cloud is a smart, flexible, integrated security platform that allows you to manage your security from anywhere at any time using a web interface or mobile app.\n\nThis cloud-based platform integrates card access control, video, and intrusion detection to give you an easy way to get a full view of the security of your facilities from a single user interface.\n\nReporting tools and multiple notification options keep you up to date on the status of your building security.\n\nAll of these are tools designed to help business owners and manager save time and money.\n\nThis is a link to a video from Honeywell if you want to learn more:\n\nHoneywell MAXPRO Cloud: Working Smarter – YouTube“}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”excerpt”:”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.”,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2019/07/iphone-and-screen.png</image>
		<modified>2021-09-07T10:19:36-04:00</modified>
	</item>
	<item>
		<id>999956386</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/ivideo/</url>
		<title>Intelligent Video</title>
		<h1>Intelligent Video</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Better Protect Your Facilities with Intelligent Video”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”With our high-definition, intelligent camera systems, you can keep an eye on what is happening in your facilities in real-time. With our advanced analytics, you can be notified when certain conditions are met. This gives you proactive video management tools instead of finding out about an event […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Better Protect Your Facilities with Intelligent Video”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”With our high-definition, intelligent camera systems, you can keep an eye on what is happening in your facilities in real-time. With our advanced analytics, you can be notified when certain conditions are met. This gives you proactive video management tools instead of finding out about an event after it is over.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Easy access to view live and recorded video from our high-definition camera systems over the web or with our mobile app.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”High-definition video for crystal-clear images”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Advanced analytics for intelligent video management”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Remote access to view video from anywhere at any time”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Scalable systems to grow with you over time”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our camera systems give you a simple, flexible way to control, manage, track and document events in your facilities. Call us at 678-924-7480 or fill out the form on this page to request more information or to request a free quote.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Better Protect Your Facilities with Intelligent Video”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”With our high-definition, intelligent camera systems, you can keep an eye on what is happening in your facilities in real-time. With our advanced analytics, you can be notified when certain conditions are met. This gives you proactive video management tools instead of finding out about an event after it is over.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Easy access to view live and recorded video from our high-definition camera systems over the web or with our mobile app.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”High-definition video for crystal-clear images”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Advanced analytics for intelligent video management”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Remote access to view video from anywhere at any time”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Scalable systems to grow with you over time”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our camera systems give you a simple, flexible way to control, manage, track and document events in your facilities. Call us at 678-924-7480 or fill out the form on this page to request more information or to request a free quote.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-01-11T17:10:47-05:00</modified>
	</item>
	<item>
		<id>999956367</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/cameras/</url>
		<title>High-Definition Cameras</title>
		<h1>High-Definition Cameras</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”High-Definition Camera Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our high-definition camera systems help you keep an eye on the security of your facilities. Our camera systems can be accessed from anywhere at any time giving you a full view of what is happening.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/09\/Cameras-on-Tablet-Stock-Image-1024×683.jpg|1706|2560|999956369″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Watch live and view recorded video with our high-definition camera systems. Easy to use […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”High-Definition Camera Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our high-definition camera systems help you keep an eye on the security of your facilities. Our camera systems can be accessed from anywhere at any time giving you a full view of what is happening.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/09\/Cameras-on-Tablet-Stock-Image-1024×683.jpg|1706|2560|999956369″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Watch live and view recorded video with our high-definition camera systems. Easy to use with clear, bright video images.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”View your live and recorded video while on the go”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Download and save recorded video clips for viewing later”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Specialized algorithms can detect human and vehicle activity which save you time on searching for video”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Available for mobile devices, laptops and tablets”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our high-definition camera systems give you the ability to view what is happening in your facility from anywhere at any time. Call us at 678-924-7480 or complete the form on this page to request more information or to get a free quote.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or fill out the form below for more information or to get a free quote.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390030003500220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e00740061006300740022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”High-Definition Camera Systems”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our high-definition camera systems help you keep an eye on the security of your facilities. Our camera systems can be accessed from anywhere at any time giving you a full view of what is happening.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/09\/Cameras-on-Tablet-Stock-Image-1024×683.jpg|1706|2560|999956369″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Watch live and view recorded video with our high-definition camera systems. Easy to use with clear, bright video images.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”View your live and recorded video while on the go”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Download and save recorded video clips for viewing later”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Specialized algorithms can detect human and vehicle activity which save you time on searching for video”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Available for mobile devices, laptops and tablets”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our high-definition camera systems give you the ability to view what is happening in your facility from anywhere at any time. Call us at 678-924-7480 or complete the form on this page to request more information or to get a free quote.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or fill out the form below for more information or to get a free quote.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390030003500220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e00740061006300740022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2020-09-15T14:28:16-04:00</modified>
	</item>
	<item>
		<id>999956359</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/testimonials/</url>
		<title>Testimonials</title>
		<h1>Testimonials</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”See what our customers have to say about us.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_xsPji”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”BV8cW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Great Installation Experience \n \”I wanted to take the time and let you know how awesome your team has been during our installation process. Ashley is way on top of her game and has given excellent customer service on her part and in scheduling the installs […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”See what our customers have to say about us.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_xsPji”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”BV8cW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<h3>Great Installation Experience</h3>
<p>\n</p>
<p>\”I wanted to take the time and let you know how awesome your team has been during our installation process. Ashley is way on top of her game and has given excellent customer service on her part and in scheduling the installs for the locations and taking care of the emergency contacts.  All of the techs that you have sent out to the stores have been nothing but professional and willing to make the customer which is us, happy and I couldn’t have asked for more.  These men too all need to be praised and recognized for a job well done!!\”\n \n-Ather B., Zaxby’s Restaurants, North Georgia\n</p>
<p>\n\n</p>
<h3>Quick and Responsive</h3>
<p>\n</p>
<p>\”Verified Security has been our security vendor for over 4 years now – they are quick, responsive, informative and helpful! Grateful to have them on our side!\”\n\n-Chelsea R., Pat Murphy Electric, Atlanta, GA\n</p>
<p>\n\n</p>
<h3>Great Company</h3>
<p>\n</p>
<p>“When we moved our offices, Verified Security installed our badge access control system and our network cabling. We found them to be a great company and they did a wonderful job for us. In addition, their prices are quite competitive.”\n\n- Laura M., INAP, Atlanta, GA\n</p>
<p>\n\n</p>
<h3>Easy to Work With</h3>
<p>\n</p>
<p>“Verified Security installed a card access control system for our university. The installation crew did a very nice job and\nwere very easy to work with and I was very grateful for that. I would recommend Verified Security to others.”\n\n- Bob R., Richmont Graduate University, Marietta, GA\n</p>
<p>\n”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”See what our customers have to say about us.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_xsPji”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”BV8cW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Great Installation Experience \n \”I wanted to take the time and let you know how awesome your team has been during our installation process. Ashley is way on top of her game and has given excellent customer service on her part and in scheduling the installs for the locations and taking care of the emergency contacts. All of the techs that you have sent out to the stores have been nothing but professional and willing to make the customer which is us, happy and I couldn’t have asked for more. These men too all need to be praised and recognized for a job well done!!\”\n \n-Ather B., Zaxby’s Restaurants, North Georgia\n \n\n Quick and Responsive \n \”Verified Security has been our security vendor for over 4 years now – they are quick, responsive, informative and helpful! Grateful to have them on our side!\”\n\n-Chelsea R., Pat Murphy Electric, Atlanta, GA\n \n\n Great Company \n “When we moved our offices, Verified Security installed our badge access control system and our network cabling. We found them to be a great company and they did a wonderful job for us. In addition, their prices are quite competitive.”\n\n- Laura M., INAP, Atlanta, GA\n \n\n Easy to Work With \n “Verified Security installed a card access control system for our university. The installation crew did a very nice job and\nwere very easy to work with and I was very grateful for that. I would recommend Verified Security to others.”\n\n- Bob R., Richmont Graduate University, Marietta, GA\n \n”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2020-08-20T15:37:11-04:00</modified>
	</item>
	<item>
		<id>999956344</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/mobile-credentials/</url>
		<title>Mobile Credentials</title>
		<h1>Mobile Credentials</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Use Your Smartphone to Access Your Facility with Mobile Credentials”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”It is now easier than ever to access your building or facility by using our mobile credential solution. With our mobile credentials, you can use your smartphone instead of a traditional access card or keyfob to unlock your doors.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/08\/mobile-access-ds-teaser.png|248|480|999956345″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Use your […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Use Your Smartphone to Access Your Facility with Mobile Credentials”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”It is now easier than ever to access your building or facility by using our mobile credential solution. With our mobile credentials, you can use your smartphone instead of a traditional access card or keyfob to unlock your doors.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/08\/mobile-access-ds-teaser.png|248|480|999956345″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Use your smartphone instead of an access card for building access”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Add and delete users easily on the web”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”No more forgetting your access badge–it is on your phone”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Works with both iOS and Android devices”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”To find out more about our mobile credential solution for facility access, you can email us at info@verifiedsecurity.com, call us at 678-924-7480 or complete the form on this page to get more information.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or fill out the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390030003500220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e00740061006300740022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Use Your Smartphone to Access Your Facility with Mobile Credentials”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”It is now easier than ever to access your building or facility by using our mobile credential solution. With our mobile credentials, you can use your smartphone instead of a traditional access card or keyfob to unlock your doors.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/08\/mobile-access-ds-teaser.png|248|480|999956345″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Use your smartphone instead of an access card for building access”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Add and delete users easily on the web”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”No more forgetting your access badge–it is on your phone”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Works with both iOS and Android devices”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”To find out more about our mobile credential solution for facility access, you can email us at info@verifiedsecurity.com, call us at 678-924-7480 or complete the form on this page to get more information.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or fill out the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390030003500220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e00740061006300740022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2020-08-17T13:44:53-04:00</modified>
	</item>
	<item>
		<id>999956334</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/temperature-monitoring-cameras/</url>
		<title>Measuring Body Temperature with a Camera</title>
		<h1>Measuring Body Temperature with a Camera</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/04\/Red-CCTV-Camera-dreamstime_m_141985110-1024×683.jpg|1414|2121|999956335″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”One of the great things that comes from challenging situations like the one we are in with the COVID-19 virus is increased innovation.  It is always great to see companies evolving and adapting in the face of adversity.\n\nOne of the recent innovations in our industry is the use of thermal imaging cameras paired with video […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/04\/Red-CCTV-Camera-dreamstime_m_141985110-1024×683.jpg|1414|2121|999956335″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”One of the great things that comes from challenging situations like the one we are in with the COVID-19 virus is increased innovation.  It is always great to see companies evolving and adapting in the face of adversity.\n\nOne of the recent innovations in our industry is the use of thermal imaging cameras paired with video analytics to detect human body temperature.  Thermal camera technology has been available for many years but has only recently been adapted to detect body temperature.\n\nWith this latest innovation, thermal measurements of body heat from a camera are compared with a reference temperature to determine if a person\u2019s body temperature is higher than the reference temperature.\n\nOne company that is manufacturing this technology is Dahua and this is a link to a video they created that shows the technology in use around the world:\n\n<a href="https:%5C/%5C/www.youtube.com%5C/watch?v=i-RJEjjRVWQ">https:\/\/www.youtube.com\/watch?v=i-RJEjjRVWQ&lt;\/a&gt;\n\nIt is important to say that these cameras are not approved medical devices and should not be used for the diagnosis of any medical conditions.  However, this type of solution may end up helping businesses in Atlanta, in Georgia, across America and around the world get back to work safely.\n\nAs always, please email me at </a><a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com&lt;\/a&gt; with any questions or comments.\n\n-Scott Hightower\n\n \n\nPhoto credit: ID 141985110 \u00a9 Wit Olszewski | Dreamstime.com”}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/04\/Red-CCTV-Camera-dreamstime_m_141985110-1024×683.jpg|1414|2121|999956335″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</a></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/04\/Red-CCTV-Camera-dreamstime_m_141985110-1024×683.jpg|1414|2121|999956335″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:””,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”One of the great things that comes from challenging situations like the one we are in with the COVID-19 virus is increased innovation.  It is always great to see companies evolving and adapting in the face of adversity.\n\nOne of the recent innovations in our industry is the use of thermal imaging cameras paired with video analytics to detect human body temperature.  Thermal camera technology has been available for many years but has only recently been adapted to detect body temperature.\n\nWith this latest innovation, thermal measurements of body heat from a camera are compared with a reference temperature to determine if a person\u2019s body temperature is higher than the reference temperature.\n\nOne company that is manufacturing this technology is Dahua and this is a link to a video they created that shows the technology in use around the world:\n\nhttps:\/\/www.youtube.com\/watch?v=i-RJEjjRVWQ\n\nIt is important to say that these cameras are not approved medical devices and should not be used for the diagnosis of any medical conditions.  However, this type of solution may end up helping businesses in Atlanta, in Georgia, across America and around the world get back to work safely.\n\nAs always, please email me at scotth@verifiedsecurity.com with any questions or comments.\n\n-Scott Hightower\n\n \n\nPhoto credit: ID 141985110 \u00a9 Wit Olszewski | Dreamstime.com”}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/04\/Red-CCTV-Camera-dreamstime_m_141985110-1024×683.jpg|1414|2121|999956335″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2020/04/Red-CCTV-Camera-dreamstime_m_141985110.jpg</image>
		<modified>2021-09-07T10:23:11-04:00</modified>
	</item>
	<item>
		<id>999956294</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/tips-for-managing-your-security-remotely/</url>
		<title>Tips for Managing Your Security Remotely</title>
		<h1>Tips for Managing Your Security Remotely</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/03\/dreamstime_l_134578232-1024×731.jpg|1828|2560|999956295″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Tips for Managing Your Security Remotely\n\nMany of you are now working from home in an effort to slow down the spread of the novel coronavirus, COVID-19.  Since many facilities are now empty, there are some things we recommend you check and monitor to ensure the security of your facilities.\n\nDoor Access Control \u2013 If everyone in […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/03\/dreamstime_l_134578232-1024×731.jpg|1828|2560|999956295″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”<strong>Tips for Managing Your Security Remotely&lt;\/strong&gt;\n\nMany of you are now working from home in an effort to slow down the spread of the novel coronavirus, COVID-19.  Since many facilities are now empty, there are some things we recommend you check and monitor to ensure the security of your facilities.\n\n<strong><u>Door Access Control&lt;\/u&gt;&lt;\/strong&gt; \u2013 If everyone in your office or facility is working from home, determine if you need to remove facility access for those personnel in order to keep them from going to the office.  For those who continue to need access, you might need to change the hours they are allowed to access your facility.  Also, consider running daily or weekly reports of facility access activity to help you police the guidelines set by your company.\n\n<strong><u>Security\/Alarm System&lt;\/u&gt;&lt;\/strong&gt; \u2013 If you have employees who temporarily should not have access to your facilities, consider removing alarm codes from your security system for those users.  You may also need to add alarm user codes for users who typically may not need them due to changing work schedules.  Also, if you don\u2019t have the capability today, consider adding the ability to arm and disarm your security system remotely so that you can grant facility access without physically having to be on site.  These remote management services would also allow you to set up email or text alerts to notify you when someone is arming or disarming the security system.  Most security systems also have a feature that would allow you to set up schedules for automatic arming to make sure your security system is armed at the end of each day.\n\n<strong><u>Video\/Camera System&lt;\/u&gt;&lt;\/strong&gt; \u2013 If your facility is unoccupied, it is important to check all of your cameras to ensure that they are working properly.  Determine if any of them need to be cleaned or focused.  Also, it is important to regularly check your recorded video to ensure that the video system is working properly and that video from your cameras are recording.  The wrong time to find out that your system is not recording is after an incident has been reported.  Finally, if you don\u2019t currently have the capability, consider establishing remote access to your camera system so that you can view your video feeds from anywhere at any time.\n\nThese are some suggestions and recommendations to consider when managing and monitoring the security of your facilities remotely.   With the abundance of remote monitoring tools and technologies available today, it is easier than ever before to keep an eye on the security of your facilities from anywhere.  If you have questions, please reach out to us at <a href="mailto:info@verifiedsecurity.com">info@verifiedsecurity.com&lt;\/a&gt;.\n\n “}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/03\/dreamstime_l_134578232-1024×731.jpg|1828|2560|999956295″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</a></u></strong></u></strong></u></strong></strong></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/03\/dreamstime_l_134578232-1024×731.jpg|1828|2560|999956295″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Tips for Managing Your Security Remotely\n\nMany of you are now working from home in an effort to slow down the spread of the novel coronavirus, COVID-19.  Since many facilities are now empty, there are some things we recommend you check and monitor to ensure the security of your facilities.\n\nDoor Access Control \u2013 If everyone in your office or facility is working from home, determine if you need to remove facility access for those personnel in order to keep them from going to the office.  For those who continue to need access, you might need to change the hours they are allowed to access your facility.  Also, consider running daily or weekly reports of facility access activity to help you police the guidelines set by your company.\n\nSecurity\/Alarm System \u2013 If you have employees who temporarily should not have access to your facilities, consider removing alarm codes from your security system for those users.  You may also need to add alarm user codes for users who typically may not need them due to changing work schedules.  Also, if you don\u2019t have the capability today, consider adding the ability to arm and disarm your security system remotely so that you can grant facility access without physically having to be on site.  These remote management services would also allow you to set up email or text alerts to notify you when someone is arming or disarming the security system.  Most security systems also have a feature that would allow you to set up schedules for automatic arming to make sure your security system is armed at the end of each day.\n\nVideo\/Camera System \u2013 If your facility is unoccupied, it is important to check all of your cameras to ensure that they are working properly.  Determine if any of them need to be cleaned or focused.  Also, it is important to regularly check your recorded video to ensure that the video system is working properly and that video from your cameras are recording.  The wrong time to find out that your system is not recording is after an incident has been reported.  Finally, if you don\u2019t currently have the capability, consider establishing remote access to your camera system so that you can view your video feeds from anywhere at any time.\n\nThese are some suggestions and recommendations to consider when managing and monitoring the security of your facilities remotely.   With the abundance of remote monitoring tools and technologies available today, it is easier than ever before to keep an eye on the security of your facilities from anywhere.  If you have questions, please reach out to us at info@verifiedsecurity.com.\n\n “}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/03\/dreamstime_l_134578232-1024×731.jpg|1828|2560|999956295″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2020/03/dreamstime_l_134578232-scaled.jpg</image>
		<modified>2021-09-07T10:24:13-04:00</modified>
	</item>
	<item>
		<id>999956288</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/new-honeywell-cameras-are-more-secure/</url>
		<title>New Honeywell Cameras are More Secure</title>
		<h1>New Honeywell Cameras are More Secure</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”by Scott Hightower”,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/01\/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg|256|500|999956289″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Honeywell recently released a new series of IP surveillance cameras dubbed the 30 Series line.  These new cameras are loaded with features including 50-meter smart IR illumination, video resolutions up to 5 megapixels, wide-dynamic-range with great low-light performance, onboard SD card storage, and secure stream encryption.\n\nOne other key feature of these cameras is […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”by Scott Hightower”,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/01\/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg|256|500|999956289″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Honeywell recently released a new series of IP surveillance cameras dubbed the 30 Series line.  These new cameras are loaded with features including 50-meter smart IR illumination, video resolutions up to 5 megapixels, wide-dynamic-range with great low-light performance, onboard SD card storage, and secure stream encryption.\n\nOne other key feature of these cameras is that they comply with a new government regulation knows as NDAA Section 889.  NDAA is also known as the John S. McCain National Defense Authorization Act for Fiscal Year 2019. Section 889 of this law includes prohibitions on government use of video surveillance technologies manufactured by certain overseas manufacturers.  Specifically, the language in section 889 states:\n\n\u201cFor the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, video surveillance and telecommunications equipment produced by\u2026\u201d and then continues by listing specific manufacturers whose equipment is prohibited for purchase by the federal government.\n\nThe new 30 Series cameras from Honeywell do not contain any hardware or components from manufacturers who are banned by this law.  And, with secure stream encryption, they provide a more secure solution for protecting your video while still generating excellent video pictures.”}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/01\/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg|256|500|999956289″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”by Scott Hightower”,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/01\/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg|256|500|999956289″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Honeywell recently released a new series of IP surveillance cameras dubbed the 30 Series line.  These new cameras are loaded with features including 50-meter smart IR illumination, video resolutions up to 5 megapixels, wide-dynamic-range with great low-light performance, onboard SD card storage, and secure stream encryption.\n\nOne other key feature of these cameras is that they comply with a new government regulation knows as NDAA Section 889.  NDAA is also known as the John S. McCain National Defense Authorization Act for Fiscal Year 2019. Section 889 of this law includes prohibitions on government use of video surveillance technologies manufactured by certain overseas manufacturers.  Specifically, the language in section 889 states:\n\n\u201cFor the purpose of public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes, video surveillance and telecommunications equipment produced by\u2026\u201d and then continues by listing specific manufacturers whose equipment is prohibited for purchase by the federal government.\n\nThe new 30 Series cameras from Honeywell do not contain any hardware or components from manufacturers who are banned by this law.  And, with secure stream encryption, they provide a more secure solution for protecting your video while still generating excellent video pictures.”}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2020\/01\/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg|256|500|999956289″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2020/01/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg</image>
		<modified>2021-09-07T10:24:48-04:00</modified>
	</item>
	<item>
		<id>999956275</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/follow-the-rules-with-maxpro-cloud/</url>
		<title>Follow the Rules with Maxpro Cloud</title>
		<h1>Follow the Rules with Maxpro Cloud</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/04\/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg|284|535|999956004″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Maxpro Cloud is a cloud-based security platform built by Honeywell and installed, serviced, and managed by Honeywell partners like us.  It is a very flexible and scalable system for managing door access control, video and alarms.  It has many great features and benefits and the Maxpro Cloud rules engine is one of them.\n\nWith Maxpro Cloud […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/04\/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg|284|535|999956004″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Maxpro Cloud is a cloud-based security platform built by Honeywell and installed, serviced, and managed by Honeywell partners like us.  It is a very flexible and scalable system for managing door access control, video and alarms.  It has many great features and benefits and the Maxpro Cloud rules engine is one of them.\n\nWith Maxpro Cloud rules, you can trigger actions when certain conditions exist.  Those trigger conditions can be based on device activities, schedules or time conditions.  Below is a picture that shows the setup of a new rule in Maxpro Cloud.\n\n<a href="https:%5C/%5C/verifiedsecurity.com%5C/wp-content%5C/uploads%5C/2019%5C/12%5C/Pic-of-Maxpro-Cloud-Rules.png"><img src="https:%5C/%5C/verifiedsecurity.com%5C/wp-content%5C/uploads%5C/2019%5C/12%5C/Pic-of-Maxpro-Cloud-Rules-1024x439.png" alt="" width="1024" height="439">&lt;\/a&gt;\n\nBased on the triggers you choose, you can initiate actions such as sending a notification or activating a device like a siren or a flashing strobe light.\n\nHow might this benefit you?  Would you like to know if someone has propped open a security door that is supposed to stay closed?  Or, would you like to know if someone attempted to use an invalid card at one of your card readers?  These are just two examples of the many options you can select when setting up rules for Maxpro Cloud.\n\nMaxpro Cloud was designed to be easy to use and flexible to give you the most options for managing the security and access control of your facilities.  If you have questions about your options for access control and security, please do not hesitate to contact us at </a><a href="mailto:info@verifiedsecurity.com">info@verifiedsecurity.com.&lt;\/a&gt;\n\n-Scott Hightower, </a><a href="https:%5C/%5C/verifiedsecurity.com">Verified Security&lt;\/a&gt;“}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/04\/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg|284|535|999956004″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</a></p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_image”,”id”:”title-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/04\/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg|284|535|999956004″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”overlay”:”transparent-dark”,”breadcrumbs”:false,”white”:true}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_vtfQF”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_wp_editor”,”id”:”Xhugf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”editor_content”:”Maxpro Cloud is a cloud-based security platform built by Honeywell and installed, serviced, and managed by Honeywell partners like us.  It is a very flexible and scalable system for managing door access control, video and alarms.  It has many great features and benefits and the Maxpro Cloud rules engine is one of them.\n\nWith Maxpro Cloud rules, you can trigger actions when certain conditions exist.  Those trigger conditions can be based on device activities, schedules or time conditions.  Below is a picture that shows the setup of a new rule in Maxpro Cloud.\n\n\n\nBased on the triggers you choose, you can initiate actions such as sending a notification or activating a device like a siren or a flashing strobe light.\n\nHow might this benefit you?  Would you like to know if someone has propped open a security door that is supposed to stay closed?  Or, would you like to know if someone attempted to use an invalid card at one of your card readers?  These are just two examples of the many options you can select when setting up rules for Maxpro Cloud.\n\nMaxpro Cloud was designed to be easy to use and flexible to give you the most options for managing the security and access control of your facilities.  If you have questions about your options for access control and security, please do not hesitate to contact us at info@verifiedsecurity.com.\n\n-Scott Hightower, Verified Security“}]}],”section_settings”:””},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]},”post_type_setting”:{“settings”:{“image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/04\/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg|284|535|999956004″,”excerpt”:””,”extra_1″:””,”extra_2″:””,”icon”:{“icon”:””,”icon_style”:””,”icon_image”:””}}}}</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2018/04/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg</image>
		<modified>2021-01-20T15:02:02-05:00</modified>
	</item>
	<item>
		<id>999956269</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/cloudaccess/</url>
		<title>Cloud Access Control</title>
		<h1>Cloud Access Control</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Integrated Security and Access Control”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our technology platform provides you with incredible flexibility to manage the security of your facilities. Whether you are responsible for a small strip mall, a church, a medium-sized office building, or a large manufacturing facility \u2013 controlling access to your buildings is a critical component of managing risk […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Integrated Security and Access Control”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our technology platform provides you with incredible flexibility to manage the security of your facilities. Whether you are responsible for a small strip mall, a church, a medium-sized office building, or a large manufacturing facility \u2013 controlling access to your buildings is a critical component of managing risk today.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Manage access to your facility from anywhere with our convenient and flexible cloud-based access control systems.  Easy to use and no server required.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Lock and unlock doors while on the go”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Add and delete users and cardholders remotely”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Flexible reporting tools to monitor facility access”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Integrates with camera and alarm systems for a single view”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Available for mobile devices, laptops and tablets”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our featured managed access control solution makes it easy\u00a0to keep your premises secure without you having to learn and manage complicated software. Our access control systems are customized to the needs of your organization and are focused on providing you a simple, flexible way to control, manage, track and document access control events. Call us at 678-924-7480 or fill out the form on this page to request more information.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Integrated Security and Access Control”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our technology platform provides you with incredible flexibility to manage the security of your facilities. Whether you are responsible for a small strip mall, a church, a medium-sized office building, or a large manufacturing facility \u2013 controlling access to your buildings is a critical component of managing risk today.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/07\/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Manage access to your facility from anywhere with our convenient and flexible cloud-based access control systems. Easy to use and no server required.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Lock and unlock doors while on the go”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Add and delete users and cardholders remotely”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Flexible reporting tools to monitor facility access”},{“component”:”repeater_item”,”id”:”BggE0″,”icon”:”fa fa-check”,”text”:”Integrates with camera and alarm systems for a single view”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Available for mobile devices, laptops and tablets”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our featured managed access control solution makes it easy\u00a0to keep your premises secure without you having to learn and manage complicated software. Our access control systems are customized to the needs of your organization and are focused on providing you a simple, flexible way to control, manage, track and document access control events. Call us at 678-924-7480 or fill out the form on this page to request more information.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or complete the form below to get more information.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390039003900390035003600320037003200220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e007400610063007400320022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2019\/01\/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:[],”css”:[],”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2020-11-06T13:37:29-05:00</modified>
	</item>
	<item>
		<id>999956255</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/download-case-study/</url>
		<title>Download Case Study</title>
		<h1>Download Case Study</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”See how 1electric eased company management with a cloud-based access control system.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_RBGbB”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”4W1o4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Please provide your contact information to download this case study.”},{“component”:”hc_space”,”id”:”GSAKC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_text_block”,”id”:”1egxz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”See how 1electric eased company management with a cloud-based access control system.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_RBGbB”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”4W1o4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Please provide your contact information to download this case study.”},{“component”:”hc_space”,”id”:”GSAKC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_text_block”,”id”:”1egxz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”See how 1electric eased company management with a cloud-based access control system.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_RBGbB”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”4W1o4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Please provide your contact information to download this case study.”},{“component”:”hc_space”,”id”:”GSAKC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_text_block”,”id”:”1egxz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2019-12-31T16:36:08-05:00</modified>
	</item>
	<item>
		<id>999956219</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/drone-security/</url>
		<title>Drone Security?</title>
		<h1>Drone Security?</h1>
		<summary>Media outlets announced recently that the federal government had awarded a patent to Amazon for using drones for home security and surveillance.  If you didn’t see one of the article, this is the link to one of them from National Public Radio (NPR): Link to NPR Article The article states that the patent papers ‘describe […]</summary>
		<content><![CDATA[<p>Media outlets announced recently that the federal government had awarded a patent to Amazon for using drones for home security and surveillance.  If you didn’t see one of the article, this is the link to one of them from National Public Radio (NPR): <a href="https://www.npr.org/2019/06/22/735076936/amazon-explores-having-its-drones-provide-home-surveillance-for-customers" target="_blank" rel="noopener noreferrer">Link to NPR Article</a></p>
<p>The article states that the patent papers ‘describe a future in which Amazon customers order drones to hover around a home and scan for things such as a garage door left open, a broken window, graffiti or a fire.’  Amazon is not the only company exploring the use of drones for enhancing security.  Another entrant is Sunflower Labs and their website has a video that shows how their system works: <a href="https://sunflower-labs.com/" target="_blank" rel="noopener noreferrer">Sunflower Labs Website</a></p>
<p>While both of these are early efforts, we certainly believe that flying drones will be used more and more in the future to enhance electronic security systems.  They could be used for alarm verification and for giving homeowners and business owners more tools for managing their security from anywhere at any time.</p>
<p>What do you think of the idea of using drones for enhancing facility security?  Good idea?</p>
<p>-Scott Hightower, <a href="https://verifiedsecurity.com/" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>Media outlets announced recently that the federal government had awarded a patent to Amazon for using drones for home security and surveillance.  If you didn’t see one of the article, this is the link to one of them from National Public Radio (NPR): Link to NPR Article The article states that the patent papers ‘describe a future in which Amazon customers order drones to hover around a home and scan for things such as a garage door left open, a broken window, graffiti or a fire.’  Amazon is not the only company exploring the use of drones for enhancing security.  Another entrant is Sunflower Labs and their website has a video that shows how their system works: Sunflower Labs Website While both of these are early efforts, we certainly believe that flying drones will be used more and more in the future to enhance electronic security systems.  They could be used for alarm verification and for giving homeowners and business owners more tools for managing their security from anywhere at any time. What do you think of the idea of using drones for enhancing facility security?  Good idea? -Scott Hightower, Verified Security</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2019/07/drone-in-flight.jpg</image>
		<modified>2020-04-04T09:28:39-04:00</modified>
	</item>
	<item>
		<id>999956182</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/cloud-access/</url>
		<title>Cloud Access</title>
		<h1>Cloud Access</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Integrated Security and Access Control”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our technology platform provides you with incredible flexibility to manage the security of your facilities. Whether you are responsible for an office park, school, a church, a medium-sized office building, or a large manufacturing facility – controlling access to your buildings is a critical component of managing risk […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Integrated Security and Access Control”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our technology platform provides you with incredible flexibility to manage the security of your facilities. Whether you are responsible for an office park, school, a church, a medium-sized office building, or a large manufacturing facility – controlling access to your buildings is a critical component of managing risk today.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2019/07/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Manage access to your facility from anywhere with our convenient and flexible cloud-based access control systems.  Easy to use and no server required.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Lock and unlock doors while on the go”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Add and delete users and cardholders remotely”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Flexible reporting tools to monitor facility access”},{“component”:”repeater_item”,”id”:”piy5V”,”icon”:”fa fa-check”,”text”:”Integrate video, access control, and alarm systems in one platform”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Available for mobile devices, laptops and tablets”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our featured managed access control solution makes it easy to keep your premises secure without you having to learn and manage complicated software. Our access control systems are customized to the needs of your organization and are focused on providing you a simple, flexible way to control, manage, track and document access control events. Complete the form on this page or call us at 678-924-7480 to get more information.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or fill out the form below to get a free quote.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390030003500220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e00740061006300740022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2019/01/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:{},”css”:{},”css_page”:”#column_2jHO4 {\n    padding-top: 20px;\n    background-color: #8282822e;\n    padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_eWJpF”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”8p4QD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Easy, Integrated Security and Access Control”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”yFn1C”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Our technology platform provides you with incredible flexibility to manage the security of your facilities. Whether you are responsible for an office park, school, a church, a medium-sized office building, or a large manufacturing facility – controlling access to your buildings is a critical component of managing risk today.”},{“component”:”hc_image”,”id”:”PyCwy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2019/07/iphone-and-screen.png|533|689|999956227″,”alt”:””,”thumb_size”:”large”},{“component”:”hc_text_block”,”id”:”oLYLJ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;font-size: 17px;”,”content”:”Manage access to your facility from anywhere with our convenient and flexible cloud-based access control systems. Easy to use and no server required.”},{“component”:”hc_icon_list_simple”,”id”:”IHqR8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”padding-bottom: 22px;padding-left: 16px;”,”rows”:[{“component”:”repeater_item”,”id”:”6zXrX”,”icon”:”fa fa-check”,”text”:”Lock and unlock doors while on the go”},{“component”:”repeater_item”,”id”:”FGR44″,”icon”:”fa fa-check”,”text”:”Add and delete users and cardholders remotely”},{“component”:”repeater_item”,”id”:”pFYtX”,”icon”:”fa fa-check”,”text”:”Flexible reporting tools to monitor facility access”},{“component”:”repeater_item”,”id”:”piy5V”,”icon”:”fa fa-check”,”text”:”Integrate video, access control, and alarm systems in one platform”},{“component”:”repeater_item”,”id”:”0GPWp”,”icon”:”fa fa-check”,”text”:”Available for mobile devices, laptops and tablets”}],”alignment”:”text-left”,”icon_size”:”text-m”,”list_style”:””},{“component”:”hc_text_block”,”id”:”IQ4g8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”font-size: 17px;”,”content”:”Our featured managed access control solution makes it easy to keep your premises secure without you having to learn and manage complicated software. Our access control systems are customized to the needs of your organization and are focused on providing you a simple, flexible way to control, manage, track and document access control events. Complete the form on this page or call us at 678-924-7480 to get more information.”}]},{“component”:”hc_column”,”id”:”column_2jHO4″,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”hLF2i”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:”margin-bottom: 14px; color: rgb(2, 132, 192) !important;”,”text”:”Call us or fill out the form below to get a free quote.”,”tag”:”h4″},{“component”:”hc_code_block”,”id”:”w4OPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”005b0063006f006e0074006100630074002d0066006f0072006d002d0037002000690064003d002200390030003500220020007400690074006c0065003d0022004c0061006e00640069006e00670020005000610067006500200043006f006e00740061006300740022005d”,”language”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”https://verifiedsecurity.com/wp-content/uploads/2019/01/hd-3-1-1024×506.jpg|949|1920|999955630″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:{},”css”:{},”css_page”:”#column_2jHO4 {\n padding-top: 20px;\n background-color: #8282822e;\n padding-bottom: 20px;\n}”,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2025-04-03T09:52:22-04:00</modified>
	</item>
	<item>
		<id>999956175</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/are-you-missing-out-on-the-benefits-of-integration/</url>
		<title>Are you Missing Out on the Benefits of Integration?</title>
		<h1>Are you Missing Out on the Benefits of Integration?</h1>
		<summary>Many of our customers have alarm systems, video camera systems, or card access control systems. Some have all three. But, often these systems are operated as stand-alone systems without any integrated functionality. This might mean using three different logins or three different mobile apps. Or, having to run three different reports to get data from […]</summary>
		<content><![CDATA[<p>Many of our customers have alarm systems, video camera systems, or card access control systems. Some have all three. But, often these systems are operated as stand-alone systems without any integrated functionality. This might mean using three different logins or three different mobile apps. Or, having to run three different reports to get data from three different systems. Not very efficient.</p>
<a href="https://verifiedsecurity.com/wp-content/uploads/2019/04/Maxpro-Cloud-Image.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-999956176" src="https://verifiedsecurity.com/wp-content/uploads/2019/04/Maxpro-Cloud-Image-300x185.jpg" alt="Maxpro Cloud" width="308" height="190" srcset="https://verifiedsecurity.com/wp-content/uploads/2019/04/Maxpro-Cloud-Image-300x185.jpg 300w, https://verifiedsecurity.com/wp-content/uploads/2019/04/Maxpro-Cloud-Image.jpg 597w" sizes="auto, (max-width: 308px) 100vw, 308px"></a><p id="caption-attachment-999956176">Maxpro Cloud</p>
<p>Today, integration has become much easier to achieve and the benefits of integration are greater than ever. For example, with platforms like Honeywell’s <a href="https://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud</a>, you can present a valid access card to both unlock a door and disarm the security system at the same time. Or, an alarm at a door could be used to trigger a video recording on your camera system. These are just two examples that demonstrate the power of true platform integration.</p>
<p>The other advancement with security system integration is that it is less expensive than it used to be to integrate these systems. In the past, it might have cost tens of thousands of dollars to deploy a fully-integrated security platform. Over time, the cost of installing and managing an integrated system has continued to drop making it much more cost-effective to realize the benefits that come from using an integrated security platform.</p>
<p>If you are interested in learning more about the benefits of integrating your security systems, this is a link to an article in Security Sales &amp; Integration magazine: <a href="https://www.securitysales.com/integration/7_benefits_integrated_security_system/" target="_blank" rel="noopener noreferrer">https://www.securitysales.com/integration/7_benefits_integrated_security_system/</a></p>
<p>As always, please contact me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a> with any questions or comments.</p>
<p>-Scott Hightower, <a href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>Many of our customers have alarm systems, video camera systems, or card access control systems. Some have all three. But, often these systems are operated as stand-alone systems without any integrated functionality. This might mean using three different logins or three different mobile apps. Or, having to run three different reports to get data from three different systems. Not very efficient. Maxpro Cloud Today, integration has become much easier to achieve and the benefits of integration are greater than ever. For example, with platforms like Honeywell’s Maxpro Cloud, you can present a valid access card to both unlock a door and disarm the security system at the same time. Or, an alarm at a door could be used to trigger a video recording on your camera system. These are just two examples that demonstrate the power of true platform integration. The other advancement with security system integration is that it is less expensive than it used to be to integrate these systems. In the past, it might have cost tens of thousands of dollars to deploy a fully-integrated security platform. Over time, the cost of installing and managing an integrated system has continued to drop making it much more cost-effective to realize the benefits that come from using an integrated security platform. If you are interested in learning more about the benefits of integrating your security systems, this is a link to an article in Security Sales &amp; Integration magazine: https://www.securitysales.com/integration/7_benefits_integrated_security_system/ As always, please contact me at scotth@verifiedsecurity.com with any questions or comments. -Scott Hightower, Verified Security</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2019/04/Maxpro-Cloud-Image.jpg</image>
		<modified>2020-04-04T09:26:08-04:00</modified>
	</item>
	<item>
		<id>999955939</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/privacy-policy/</url>
		<title>Privacy Policy</title>
		<h1>Privacy Policy</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”This privacy notice discloses the privacy practices for VerifiedSecurity.com.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_UxliH”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”YIW6x”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Privacy Notice”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”ZCzla”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”This privacy notice applies solely to information collected by this website. It will notify you of the following:\n\n \n What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared. \n What choices are available […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”This privacy notice discloses the privacy practices for VerifiedSecurity.com.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_UxliH”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”YIW6x”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Privacy Notice”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”ZCzla”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”This privacy notice applies solely to information collected by this website. It will notify you of the following:\n\n</p>
<ul>\n   
<li>What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared.</li>
<p>\n   </p>
<li>What choices are available to you regarding the use of your data.</li>
<p>\n   </p>
<li>The security procedures in place to protect the misuse of your information.</li>
<p>\n   </p>
<li>How you can correct any inaccuracies in the information.</li>
<p>\n</p></ul>
<p>“},{“component”:”hc_title_tag”,”id”:”1vho7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Information Collection, Use, and Sharing “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”nwTes”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.\n\nWe will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.\n\nUnless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.”},{“component”:”hc_title_tag”,”id”:”gE24T”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Your Access to and Control Over Information “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”b4urg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:\n\n</p>
<ul>\n   
<li>See what data we have about you, if any.</li>
<p>\n   </p>
<li>Change/correct any data we have about you.</li>
<p>\n   </p>
<li>Have us delete any data we have about you.</li>
<p>\n   </p>
<li>Express any concern you have about our use of your data.</li>
<p>\n</p></ul>
<p>\n”},{“component”:”hc_title_tag”,”id”:”nRpdx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cookies”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”FBvNu”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We use \”cookies\” on this site. A cookie is a piece of data stored on a site visitor’s hard drive to help us improve your access to our site and identify repeat visitors to our site. For instance, when we use a cookie to identify you, you would not have to log in a password more than once, thereby saving time while on our site. Cookies can also enable us to track and target the interests of our users to enhance the experience on our site. Usage of a cookie is in no way linked to any personally identifiable information on our site.”},{“component”:”hc_title_tag”,”id”:”khYLO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Links”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”lpq8A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”This website contains links to other sites. Please be aware that we are not responsible for the content or privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of any other site that collects personally identifiable information.”},{“component”:”hc_title_tag”,”id”:”A7fCu”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Security”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”BjApD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.\n\nWherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for \”https\” at the beginning of the address of the Web page.\n\nWhile we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.\n\nIf you feel that we are not abiding by this privacy policy, you should call us immediately at (678) 924-7480.”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”This privacy notice discloses the privacy practices for VerifiedSecurity.com.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_UxliH”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”YIW6x”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Privacy Notice”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”ZCzla”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”This privacy notice applies solely to information collected by this website. It will notify you of the following:\n\n \n What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared. \n What choices are available to you regarding the use of your data. \n The security procedures in place to protect the misuse of your information. \n How you can correct any inaccuracies in the information. \n “},{“component”:”hc_title_tag”,”id”:”1vho7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Information Collection, Use, and Sharing “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”nwTes”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.\n\nWe will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.\n\nUnless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.”},{“component”:”hc_title_tag”,”id”:”gE24T”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Your Access to and Control Over Information “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”b4urg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:\n\n \n See what data we have about you, if any. \n Change/correct any data we have about you. \n Have us delete any data we have about you. \n Express any concern you have about our use of your data. \n \n”},{“component”:”hc_title_tag”,”id”:”nRpdx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cookies”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”FBvNu”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We use \”cookies\” on this site. A cookie is a piece of data stored on a site visitor’s hard drive to help us improve your access to our site and identify repeat visitors to our site. For instance, when we use a cookie to identify you, you would not have to log in a password more than once, thereby saving time while on our site. Cookies can also enable us to track and target the interests of our users to enhance the experience on our site. Usage of a cookie is in no way linked to any personally identifiable information on our site.”},{“component”:”hc_title_tag”,”id”:”khYLO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Links”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”lpq8A”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”This website contains links to other sites. Please be aware that we are not responsible for the content or privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of any other site that collects personally identifiable information.”},{“component”:”hc_title_tag”,”id”:”A7fCu”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Security”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”BjApD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.\n\nWherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for \”https\” at the beginning of the address of the Web page.\n\nWhile we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.\n\nIf you feel that we are not abiding by this privacy policy, you should call us immediately at (678) 924-7480.”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2026-01-01T10:41:06-05:00</modified>
	</item>
	<item>
		<id>999955935</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/accessibility/</url>
		<title>Accessibility Statement</title>
		<h1>Accessibility Statement</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”We want everyone who visits VerifiedSecurity.com to feel welcome.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_vYKBI”:{“component”:”hc_section”,”id”:”section_vYKBI”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_uLClg”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AYzo5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”What are we doing?”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”2V2F1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To help us make the VerifiedSecurity.com website a positive place for everyone, we’ve been using the Web Content Accessibility Guidelines (WCAG) 2.1. These guidelines explain how to make web content more accessible for people with disabilities, and user friendly for everyone.\n\nThe guidelines have three […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”We want everyone who visits VerifiedSecurity.com to feel welcome.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_vYKBI”:{“component”:”hc_section”,”id”:”section_vYKBI”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_uLClg”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AYzo5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”What are we doing?”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”2V2F1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To help us make the VerifiedSecurity.com website a positive place for everyone, we’ve been using the Web Content Accessibility Guidelines (WCAG) 2.1. These guidelines explain how to make web content more accessible for people with disabilities, and user friendly for everyone.\n\nThe guidelines have three levels of accessibility (A, AA and AAA). We’ve chosen Level AA as the target for the VerifiedSecurity.com website.”},{“component”:”hc_title_tag”,”id”:”ArZpS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”How are we doing? “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”IkNM4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We’ve worked hard on the VerifiedSecurity.com website and believe we’ve achieved our goal of Level AA accessibility. We monitor the website regularly to maintain this, but if you do find any problems, please get in touch.”},{“component”:”hc_title_tag”,”id”:”Bb6fv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Let us know what you think”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”A3dwx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”If you enjoyed using the VerifiedSecurity.com website, or if you had trouble with any part of it, please get in touch. We’d like to hear from you. Please call us at (678) 924-7480.”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”We want everyone who visits VerifiedSecurity.com to feel welcome.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_vYKBI”:{“component”:”hc_section”,”id”:”section_vYKBI”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_uLClg”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AYzo5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”What are we doing?”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”2V2F1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To help us make the VerifiedSecurity.com website a positive place for everyone, we’ve been using the Web Content Accessibility Guidelines (WCAG) 2.1. These guidelines explain how to make web content more accessible for people with disabilities, and user friendly for everyone.\n\nThe guidelines have three levels of accessibility (A, AA and AAA). We’ve chosen Level AA as the target for the VerifiedSecurity.com website.”},{“component”:”hc_title_tag”,”id”:”ArZpS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”How are we doing? “,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”IkNM4″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We’ve worked hard on the VerifiedSecurity.com website and believe we’ve achieved our goal of Level AA accessibility. We monitor the website regularly to maintain this, but if you do find any problems, please get in touch.”},{“component”:”hc_title_tag”,”id”:”Bb6fv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Let us know what you think”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”A3dwx”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”If you enjoyed using the VerifiedSecurity.com website, or if you had trouble with any part of it, please get in touch. We’d like to hear from you. Please call us at (678) 924-7480.”}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2026-01-01T10:40:12-05:00</modified>
	</item>
	<item>
		<id>836</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/next-generation-cloud-based-access-control-and-video/</url>
		<title>Next Generation Cloud-Based Access Control and Video</title>
		<h1>Next Generation Cloud-Based Access Control and Video</h1>
		<summary>About two weeks ago, Honeywell launched the latest iteration of their cloud-base access control and video management platform, Maxpro Cloud. Maxpro Cloud has been available for some time and this was the launch of a new user interface with enhanced features and functionality. The great thing about Maxpro Cloud is that it makes it very […]</summary>
		<content><![CDATA[<p>About two weeks ago, Honeywell launched the latest iteration of their cloud-base access control and video management platform, <a href="https://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud</a>. <a href="https://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud</a> has been available for some time and this was the launch of a new user interface with enhanced features and functionality.</p>
<p>The great thing about <a href="https://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud</a> is that it makes it very easy to monitor and manage your access control and video systems from anywhere.</p>
<p><img decoding="async" src="http://new.verifiedsecurity.com/wp-content/uploads/2018/05/Maxpro-Cloud-Viewer-1024x465.jpg" alt="" width="100%"></p>
<p>With the latest iteration of this powerful platform from Honeywell, there are a number of new and enhanced features and functions.  Dynamic floor plans for easily managing your facility security, enhanced dashboards and reporting, and a new mobile app all make the control over your access control and video surveillance systems easier than ever.  A screen capture of the viewer above will give you an example of the management views which can be customized.</p>
<p>We are seeing the continued enhancement of cloud-based security and access control management platforms.  With more features and functionality and with the ease of use and management of a cloud-based platform, it is easier than ever to manage your facility security from anywhere at any time.</p>
]]></content>
		<content_plain>About two weeks ago, Honeywell launched the latest iteration of their cloud-base access control and video management platform, Maxpro Cloud. Maxpro Cloud has been available for some time and this was the launch of a new user interface with enhanced features and functionality. The great thing about Maxpro Cloud is that it makes it very easy to monitor and manage your access control and video systems from anywhere. With the latest iteration of this powerful platform from Honeywell, there are a number of new and enhanced features and functions.  Dynamic floor plans for easily managing your facility security, enhanced dashboards and reporting, and a new mobile app all make the control over your access control and video surveillance systems easier than ever.  A screen capture of the viewer above will give you an example of the management views which can be customized. We are seeing the continued enhancement of cloud-based security and access control management platforms.  With more features and functionality and with the ease of use and management of a cloud-based platform, it is easier than ever to manage your facility security from anywhere at any time.</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2018/05/Maxpro-Cloud-Viewer.jpg</image>
		<modified>2021-06-03T16:26:07-04:00</modified>
	</item>
	<item>
		<id>824</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/is-amazon-in-the-access-control-business/</url>
		<title>Is Amazon in the Access Control Business?</title>
		<h1>Is Amazon in the Access Control Business?</h1>
		<summary>As you may have heard, Amazon now offers a service called Amazon Key which provides a way for you to allow an Amazon delivery person to access your home to deliver a package.  The electronic lock provided by Amazon is paired with a cloud-based camera so the delivery process can be viewed and recorded.  Amazon […]</summary>
		<content><![CDATA[<p>As you may have heard, Amazon now offers a service called <a href="https://www.amazon.com/b?ie=UTF8&amp;node=17285120011" target="_blank" rel="noopener noreferrer">Amazon Key</a> which provides a way for you to allow an Amazon delivery person to access your home to deliver a package.  The electronic lock provided by Amazon is paired with a cloud-based camera so the delivery process can be viewed and recorded.  Amazon also recently announced that is has acquired <a href="https://ring.com/" target="_blank" rel="noopener noreferrer">Ring</a>, a manufacturer of a cloud-based video doorbell.</p>
<p>While Amazon’s unique integration of access control and video is new in the residential consumer environment, it has been available for some time in commercial environments.  But, the change for commercial facility security is that there are now more flexible cloud-based solutions for integrating video and access control.</p>
<p>One example of a cloud-based service that integrates video and access control is <a href="https://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud</a> from Honeywell.  With this innovative platform, users can monitor and manage facility access control and live and recorded video from anywhere at any time on a variety of devices.</p>
<p> </p>
<p>Why integrate video with your access control system?  One of the key reasons is to use video footage to verify activity from the access control system.  Cards and fobs can be borrowed or stolen and recorded video can provide a true record of who entered a facility.  Also, recorded video can provide evidence of unauthorized attempts to enter a facility.</p>
<p>Integrating video with your access control system provides another layer of security to better protect your facilities.</p>
<p>As always, let me know if you have any questions or feedback.  You an email me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>As you may have heard, Amazon now offers a service called Amazon Key which provides a way for you to allow an Amazon delivery person to access your home to deliver a package.  The electronic lock provided by Amazon is paired with a cloud-based camera so the delivery process can be viewed and recorded.  Amazon also recently announced that is has acquired Ring, a manufacturer of a cloud-based video doorbell. While Amazon’s unique integration of access control and video is new in the residential consumer environment, it has been available for some time in commercial environments.  But, the change for commercial facility security is that there are now more flexible cloud-based solutions for integrating video and access control. One example of a cloud-based service that integrates video and access control is Maxpro Cloud from Honeywell.  With this innovative platform, users can monitor and manage facility access control and live and recorded video from anywhere at any time on a variety of devices.   Why integrate video with your access control system?  One of the key reasons is to use video footage to verify activity from the access control system.  Cards and fobs can be borrowed or stolen and recorded video can provide a true record of who entered a facility.  Also, recorded video can provide evidence of unauthorized attempts to enter a facility. Integrating video with your access control system provides another layer of security to better protect your facilities. As always, let me know if you have any questions or feedback.  You an email me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2018/04/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg</image>
		<modified>2021-04-06T16:32:57-04:00</modified>
	</item>
	<item>
		<id>818</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/security-robots/</url>
		<title>Security Robots?</title>
		<h1>Security Robots?</h1>
		<summary>I don’t know about you but I grew up hearing about the future of robots and their integration into our society.  From the world of the Jetsons on television to the stories of hobbyists building robots in their garages, it seemed to be a foregone conclusion that robots would be part of our future. Now, […]</summary>
		<content><![CDATA[<p>I don’t know about you but I grew up hearing about the future of robots and their integration into our society.  From the world of the Jetsons on television to the stories of hobbyists building robots in their garages, it seemed to be a foregone conclusion that robots would be part of our future.</p>
<p>Now, the future is here and we are seeing more and more uses of robots in business applications.  Car manufacturers have used robots in their assembly lines for years and we have seen companies like Amazon deploy fleets of robots in their distribution warehouses.<img loading="lazy" decoding="async" src="https://images.pexels.com/photos/595804/pexels-photo-595804.jpeg?auto=compress&amp;cs=tinysrgb&amp;h=350" alt="Free stock photo of technology, science, toys, device" width="386" height="257"></p>
<p>Now it seems that the time has come for robots to be used in physical security applications.  Companies like <a href="https://www.knightscope.com/" target="_blank" rel="noopener noreferrer">Knightscope</a> and <a href="https://www.cobaltrobotics.com/" target="_blank" rel="noopener noreferrer">Cobalt Robotics</a> are building robots to be used to help protect commercial facilities.  <a href="https://www.securitysales.com/emerging-tech/robotics-tech/cobalt-robotics-funding-security-robots/" target="_blank" rel="noopener noreferrer">A recent article in Security Sales and Integration magazine</a> said that Cobalt just closed a $13 million series A funding round to help them build their business.  To see Cobalt’s vision of how their security robots could be deployed, see <a href="https://www.youtube.com/watch?v=7La_uQyOX3A" target="_blank" rel="noopener noreferrer">their YouTube video.</a></p>
<p>In time, we will learn more about the success of using these security robots to protect facilities and properties.  For now, it is fun to watch the development of these new technologies.</p>
<p>If you have any questions, don’t hesitate to contact me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>I don’t know about you but I grew up hearing about the future of robots and their integration into our society.  From the world of the Jetsons on television to the stories of hobbyists building robots in their garages, it seemed to be a foregone conclusion that robots would be part of our future. Now, the future is here and we are seeing more and more uses of robots in business applications.  Car manufacturers have used robots in their assembly lines for years and we have seen companies like Amazon deploy fleets of robots in their distribution warehouses. Now it seems that the time has come for robots to be used in physical security applications.  Companies like Knightscope and Cobalt Robotics are building robots to be used to help protect commercial facilities.  A recent article in Security Sales and Integration magazine said that Cobalt just closed a $13 million series A funding round to help them build their business.  To see Cobalt’s vision of how their security robots could be deployed, see their YouTube video. In time, we will learn more about the success of using these security robots to protect facilities and properties.  For now, it is fun to watch the development of these new technologies. If you have any questions, don’t hesitate to contact me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2018/04/pexels-photo-595804.jpeg</image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>808</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/will-2018-be-the-year-of-biometric-access-control/</url>
		<title>Will 2018 Be the Year of Biometric Access Control?</title>
		<h1>Will 2018 Be the Year of Biometric Access Control?</h1>
		<summary>For years, we have seen futuristic movies in which fingers, eyes, and palms are scanned to grant access to high-security facilities with the use of biometric detection devices. In the real world, biometric device usage in facility access control applications has been growing but slowly. The growth of biometrics usage in real-world applications has been […]</summary>
		<content><![CDATA[<p>For years, we have seen futuristic movies in which fingers, eyes, and palms are scanned to grant access to high-security facilities with the use of biometric detection devices. In the real world, biometric device usage in facility access control applications has been growing but slowly.</p>
<p>The growth of biometrics usage in real-world applications has been slow for several reasons. First, the cost of the biometric devices has remained fairly high in comparison to traditional access control card readers. While the price of this technology has continued to drop, it is still significantly higher than the cost of a traditional card reader.</p>
<p>Second, biometric adoption has been slow due to early technological challenges which resulted in less than 100% success with biometric identification. The lack of 100% identification created false negatives (access denied) which resulted in user confusion and frustration.</p>
<p>Fortunately, as the technology continues to improve, the challenges are diminishing, and some believe that 2018 is the year when biometric adoption will begin to accelerate. In <a href="https://www.biometricupdate.com/201801/2018-biometric-predictions-advanced-biometric-technologies-take-off" target="_blank" rel="noopener noreferrer">this article</a>, the author states that 2018 is the year when we will see an acceleration in usage and points to healthcare as a market where biometric usage is forecasted to grow at a compounded rate of 22.9% over the next several years.</p>
<p>There are several reasons for the expected increase in biometric usage for access control applications. First the cost of the technology continues to decrease. Second, as chip processing power has improved, the technology has become more effective, resulting in fewer access denials from false positives. Third, there are more options for how a user interacts with a biometric device. Originally, the devices worked with fingerprints only. But, with new technologies, facial recognition and hand print detection are also available for biometric identification.</p>
<p>Finally, one of the biggest reasons for the acceleration in usage of biometric technology for access control applications is convenience. With the use of biometrics, there is no need to carry a card or fob—your credentials are always with you.</p>
<p>In conclusion, we believe that the use of biometric technology for facility access control in Atlanta and throughout the Southeastern United States will become more and more popular as the technology improves and becomes more affordable.</p>
]]></content>
		<content_plain>For years, we have seen futuristic movies in which fingers, eyes, and palms are scanned to grant access to high-security facilities with the use of biometric detection devices. In the real world, biometric device usage in facility access control applications has been growing but slowly. The growth of biometrics usage in real-world applications has been slow for several reasons. First, the cost of the biometric devices has remained fairly high in comparison to traditional access control card readers. While the price of this technology has continued to drop, it is still significantly higher than the cost of a traditional card reader. Second, biometric adoption has been slow due to early technological challenges which resulted in less than 100% success with biometric identification. The lack of 100% identification created false negatives (access denied) which resulted in user confusion and frustration. Fortunately, as the technology continues to improve, the challenges are diminishing, and some believe that 2018 is the year when biometric adoption will begin to accelerate. In this article, the author states that 2018 is the year when we will see an acceleration in usage and points to healthcare as a market where biometric usage is forecasted to grow at a compounded rate of 22.9% over the next several years. There are several reasons for the expected increase in biometric usage for access control applications. First the cost of the technology continues to decrease. Second, as chip processing power has improved, the technology has become more effective, resulting in fewer access denials from false positives. Third, there are more options for how a user interacts with a biometric device. Originally, the devices worked with fingerprints only. But, with new technologies, facial recognition and hand print detection are also available for biometric identification. Finally, one of the biggest reasons for the acceleration in usage of biometric technology for access control applications is convenience. With the use of biometrics, there is no need to carry a card or fob—your credentials are always with you. In conclusion, we believe that the use of biometric technology for facility access control in Atlanta and throughout the Southeastern United States will become more and more popular as the technology improves and becomes more affordable.</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2018/03/download.jpg</image>
		<modified>2021-04-06T16:13:51-04:00</modified>
	</item>
	<item>
		<id>802</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/mobile-access-a-top-trend-for-2018/</url>
		<title>Mobile Access a Top Trend for 2018</title>
		<h1>Mobile Access a Top Trend for 2018</h1>
		<summary>Several weeks ago, HID Global, a leading manufacturer or access control technology and credentials, issued a report on their top five access control trends for 2018.  Security Sales and Integration magazine published an online story that outlines those five access control trends. One of those trends is titled “Mobile access reaches tipping point for mass […]</summary>
		<content><![CDATA[<p>Several weeks ago, <a href="https://www.hidglobal.com/" target="_blank" rel="noopener noreferrer">HID Global</a>, a leading manufacturer or access control technology and credentials, issued a report on their top five access control trends for 2018.  Security Sales and Integration magazine published an <a href="https://www.securitysales.com/access/hid-global-access-control-trends-2018/" target="_blank" rel="noopener noreferrer">online story</a> that outlines those five access control trends.</p>
<p>One of those trends is titled “Mobile access reaches tipping point for mass market adoption.”  Mobile access refers to the ability for an authorized user to use his or her mobile device to gain access to a facility instead of having to use an access card or key fob.</p>
<p> </p>
<p>As a provider of facility access control solutions in Atlanta and throughout the southeastern United States, we are hearing more frequent requests for mobile access and credentials from our customers.  According to the Pew Research Center, <a href="http://www.pewinternet.org/fact-sheet/mobile/" target="_blank" rel="noopener noreferrer">77% of Americans now own smartphones.</a>  Since they have become so prevalent and people are integrating them into their daily activities, it is natural for there to be a desire to use a smartphone instead of an access card in order to gain access to a facility.</p>
<p>We think that we will see this trend towards using smartphones as access credentials accelerate.  In a few short years, we expect that we will see much less use of traditional cards for facility access.</p>
]]></content>
		<content_plain>Several weeks ago, HID Global, a leading manufacturer or access control technology and credentials, issued a report on their top five access control trends for 2018.  Security Sales and Integration magazine published an online story that outlines those five access control trends. One of those trends is titled “Mobile access reaches tipping point for mass market adoption.”  Mobile access refers to the ability for an authorized user to use his or her mobile device to gain access to a facility instead of having to use an access card or key fob.   As a provider of facility access control solutions in Atlanta and throughout the southeastern United States, we are hearing more frequent requests for mobile access and credentials from our customers.  According to the Pew Research Center, 77% of Americans now own smartphones.  Since they have become so prevalent and people are integrating them into their daily activities, it is natural for there to be a desire to use a smartphone instead of an access card in order to gain access to a facility. We think that we will see this trend towards using smartphones as access credentials accelerate.  In a few short years, we expect that we will see much less use of traditional cards for facility access.</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/2018/02/mobile-access-control.jpg</image>
		<modified>2021-04-06T16:11:48-04:00</modified>
	</item>
	<item>
		<id>677</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/blog/</url>
		<title>Verified Security Blog</title>
		<h1>Verified Security Blog</h1>
		<summary></summary>
		<content><![CDATA[  
  
        
  	
        
    <a href="https://verifiedsecurity.com/blog/access-control-choosing-the-right-credential-for-your-business/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2024/07/DMP_Access_33.jpg" alt="Top 4 Access Control Credentials"></a>
       
    <a href="https://verifiedsecurity.com/blog/access-control-choosing-the-right-credential-for-your-business/" style="text-decoration: none;"><h2 style="font-size: 24px;">Top 4 Access Control Credentials</h2></a>
    
    
   
   ”In the realm of modern security, access control credentials are the gatekeepers of our security. As technology advances, the options for these credentials have expanded, each with its own set of advantages and challenges.\n Physical credentials, such as ID cards and key fobs, have long been the backbones of access control. These tangible tokens offer […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/the-power-of-remote-access/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2024/07/AprilSocial18_7-1.jpg" alt="The Power of Remote Access"></a>
       
    <a href="https://verifiedsecurity.com/blog/the-power-of-remote-access/" style="text-decoration: none;"><h2 style="font-size: 24px;">The Power of Remote Access</h2></a>
    
    
   
   ”Imagine having complete control of your business security at your fingertips, no matter where you are. With advanced apps like Total Connect and Virtual Keypad, you can arm or disarm your system, lock or unlock doors, and view onsite video—all from your smartphone. This level of control ensures that you’re always connected to your business, […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/practical-ai-solutions-for-your-security-needs/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2024/06/AI-scaled.jpg" alt="Practical AI Solutions for Your Security Needs"></a>
       
    <a href="https://verifiedsecurity.com/blog/practical-ai-solutions-for-your-security-needs/" style="text-decoration: none;"><h2 style="font-size: 24px;">Practical AI Solutions for Your Security Needs</h2></a>
    
    
   
   ”At Verified Security, we are thrilled about the game-changing impact of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage. They can proactively detect and alert you to specific activities of your interest in […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/working-smarter-with-maxpro-cloud/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2019/07/iphone-and-screen.png" alt="Working Smarter with Maxpro Cloud"></a>
       
    <a href="https://verifiedsecurity.com/blog/working-smarter-with-maxpro-cloud/" style="text-decoration: none;"><h2 style="font-size: 24px;">Working Smarter with Maxpro Cloud</h2></a>
    
    
   
   ”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.\n\nMaxpro Cloud is a smart, flexible, integrated security platform that allows you to manage your security from anywhere at any time using a […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/temperature-monitoring-cameras/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2020/04/Red-CCTV-Camera-dreamstime_m_141985110.jpg" alt="Measuring Body Temperature with a Camera"></a>
       
    <a href="https://verifiedsecurity.com/blog/temperature-monitoring-cameras/" style="text-decoration: none;"><h2 style="font-size: 24px;">Measuring Body Temperature with a Camera</h2></a>
    
    
   
   ”One of the great things that comes from challenging situations like the one we are in with the COVID-19 virus is increased innovation.  It is always great to see companies evolving and adapting in the face of adversity.\n\nOne of the recent innovations in our industry is the use of thermal imaging cameras paired with video […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/tips-for-managing-your-security-remotely/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2020/03/dreamstime_l_134578232-scaled.jpg" alt="Tips for Managing Your Security Remotely"></a>
       
    <a href="https://verifiedsecurity.com/blog/tips-for-managing-your-security-remotely/" style="text-decoration: none;"><h2 style="font-size: 24px;">Tips for Managing Your Security Remotely</h2></a>
    
    
   
   ”Tips for Managing Your Security Remotely\n\nMany of you are now working from home in an effort to slow down the spread of the novel coronavirus, COVID-19.  Since many facilities are now empty, there are some things we recommend you check and monitor to ensure the security of your facilities.\n\nDoor Access Control \u2013 If everyone in […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/new-honeywell-cameras-are-more-secure/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2020/01/Honeywell-30-Series-Bullet-Camera-e1578512284432.jpg" alt="New Honeywell Cameras are More Secure"></a>
       
    <a href="https://verifiedsecurity.com/blog/new-honeywell-cameras-are-more-secure/" style="text-decoration: none;"><h2 style="font-size: 24px;">New Honeywell Cameras are More Secure</h2></a>
    
    
   
   ”Honeywell recently released a new series of IP surveillance cameras dubbed the 30 Series line.  These new cameras are loaded with features including 50-meter smart IR illumination, video resolutions up to 5 megapixels, wide-dynamic-range with great low-light performance, onboard SD card storage, and secure stream encryption.\n\nOne other key feature of these cameras is […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/follow-the-rules-with-maxpro-cloud/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2018/04/HSF-MPC-Landing-Page-Thumbs-case-study-general.jpg" alt="Follow the Rules with Maxpro Cloud"></a>
       
    <a href="https://verifiedsecurity.com/blog/follow-the-rules-with-maxpro-cloud/" style="text-decoration: none;"><h2 style="font-size: 24px;">Follow the Rules with Maxpro Cloud</h2></a>
    
    
   
   ”Maxpro Cloud is a cloud-based security platform built by Honeywell and installed, serviced, and managed by Honeywell partners like us.  It is a very flexible and scalable system for managing door access control, video and alarms.  It has many great features and benefits and the Maxpro Cloud rules engine is one of them.\n\nWith Maxpro Cloud […]   
   
   
  
         
  	
        
    <a href="https://verifiedsecurity.com/blog/drone-security/" style="text-decoration: none;"><img decoding="async" src="https://verifiedsecurity.com/wp-content/uploads/2019/07/drone-in-flight.jpg" alt="Drone Security?"></a>
       
    <a href="https://verifiedsecurity.com/blog/drone-security/" style="text-decoration: none;"><h2 style="font-size: 24px;">Drone Security?</h2></a>
    
    
   
   ia outlets announced recently that the federal government had awarded a patent to Amazon for using drones for home security and surveillance.  If you didn’t see one of the article, this is the link to one of them from National Public Radio (NPR): <a href="https://www.npr.org/2019/06/22/735076936/amazon-explores-having-its-drones-provide-home-surveillance-for-customers" target="_blank" rel="noopener noreferrer">Link to NPR Article</a>   
   
   
  
       
  
     <nav>
      
<span>Page 1 of 7</span><span aria-current="page">1</span><a title="Page 2" href="https://verifiedsecurity.com/page/2/?feed=aeo">2</a><a title="Page 3" href="https://verifiedsecurity.com/page/3/?feed=aeo">3</a><a title="Page 4" href="https://verifiedsecurity.com/page/4/?feed=aeo">4</a><a title="Page 5" href="https://verifiedsecurity.com/page/5/?feed=aeo">5</a><span>...</span><a rel="next" aria-label="Next Page" href="https://verifiedsecurity.com/page/2/?feed=aeo">»</a><a aria-label="Last Page" href="https://verifiedsecurity.com/page/7/?feed=aeo">Last »</a>
  </nav>

    
]]></content>
		<content_plain>Top 4 Access Control Credentials ”In the realm of modern security, access control credentials are the gatekeepers of our security. As technology advances, the options for these credentials have expanded, each with its own set of advantages and challenges.\n Physical credentials, such as ID cards and key fobs, have long been the backbones of access control. These tangible tokens offer […] The Power of Remote Access ”Imagine having complete control of your business security at your fingertips, no matter where you are. With advanced apps like Total Connect and Virtual Keypad, you can arm or disarm your system, lock or unlock doors, and view onsite video—all from your smartphone. This level of control ensures that you’re always connected to your business, […] Practical AI Solutions for Your Security Needs ”At Verified Security, we are thrilled about the game-changing impact of AI-powered video analytics to revolutionize the security industry. By taking advantage of advanced AI and computer vision algorithms, security camera systems can now do far more than just record footage. They can proactively detect and alert you to specific activities of your interest in […] Working Smarter with Maxpro Cloud ”We often talk to customers who need more simplicity in their lives. We think that Maxpro Cloud from Honeywell is a platform that offers that simplicity when it comes to securing your facilities.\n\nMaxpro Cloud is a smart, flexible, integrated security platform that allows you to manage your security from anywhere at any time using a […] Measuring Body Temperature with a Camera ”One of the great things that comes from challenging situations like the one we are in with the COVID-19 virus is increased innovation.  It is always great to see companies evolving and adapting in the face of adversity.\n\nOne of the recent innovations in our industry is the use of thermal imaging cameras paired with video […] Tips for Managing Your Security Remotely ”Tips for Managing Your Security Remotely\n\nMany of you are now working from home in an effort to slow down the spread of the novel coronavirus, COVID-19.  Since many facilities are now empty, there are some things we recommend you check and monitor to ensure the security of your facilities.\n\nDoor Access Control \u2013 If everyone in […] New Honeywell Cameras are More Secure ”Honeywell recently released a new series of IP surveillance cameras dubbed the 30 Series line.  These new cameras are loaded with features including 50-meter smart IR illumination, video resolutions up to 5 megapixels, wide-dynamic-range with great low-light performance, onboard SD card storage, and secure stream encryption.\n\nOne other key feature of these cameras is […] Follow the Rules with Maxpro Cloud ”Maxpro Cloud is a cloud-based security platform built by Honeywell and installed, serviced, and managed by Honeywell partners like us.  It is a very flexible and scalable system for managing door access control, video and alarms.  It has many great features and benefits and the Maxpro Cloud rules engine is one of them.\n\nWith Maxpro Cloud […] Drone Security? ia outlets announced recently that the federal government had awarded a patent to Amazon for using drones for home security and surveillance.  If you didn’t see one of the article, this is the link to one of them from National Public Radio (NPR): Link to NPR Article Page 1 of 712345...»Last »</content_plain>
		<image></image>
		<modified>2026-01-01T10:39:36-05:00</modified>
	</item>
	<item>
		<id>999955733</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/contact/</url>
		<title>Contact Us</title>
		<h1>Contact Us</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Faq”,”subtitle”:”Get help 24/7/365 from our frequently asked questions and support team”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_HY5f8″:{“component”:”hc_section”,”id”:”section_HY5f8″,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”ATNNm”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”4AJr5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Send a Message”,”tag”:”h2″},{“component”:”hc_space”,”id”:”lqh3K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_block”,”id”:”xQQNb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””},{“component”:”hc_space”,”id”:”L6eHF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”5ZtkF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”General Questions”,”tag”:”h2″},{“component”:”hc_space”,”id”:”F4m1n”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_accordion”,”id”:”mZsCi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do I change my alarm codes?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”jpEIh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To change your alarm code on a Honeywell Vista-20P or Vista-21IP alarm control panel (the type of system you have is listed on the inside door of the brown metal alarm control cabinet), you first enter […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Faq”,”subtitle”:”Get help 24/7/365 from our frequently asked questions and support team”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_HY5f8″:{“component”:”hc_section”,”id”:”section_HY5f8″,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”ATNNm”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”4AJr5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Send a Message”,”tag”:”h2″},{“component”:”hc_space”,”id”:”lqh3K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_block”,”id”:”xQQNb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“},{“component”:”hc_space”,”id”:”L6eHF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”5ZtkF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”General Questions”,”tag”:”h2″},{“component”:”hc_space”,”id”:”F4m1n”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_accordion”,”id”:”mZsCi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do I change my alarm codes?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”jpEIh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To change your alarm code on a Honeywell Vista-20P or Vista-21IP alarm control panel (the type of system you have is listed on the inside door of the brown metal alarm control cabinet), you first enter your four digit master code, then press 8, then enter the two digit user number you want to change (03-32 are the valid user numbers), and then enter the new four digit code for the user. The keypad should beep twice to let you know that the code was accepted. As an additional verification step, you can enter the new code and then press the Off button to verify that the new code works (the system should beep after you press Off). If you do not have a Honeywell Vista-20P or Vista-21IP alarm control panel, please contact us for instructions.”}],”name_2″:”How do I retrieve video from my Digital Video Recorder and record it to a CD or to my computer?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”fgMBL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every Digital Video Recorder (DVR) has a different procedure for retrieving video. You will need to check the user manual for your DVR to get the instructions. If you need the user manual for your DVR, please contact us.  We would be happy to send you one.”}],”name_3″:”How do I know if my Digital Video Recorder is recording?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”2WkjS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”You should see a red record light on the front of your Digital Video Recorder (DVR) when it is recording. As an additional step, you should periodically view recorded video on your DVR to ensure that it is recording properly.”}],”name_4″:”Why can’t I view my video remotely over the Internet?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”Ye2vz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To view video remotely over the Internet from your Digital Video Recorder (DVR), you must first have your DVR connected to a high-speed Internet connection and ensure that it is programmed for remote network access. If you have confirmed that it is connected and configured properly, then there may be a problem with your router or your Internet connection. When you can interrupt your Internet connection, you should power down your modem (cable or DSL), your router, and your DVR and wait two minutes. Then, you should first power up your modem and wait for a minute or two. Then, you should power up your router and wait for a minute or two. Then, you should power up your DVR and try the remote access again. If this process does not work, please contact us for technical support.”}],”name_5″:””,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[],”name_6″:””,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[],”name_7″:””,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:””,”time”:””,”open”:””}]},{“component”:”hc_column”,”id”:”column_5ZtkF”,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”boxed-inverse “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”fdxJg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Request support”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”suFGi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our support line is staffed 24 hours a day, 7 days a week, and 365 days a year”},{“component”:”hc_space”,”id”:”EXErn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”Ue3qY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”4UlBG”,”image_link”:””,”title”:”Office”,”subtitle”:”678-924-7480″,”extra”:””},{“component”:”repeater_item”,”id”:”FjGNK”,”image_link”:””,”title”:”Fax”,”subtitle”:”678-924-0192″,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false},{“component”:”hc_space”,”id”:”fcNiQ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”w7HYm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”VMQhk”,”image_link”:””,”title”:”Inquiries”,”subtitle”:”info@verifiedsecurity.com”,”extra”:””},{“component”:”repeater_item”,”id”:”DWAUh”,”image_link”:””,”title”:”Service”,”subtitle”:”service@verifiedsecurity.com”,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false}]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Faq”,”subtitle”:”Get help 24/7/365 from our frequently asked questions and support team”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_HY5f8″:{“component”:”hc_section”,”id”:”section_HY5f8″,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”ATNNm”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”4AJr5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Send a Message”,”tag”:”h2″},{“component”:”hc_space”,”id”:”lqh3K”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_block”,”id”:”xQQNb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”[contact-form-7]“},{“component”:”hc_space”,”id”:”L6eHF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_title_tag”,”id”:”5ZtkF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”General Questions”,”tag”:”h2″},{“component”:”hc_space”,”id”:”F4m1n”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_accordion”,”id”:”mZsCi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”name_1″:”How do I change my alarm codes?”,”icon_1″:””,”icon_style_1″:””,”icon_image_1″:””,”content_1″:[{“component”:”hc_text_block”,”id”:”jpEIh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To change your alarm code on a Honeywell Vista-20P or Vista-21IP alarm control panel (the type of system you have is listed on the inside door of the brown metal alarm control cabinet), you first enter your four digit master code, then press 8, then enter the two digit user number you want to change (03-32 are the valid user numbers), and then enter the new four digit code for the user. The keypad should beep twice to let you know that the code was accepted. As an additional verification step, you can enter the new code and then press the Off button to verify that the new code works (the system should beep after you press Off). If you do not have a Honeywell Vista-20P or Vista-21IP alarm control panel, please contact us for instructions.”}],”name_2″:”How do I retrieve video from my Digital Video Recorder and record it to a CD or to my computer?”,”icon_2″:””,”icon_style_2″:””,”icon_image_2″:””,”content_2″:[{“component”:”hc_text_block”,”id”:”fgMBL”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Every Digital Video Recorder (DVR) has a different procedure for retrieving video. You will need to check the user manual for your DVR to get the instructions. If you need the user manual for your DVR, please contact us.  We would be happy to send you one.”}],”name_3″:”How do I know if my Digital Video Recorder is recording?”,”icon_3″:””,”icon_style_3″:””,”icon_image_3″:””,”content_3″:[{“component”:”hc_text_block”,”id”:”2WkjS”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”You should see a red record light on the front of your Digital Video Recorder (DVR) when it is recording. As an additional step, you should periodically view recorded video on your DVR to ensure that it is recording properly.”}],”name_4″:”Why can’t I view my video remotely over the Internet?”,”icon_4″:””,”icon_style_4″:””,”icon_image_4″:””,”content_4″:[{“component”:”hc_text_block”,”id”:”Ye2vz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”To view video remotely over the Internet from your Digital Video Recorder (DVR), you must first have your DVR connected to a high-speed Internet connection and ensure that it is programmed for remote network access. If you have confirmed that it is connected and configured properly, then there may be a problem with your router or your Internet connection. When you can interrupt your Internet connection, you should power down your modem (cable or DSL), your router, and your DVR and wait two minutes. Then, you should first power up your modem and wait for a minute or two. Then, you should power up your router and wait for a minute or two. Then, you should power up your DVR and try the remote access again. If this process does not work, please contact us for technical support.”}],”name_5″:””,”icon_5″:””,”icon_style_5″:””,”icon_image_5″:””,”content_5″:[],”name_6″:””,”icon_6″:””,”icon_style_6″:””,”icon_image_6″:””,”content_6″:[],”name_7″:””,”icon_7″:””,”icon_style_7″:””,”icon_image_7″:””,”content_7″:[],”name_8″:””,”icon_8″:””,”icon_style_8″:””,”icon_image_8″:””,”content_8″:[],”name_9″:””,”icon_9″:””,”icon_style_9″:””,”icon_image_9″:””,”content_9″:[],”name_10″:””,”icon_10″:””,”icon_style_10″:””,”icon_image_10″:””,”content_10″:[],”open_type”:””,”time”:””,”open”:””}]},{“component”:”hc_column”,”id”:”column_5ZtkF”,”column_width”:”col-md-4″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”boxed-inverse “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”fdxJg”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Request support”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”suFGi”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our support line is staffed 24 hours a day, 7 days a week, and 365 days a year”},{“component”:”hc_space”,”id”:”EXErn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”Ue3qY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”4UlBG”,”image_link”:””,”title”:”Office”,”subtitle”:”678-924-7480″,”extra”:””},{“component”:”repeater_item”,”id”:”FjGNK”,”image_link”:””,”title”:”Fax”,”subtitle”:”678-924-0192″,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false},{“component”:”hc_space”,”id”:”fcNiQ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_text_list”,”id”:”w7HYm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”VMQhk”,”image_link”:””,”title”:”Inquiries”,”subtitle”:”info@verifiedsecurity.com”,”extra”:””},{“component”:”repeater_item”,”id”:”DWAUh”,”image_link”:””,”title”:”Service”,”subtitle”:”service@verifiedsecurity.com”,”extra”:””}],”style”:”style_2″,”animation”:””,”show_images”:false}]}],”section_settings”:””},”scripts”:{“components”:”jquery.tab-accordion.js”},”css”:{“components”:”css/components.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2026-01-01T10:36:50-05:00</modified>
	</item>
	<item>
		<id>999955721</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/commitment/</url>
		<title>Commitment</title>
		<h1>Commitment</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”About us four”,”subtitle”:”We are focused on providing effective systems to help you achieve your security and fire protection goals”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_jGtij”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”lM9SC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”History”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”J6H2p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We have been providing security systems for businesses and other organizations in Georgia for over thirteen years. As the security market has evolved, so have we. Our staff possesses hardware and software expertise which is essential in […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”About us four”,”subtitle”:”We are focused on providing effective systems to help you achieve your security and fire protection goals”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_jGtij”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”lM9SC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”History”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”J6H2p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We have been providing security systems for businesses and other organizations in Georgia for over thirteen years. As the security market has evolved, so have we. Our staff possesses hardware and software expertise which is essential in today’s changing marketplace. We are also one of a select group of security system providers that has been hand-picked and certified by Honeywell, the largest manufacturer of security products in the United States.”},{“component”:”hc_space”,”id”:”SR9h7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”vBIhW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Core Values”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”FEuWn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We believe that these key principles are the foundation of our approach to customer satisfaction:\n</p>
<ul>\n \t
<li><strong>We listen</strong> – We want to hear your objectives and develop customized solutions based on your needs.  We will help educate you on which solutions are best for you.</li>
<p>\n \t</p>
<li><strong>We future-proof your system</strong> – We provide the latest technologies to ensure that you have a scalable solution that can be remotely managed and monitored from anywhere at any time.</li>
<p>\n \t</p>
<li><strong>We support you</strong> – With Verified Security, you are never alone. When you call for service, you will always reach a live person – 24 hours a day, 7 days a week, 365 days a year.</li>
<p>\n \t</p>
<li><strong>We are qualified</strong> – We have invested time and effort into developing industry and organizational affiliations that benefit you. We are members of the Electronic Security Association (ESA), the Georgia Electronic Life Safety and Systems Association (GELSSA), and are a certified Honeywell CSS Dealer (Honeywell commercial certification).</li>
<p>\n</p></ul>
<p>“},{“component”:”hc_space”,”id”:”mktvY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”yL8Wz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Certifications and Qualifications”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”9XiKf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We are licensed by the State of Georgia to perform low-voltage work within the state (Georgia Unrestricted Low-Voltage License # LVU405898). We are also members of the Electronic Security Association (ESA) and of the Georgia Electronic Life Safety and Systems Association (GELSSA).\n\nWe are factory-certified on Honeywell intrusion and fire alarm systems, Honeywell access control systems, and Honeywell video surveillance systems. We are also factory-trained and certified on Firelite, Silent Knight and System Sensor fire alarm systems.”},{“component”:”hc_space”,”id”:”IoOsh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”hwzWZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Customer Satisfaction”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”a7A5p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We place the highest value on customer satisfaction – We provide a 30-day money-back guarantee to ensure that you are satisfied with your installation project. To ensure that your systems operate at peak performance, we offer comprehensive service agreements. Our service plans are designed to catch problems before they happen.”},{“component”:”hc_space”,”id”:”xtOth”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_grid_table”,”id”:”3q5Q1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_popover”,”id”:”az45k”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”NoPuE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/zaxbys-logo.png|250|250|999955931″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Zaxby’s”,”text”:””},{“component”:”hc_popover”,”id”:”Rx0P6″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”WQwVC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/holliday-inn-logo.png|250|250|999955929″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Holiday Inn”,”text”:””},{“component”:”hc_popover”,”id”:”BicLy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”P1GD9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/performance-food-group-logo.png|250|250|999955930″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Performance Food Group”,”text”:””},{“component”:”hc_popover”,”id”:”1KZIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”RgYeh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/davita-logo.png|250|250|999955932″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”DaVita”,”text”:””}],”rows”:”1″,”cols”:”4″,”full-border”:false,”no-borders”:true,”full-mobile”:false}]}],”section_settings”:””},”scripts”:{“toolstip”:”bootstrap/js/bootstrap.popover.min.js”},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”About us four”,”subtitle”:”We are focused on providing effective systems to help you achieve your security and fire protection goals”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_jGtij”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”lM9SC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”History”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”J6H2p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We have been providing security systems for businesses and other organizations in Georgia for over thirteen years. As the security market has evolved, so have we. Our staff possesses hardware and software expertise which is essential in today’s changing marketplace. We are also one of a select group of security system providers that has been hand-picked and certified by Honeywell, the largest manufacturer of security products in the United States.”},{“component”:”hc_space”,”id”:”SR9h7″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”vBIhW”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Core Values”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”FEuWn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We believe that these key principles are the foundation of our approach to customer satisfaction:\n \n \t We listen – We want to hear your objectives and develop customized solutions based on your needs.  We will help educate you on which solutions are best for you. \n \t We future-proof your system – We provide the latest technologies to ensure that you have a scalable solution that can be remotely managed and monitored from anywhere at any time. \n \t We support you – With Verified Security, you are never alone. When you call for service, you will always reach a live person – 24 hours a day, 7 days a week, 365 days a year. \n \t We are qualified – We have invested time and effort into developing industry and organizational affiliations that benefit you. We are members of the Electronic Security Association (ESA), the Georgia Electronic Life Safety and Systems Association (GELSSA), and are a certified Honeywell CSS Dealer (Honeywell commercial certification). \n “},{“component”:”hc_space”,”id”:”mktvY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”yL8Wz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Certifications and Qualifications”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”9XiKf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We are licensed by the State of Georgia to perform low-voltage work within the state (Georgia Unrestricted Low-Voltage License # LVU405898). We are also members of the Electronic Security Association (ESA) and of the Georgia Electronic Life Safety and Systems Association (GELSSA).\n\nWe are factory-certified on Honeywell intrusion and fire alarm systems, Honeywell access control systems, and Honeywell video surveillance systems. We are also factory-trained and certified on Firelite, Silent Knight and System Sensor fire alarm systems.”},{“component”:”hc_space”,”id”:”IoOsh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”hwzWZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Customer Satisfaction”,”tag”:”h2″},{“component”:”hc_text_block”,”id”:”a7A5p”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We place the highest value on customer satisfaction – We provide a 30-day money-back guarantee to ensure that you are satisfied with your installation project. To ensure that your systems operate at peak performance, we offer comprehensive service agreements. Our service plans are designed to catch problems before they happen.”},{“component”:”hc_space”,”id”:”xtOth”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_grid_table”,”id”:”3q5Q1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_popover”,”id”:”az45k”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”NoPuE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/zaxbys-logo.png|250|250|999955931″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Zaxby’s”,”text”:””},{“component”:”hc_popover”,”id”:”Rx0P6″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”WQwVC”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/holliday-inn-logo.png|250|250|999955929″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Holiday Inn”,”text”:””},{“component”:”hc_popover”,”id”:”BicLy”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”P1GD9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/performance-food-group-logo.png|250|250|999955930″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Performance Food Group”,”text”:””},{“component”:”hc_popover”,”id”:”1KZIt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”RgYeh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http://new.verifiedsecurity.com/wp-content/uploads/2018/01/davita-logo.png|250|250|999955932″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”DaVita”,”text”:””}],”rows”:”1″,”cols”:”4″,”full-border”:false,”no-borders”:true,”full-mobile”:false}]}],”section_settings”:””},”scripts”:{“toolstip”:”bootstrap/js/bootstrap.popover.min.js”},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2026-01-01T10:42:45-05:00</modified>
	</item>
	<item>
		<id>165</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/</url>
		<title>Verified Security</title>
		<h1>Verified Security</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h1″},{“component”:”hc_title_tag”,”id”:”nx7T8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Advanced security systems to protect your business”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”quDQ3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We deliver superior products with extremely responsive service to provide you with the best security systems”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_button”,”id”:”XePgh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-lg”,”position”:”center”,”animation”:false,”text”:”Request A Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”kkdJq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_XWFMG”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_slider”,”id”:”T9CFn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_content_box”,”id”:”DCLOX”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/accesscontrolsystems-jpg-e1551391315886.jpg|141|250|999955897″,”title”:”Access Control”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Manage access to your facility from anywhere with our convenient and flexible access control systems”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/access-control-systems\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”D5FCR”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Video-CCTV-systems-png-e1551391421833.png|141|250|999955901″,”title”:”Video Surveillance”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Detect and identify potential intruders to keep […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h1″},{“component”:”hc_title_tag”,”id”:”nx7T8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Advanced security systems to protect your business”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”quDQ3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We deliver superior products with extremely responsive service to provide you with the best security systems”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_button”,”id”:”XePgh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-lg”,”position”:”center”,”animation”:false,”text”:”Request A Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”kkdJq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_XWFMG”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_slider”,”id”:”T9CFn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_content_box”,”id”:”DCLOX”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/accesscontrolsystems-jpg-e1551391315886.jpg|141|250|999955897″,”title”:”Access Control”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Manage access to your facility from anywhere with our convenient and flexible access control systems”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/access-control-systems\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”D5FCR”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Video-CCTV-systems-png-e1551391421833.png|141|250|999955901″,”title”:”Video Surveillance”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Detect and identify potential intruders to keep your property protected with our High Definition cameras and infrared night vision capabilities”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/video-surveillance\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”chcz7″,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Intruder-Systems-png-e1551391465130.png|141|250|999955900″,”title”:”Security Systems”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Arm and disarm your alarm system from anywhere and receive emails and text messages with system status updates”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/business-security-systems”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”mzYDo”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/HBS_FireSafety-jpg-e1551391504780.jpg|141|250|999955898″,”title”:”Fire Alarms”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Our advanced smoke and fire detection systems can help protect your property from damaging fires”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/services\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”c4LNP”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/integrated_security-jpg-e1551391446300.jpg|141|250|999955899″,”title”:”Specialized Services”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”We also provide security assessments, consulting, inspections, networking, and monitoring services”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/services\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}],”outer_arrows”:true,”vertical_middle_arrows”:false,”visible_arrows”:false,”nav_inner”:false,”png-over”:false,”trigger”:””,”data_options”:”minWidth:200,itemMargin:30″,”type”:”carousel”},{“component”:”hc_space”,”id”:”UaXMl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”X5mDs”,”css_classes”:”text-center text-l “,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Customer Satisfaction Guaranteed”,”tag”:”h2″},{“component”:”hc_space”,”id”:”6sVlY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_grid_list”,”id”:”ALbw8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”tab_index”:”1″,”images”:[],”content”:[{“component”:”hc_icon_box”,”id”:”baSfO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-shield”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”Satisfaction Guaranteed”,”subtitle”:”We guarantee your satisfaction. If you are not satisfied with your new systems, we will remove them and refund your investment.”},{“component”:”hc_icon_box”,”id”:”4pbMT”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-comments”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”24\/7\/365 Support”,”subtitle”:”With Verified Security, you are never alone. We provide Customer Service twenty-four hours a day, seven days a week, and 365 days a year.”},{“component”:”hc_icon_box”,”id”:”XJ1DN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-trophy”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”First-Class Technicians”,”subtitle”:”We are one of a select group of companies in the United States that are hand-picked members of Honeywell\u2019s Commercial Security certification program. This means that you get better trained technicians, more innovative products, and better support.”},{“component”:”hc_icon_box”,”id”:”gPoQh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-rocket”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”Future-Proof”,”subtitle”:”We \u201cfuture-proof\u201d your security so that you have the latest technologies to protect your business.  Our systems are all remotely-accessible and are all broadband-enabled.”}],”icon”:””,”column”:”col-md-6″,”mobile_column”:””,”row”:””,”margins”:””,”thumb_size”:”large”,”lightbox_size”:”large”,”gallery”:false,”lightbox_animation”:””,”hover_animation”:””,”icon_animation”:””,”icon_position”:””,”hide_icon”:true,”thumbnail”:false,”css”:””,”pagination”:false,”pag_items”:””,”pag_scroll_top”:false,”pag_animation”:””,”pag_size”:”pagination-sm”,”pag_centered”:false,”pag_hide_controls”:true,”pag_data_options”:””,”load_more”:false,”lm_items”:””,”lm_lazy”:false,”lm_button_text”:”Load more”,”lm_animation”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http:\/\/themes.framework-y.com\/demo-import\/signflow\/2018\/01\/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”section_kFsHV”:{“component”:”hc_section”,”id”:”section_kFsHV”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_Z1qEU”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”zkLYa”,”css_classes”:”text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Case Study”,”tag”:”h2″},{“component”:”hc_space”,”id”:”Snkal”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_zRj15″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”column_Fyg45″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”ZNPdO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]},{“component”:”hc_column”,”id”:”column_yUWkf”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”aBLoK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cloud Access Control Eases Company Management”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<p>1electric, a commercial facility electrical solutions provider in Atlanta, is no stranger when it comes to giving their customers personalized solutions for all of their building electronic system needs. With thousands of successful projects under their belt, 1electric is a trusted electrical company performing commercial electrical work such as servicing, maintaining and upgrading a building\u2019s electrical systems.&lt;\/p&gt;</p>
<p>When it came time for their own expansion \u2013 moving their operations to a new location, they turned to their security provider, Verified Security, for a smooth security system transition. In addition to an integrated security system, part of the wish list was to have enhanced, customized access control.&lt;\/p&gt;“},{“component”:”hc_button”,”id”:”mZvcE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Download Case Study”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/Honeywell-Maxpro-Cloud-Case-Study-1electric.pdf”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]}]},{“component”:”hc_column”,”id”:”column_dyj96″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”76C9q”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”sNsWd”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_grid_table”,”id”:”umdgI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_popover”,”id”:”JjYJR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”06Nu2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/zaxbys-logo.png|250|250|999955931″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Zaxby’s”,”text”:””},{“component”:”hc_popover”,”id”:”EBFil”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”jYeQh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/holliday-inn-logo.png|250|250|999955929″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Holliday Inn”,”text”:””},{“component”:”hc_popover”,”id”:”xk9QM”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”L4jJN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/performance-food-group-logo.png|250|250|999955930″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Performance Food Group”,”text”:””},{“component”:”hc_popover”,”id”:”DZDwk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”E4CrZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/davita-logo.png|250|250|999955932″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”DaVita”,”text”:””}],”rows”:”1″,”cols”:”4″,”full-border”:false,”no-borders”:true,”full-mobile”:false},{“component”:”hc_space”,”id”:”2GxWb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0r6hE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security has been serving the greater Atlanta area for over 14 years. We understand the importance of quality video surveillance systems, access control technology, fire alarms, and other commercial security needs. Our experts will guide you through our custom design process and help you to choose the proper security cameras, alarms, and locks to ensure that your company is monitored and protected. After we’ve built the optimal security solution for your business, our team will personally handle the entire installation process. Contact us today to learn why we’re the premier commercial security company in Atlanta GA.”},{“component”:”hc_space”,”id”:”OjjWN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””}]},{“component”:”hc_column”,”id”:”column_nTG6b”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http:\/\/themes.framework-y.com\/demo-import\/signflow\/2018\/01\/long-2-1024×614.jpg|1152|1920|41″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:{“flexslider”:”flexslider\/jquery.flexslider-min.js”,”lightbox”:”jquery.magnific-popup.min.js”,”toolstip”:”bootstrap\/js\/bootstrap.popover.min.js”},”css”:{“flexslider”:”scripts\/flexslider\/flexslider.css”,”lightbox”:”scripts\/magnific-popup.css”,”content_box”:”css\/content-box.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:”Home main”,”subtitle”:””,”title_content”:{“component”:”hc_title_empty”,”id”:”title-empty”}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_zydls”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”AkDuv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h1″},{“component”:”hc_title_tag”,”id”:”nx7T8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Advanced security systems to protect your business”,”tag”:”h3″},{“component”:”hc_text_block”,”id”:”quDQ3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”We deliver superior products with extremely responsive service to provide you with the best security systems”},{“component”:”hc_space”,”id”:”e8uPb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_button”,”id”:”XePgh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-lg”,”position”:”center”,”animation”:false,”text”:”Request A Quote”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/contact\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”kkdJq”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_XWFMG”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_slider”,”id”:”T9CFn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_content_box”,”id”:”DCLOX”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/accesscontrolsystems-jpg-e1551391315886.jpg|141|250|999955897″,”title”:”Access Control”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Manage access to your facility from anywhere with our convenient and flexible access control systems”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/access-control-systems\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”D5FCR”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Video-CCTV-systems-png-e1551391421833.png|141|250|999955901″,”title”:”Video Surveillance”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Detect and identify potential intruders to keep your property protected with our High Definition cameras and infrared night vision capabilities”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/video-surveillance\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”chcz7″,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/Intruder-Systems-png-e1551391465130.png|141|250|999955900″,”title”:”Security Systems”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Arm and disarm your alarm system from anywhere and receive emails and text messages with system status updates”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/business-security-systems”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”mzYDo”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/HBS_FireSafety-jpg-e1551391504780.jpg|141|250|999955898″,”title”:”Fire Alarms”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”Our advanced smoke and fire detection systems can help protect your property from damaging fires”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/services\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_content_box”,”id”:”c4LNP”,”css_classes”:”shadow “,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/02\/integrated_security-jpg-e1551391446300.jpg|141|250|999955899″,”title”:”Specialized Services”,”icon”:””,”icon_style”:””,”icon_image”:””,”box_style”:”top_icon_image”,”boxed”:false,”boxed_inverse”:true,”title_size”:””,”text_size”:””,”button_text”:””,”button_style”:”circle”,”button_dimensions”:””,”button_animation”:false,”extra_content”:””,”extra_content_2″:””,”text”:”We also provide security assessments, consulting, inspections, networking, and monitoring services”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”\/services\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}],”outer_arrows”:true,”vertical_middle_arrows”:false,”visible_arrows”:false,”nav_inner”:false,”png-over”:false,”trigger”:””,”data_options”:”minWidth:200,itemMargin:30″,”type”:”carousel”},{“component”:”hc_space”,”id”:”UaXMl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_title_tag”,”id”:”X5mDs”,”css_classes”:”text-center text-l “,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Customer Satisfaction Guaranteed”,”tag”:”h2″},{“component”:”hc_space”,”id”:”6sVlY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_grid_list”,”id”:”ALbw8″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”tab_index”:”1″,”images”:[],”content”:[{“component”:”hc_icon_box”,”id”:”baSfO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-shield”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”Satisfaction Guaranteed”,”subtitle”:”We guarantee your satisfaction. If you are not satisfied with your new systems, we will remove them and refund your investment.”},{“component”:”hc_icon_box”,”id”:”4pbMT”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-comments”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”24\/7\/365 Support”,”subtitle”:”With Verified Security, you are never alone. We provide Customer Service twenty-four hours a day, seven days a week, and 365 days a year.”},{“component”:”hc_icon_box”,”id”:”XJ1DN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-trophy”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”First-Class Technicians”,”subtitle”:”We are one of a select group of companies in the United States that are hand-picked members of Honeywell\u2019s Commercial Security certification program. This means that you get better trained technicians, more innovative products, and better support.”},{“component”:”hc_icon_box”,”id”:”gPoQh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:”fa fa-rocket”,”icon_style”:””,”icon_image”:””,”icon_position”:”left”,”icon_size”:”text-xl”,”title_size”:”text-m”,”text_size”:”-“,”title”:”Future-Proof”,”subtitle”:”We \u201cfuture-proof\u201d your security so that you have the latest technologies to protect your business. Our systems are all remotely-accessible and are all broadband-enabled.”}],”icon”:””,”column”:”col-md-6″,”mobile_column”:””,”row”:””,”margins”:””,”thumb_size”:”large”,”lightbox_size”:”large”,”gallery”:false,”lightbox_animation”:””,”hover_animation”:””,”icon_animation”:””,”icon_position”:””,”hide_icon”:true,”thumbnail”:false,”css”:””,”pagination”:false,”pag_items”:””,”pag_scroll_top”:false,”pag_animation”:””,”pag_size”:”pagination-sm”,”pag_centered”:false,”pag_hide_controls”:true,”pag_data_options”:””,”load_more”:false,”lm_items”:””,”lm_lazy”:false,”lm_button_text”:”Load more”,”lm_animation”:””}]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http:\/\/themes.framework-y.com\/demo-import\/signflow\/2018\/01\/long-1-786×1024.jpg|2500|1920|40″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”section_kFsHV”:{“component”:”hc_section”,”id”:”section_kFsHV”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_Z1qEU”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”zkLYa”,”css_classes”:”text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Case Study”,”tag”:”h2″},{“component”:”hc_space”,”id”:”Snkal”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_zRj15″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”vertical-row “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_column”,”id”:”column_Fyg45″,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_image”,”id”:”ZNPdO”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2019\/04\/1electric-case-study.png|||999955945″,”alt”:””,”thumb_size”:”large”}]},{“component”:”hc_column”,”id”:”column_yUWkf”,”column_width”:”col-md-6″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”aBLoK”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Cloud Access Control Eases Company Management”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”b0tft”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” 1electric, a commercial facility electrical solutions provider in Atlanta, is no stranger when it comes to giving their customers personalized solutions for all of their building electronic system needs. With thousands of successful projects under their belt, 1electric is a trusted electrical company performing commercial electrical work such as servicing, maintaining and upgrading a building\u2019s electrical systems. When it came time for their own expansion \u2013 moving their operations to a new location, they turned to their security provider, Verified Security, for a smooth security system transition. In addition to an integrated security system, part of the wish list was to have enhanced, customized access control.“},{“component”:”hc_button”,”id”:”mZvcE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:”btn-sm”,”position”:”left”,”animation”:false,”text”:”Download Case Study”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/Honeywell-Maxpro-Cloud-Case-Study-1electric.pdf”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}]}]},{“component”:”hc_column”,”id”:”column_dyj96″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]},{“component”:”hc_column”,”id”:”column_07Pni”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_space”,”id”:”76C9q”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_space”,”id”:”sNsWd”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””},{“component”:”hc_grid_table”,”id”:”umdgI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_popover”,”id”:”JjYJR”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”06Nu2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/zaxbys-logo.png|250|250|999955931″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Zaxby’s”,”text”:””},{“component”:”hc_popover”,”id”:”EBFil”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”jYeQh”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/holliday-inn-logo.png|250|250|999955929″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Holliday Inn”,”text”:””},{“component”:”hc_popover”,”id”:”xk9QM”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”L4jJN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/performance-food-group-logo.png|250|250|999955930″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”Performance Food Group”,”text”:””},{“component”:”hc_popover”,”id”:”DZDwk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:[{“component”:”hc_image”,”id”:”E4CrZ”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”image”:”http:\/\/new.verifiedsecurity.com\/wp-content\/uploads\/2018\/01\/davita-logo.png|250|250|999955932″,”alt”:””,”thumb_size”:”large”}],”type”:”toolstip”,”direction”:”top”,”trigger”:”hover”,”title”:”DaVita”,”text”:””}],”rows”:”1″,”cols”:”4″,”full-border”:false,”no-borders”:true,”full-mobile”:false},{“component”:”hc_space”,”id”:”2GxWb”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:””,”height”:””}]},{“component”:”hc_column”,”id”:”column_48pXB”,”column_width”:”col-md-10″,”animation”:”fade-in”,”animation_time”:””,”timeline_animation”:”false”,”timeline_delay”:””,”timeline_order”:””,”css_classes”:”col-center text-center “,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_title_tag”,”id”:”0r6hE”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”text”:”Commercial Security Systems Atlanta GA”,”tag”:”h4″},{“component”:”hc_text_block”,”id”:”VgJwG”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Verified Security has been serving the greater Atlanta area for over 14 years. We understand the importance of quality video surveillance systems, access control technology, fire alarms, and other commercial security needs. Our experts will guide you through our custom design process and help you to choose the proper security cameras, alarms, and locks to ensure that your company is monitored and protected. After we’ve built the optimal security solution for your business, our team will personally handle the entire installation process. Contact us today to learn why we’re the premier commercial security company in Atlanta GA.”},{“component”:”hc_space”,”id”:”OjjWN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”xs”,”height”:””}]},{“component”:”hc_column”,”id”:”column_nTG6b”,”column_width”:”col-md-8″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[]}],”section_settings”:{“component”:”hc_section_image”,”id”:”section-image”,”image”:”http:\/\/themes.framework-y.com\/demo-import\/signflow\/2018\/01\/long-2-1024×614.jpg|1152|1920|41″,”full_screen”:false,”full_screen_height”:””,”parallax”:false,”bleed”:””,”ken_burn”:””,”bg_pos”:”bg-top”,”overlay”:””}},”scripts”:{“flexslider”:”flexslider\/jquery.flexslider-min.js”,”lightbox”:”jquery.magnific-popup.min.js”,”toolstip”:”bootstrap\/js\/bootstrap.popover.min.js”},”css”:{“flexslider”:”scripts\/flexslider\/flexslider.css”,”lightbox”:”scripts\/magnific-popup.css”,”content_box”:”css\/content-box.css”},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2026-04-29T09:43:18-04:00</modified>
	</item>
	<item>
		<id>799</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/manage-your-security-from-the-cloud/</url>
		<title>Manage Your Security from the Cloud</title>
		<h1>Manage Your Security from the Cloud</h1>
		<summary>In a recent blog post, I outlined the reasons why using cloud services would provide benefits to our end users.  In this post, I will talk about some of the specific benefits provided by a cloud security service we provide, Maxpro Cloud. Maxpro Cloud is a hosted cloud-based platform that provides access control and video […]</summary>
		<content><![CDATA[<p>In a recent blog post, I outlined the reasons why using cloud services would provide benefits to our end users.  In this post, I will talk about some of the specific benefits provided by a cloud security service we provide, <a href="http://www.maxprocloud.com/">Maxpro Cloud</a>.</p>
<p><a href="http://www.maxprocloud.com/">Maxpro Cloud</a> is a hosted cloud-based platform that provides access control and video services.  Instead of using a traditional Windows-based software platform for managing your card access control system or your camera system, you can use <a href="http://www.maxprocloud.com/">Maxpro Cloud</a> to manage your system.</p>
<p>You may have already guessed one of the key benefits of using a service like <a href="http://www.maxprocloud.com/">Maxpro Cloud</a>—no software required.  When you are using a cloud-based service, there is no software to purchase (saves money!), no software to install and keep updated (saves money!), and no server to purchase and maintain for hosting the software (saves money!).</p>
<p>A second benefit of using a service like <a href="http://www.maxprocloud.com/">Maxpro Cloud</a> is that feature updates can be pushed down to end users more quickly and easily.  In the past, if you were using a Windows-based software package to manage your card access control system, you would need to pay for new software when it was released to get the latest features.  With <a href="http://www.maxprocloud.com/">Maxpro Cloud</a>, new features can be added without purchasing new software.</p>
<p>A third benefit of using a cloud-based service is that mobile applications can be added more easily.  As an example, a mobile app for managing access control functionality and camera functionality is included with <a href="http://www.maxprocloud.com/">Maxpro Cloud</a>.  Since the mobile app is communicating back to the cloud-based platform, no local network changes are needed to make it work.  Easy!</p>
<p>These are just some of the compelling reasons to try a cloud-based solution like <a href="http://www.maxprocloud.com/">Maxpro Cloud</a> to manage the physical security of your facility.  As always, if you have any questions, please email me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>Thank you,</p>
<p>Scott Hightower, <a href="https://verifiedsecurity.com">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>In a recent blog post, I outlined the reasons why using cloud services would provide benefits to our end users.  In this post, I will talk about some of the specific benefits provided by a cloud security service we provide, Maxpro Cloud. Maxpro Cloud is a hosted cloud-based platform that provides access control and video services.  Instead of using a traditional Windows-based software platform for managing your card access control system or your camera system, you can use Maxpro Cloud to manage your system. You may have already guessed one of the key benefits of using a service like Maxpro Cloud—no software required.  When you are using a cloud-based service, there is no software to purchase (saves money!), no software to install and keep updated (saves money!), and no server to purchase and maintain for hosting the software (saves money!). A second benefit of using a service like Maxpro Cloud is that feature updates can be pushed down to end users more quickly and easily.  In the past, if you were using a Windows-based software package to manage your card access control system, you would need to pay for new software when it was released to get the latest features.  With Maxpro Cloud, new features can be added without purchasing new software. A third benefit of using a cloud-based service is that mobile applications can be added more easily.  As an example, a mobile app for managing access control functionality and camera functionality is included with Maxpro Cloud.  Since the mobile app is communicating back to the cloud-based platform, no local network changes are needed to make it work.  Easy! These are just some of the compelling reasons to try a cloud-based solution like Maxpro Cloud to manage the physical security of your facility.  As always, if you have any questions, please email me at scotth@verifiedsecurity.com. Thank you, Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2021-04-06T16:05:58-04:00</modified>
	</item>
	<item>
		<id>787</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/why-we-like-the-cloud-for-security/</url>
		<title>Why We Like the Cloud for Security</title>
		<h1>Why We Like the Cloud for Security</h1>
		<summary>Everywhere we look, we hear about companies offering cloud-based technology services.  Quite simply, a cloud-based service (public cloud-based service) is one that doesn’t require a company to have software running on a server on the company’s premise. The cloud has come to the security industry too.  In fact, we have been offering cloud-based services for […]</summary>
		<content><![CDATA[<p>Everywhere we look, we hear about companies offering cloud-based technology services.  Quite simply, a cloud-based service (public cloud-based service) is one that doesn’t require a company to have software running on a server on the company’s premise.</p>
<p>The cloud has come to the security industry too.  In fact, we have been offering cloud-based services for years and the service offerings continue to grow.  There are several reasons we like cloud-based services:</p>
<ol>
<li><span style="text-decoration: underline;">Cloud-based services are built on a proven model.</span>  According to the <a href="http://www.rightscale.com/lp/2017-state-of-the-cloud-report" target="_blank" rel="noopener noreferrer">Rightscale 2017 State of the Cloud report</a>, 41% of companies surveyed are using public cloud services to handle their workloads.  The technology has been tested and proven and the model allows our customers to save money.</li>
<li><span style="text-decoration: underline;">Lower up-front investment required.</span>  Because there is no need to set up a server and purchase and install software, our customers are saving money when using cloud-based services.</li>
<li><span style="text-decoration: underline;">Platform allows for faster product evolution.</span>  In the past, our customers had to purchase the latest version of software in order to get the latest features.  With cloud-based security services, updates can be pushed out to all end users at once so changes can be made more quickly.  This ensures that our customers get the latest functionality faster.</li>
</ol>
<p>What are some of the cloud services that are available?  <a href="http://homesecurity.honeywell.com/mobile.html" target="_blank" rel="noopener noreferrer">Total Connect from Honeywell</a> is one that has been available for several years and allows control of your security system from a website or smartphone app.</p>
<p>Another service developed by Honeywell that we now offer is called <a href="http://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud</a>.  It allows for viewing your surveillance cameras remotely and for controlling your card access doors from a website or mobile app.  You can now bring mobile access to your video surveillance and card access control systems!</p>
<p>We will detail more features and benefits of these cloud-based services in future posts.  As always, let us know if you have any questions.  You can email us at <a href="mailto:info@verifiedsecurity.com">info@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>Everywhere we look, we hear about companies offering cloud-based technology services.  Quite simply, a cloud-based service (public cloud-based service) is one that doesn’t require a company to have software running on a server on the company’s premise. The cloud has come to the security industry too.  In fact, we have been offering cloud-based services for years and the service offerings continue to grow.  There are several reasons we like cloud-based services: Cloud-based services are built on a proven model.  According to the Rightscale 2017 State of the Cloud report, 41% of companies surveyed are using public cloud services to handle their workloads.  The technology has been tested and proven and the model allows our customers to save money. Lower up-front investment required.  Because there is no need to set up a server and purchase and install software, our customers are saving money when using cloud-based services. Platform allows for faster product evolution.  In the past, our customers had to purchase the latest version of software in order to get the latest features.  With cloud-based security services, updates can be pushed out to all end users at once so changes can be made more quickly.  This ensures that our customers get the latest functionality faster. What are some of the cloud services that are available?  Total Connect from Honeywell is one that has been available for several years and allows control of your security system from a website or smartphone app. Another service developed by Honeywell that we now offer is called Maxpro Cloud.  It allows for viewing your surveillance cameras remotely and for controlling your card access doors from a website or mobile app.  You can now bring mobile access to your video surveillance and card access control systems! We will detail more features and benefits of these cloud-based services in future posts.  As always, let us know if you have any questions.  You can email us at info@verifiedsecurity.com. -Scott Hightower, Verified Security</content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>760</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/smoke-and-mirrors/</url>
		<title>Smoke and Mirrors</title>
		<h1>Smoke and Mirrors</h1>
		<summary>Check out this article to see what a recent bank robbery suspect did to fool the police: That is pretty bold.  But, when thinking deeper about it, it is pretty bold to rob a bank.  I think this demonstrates what the bad guys are willing to do for money.  Don’t underestimate the crooks. Otherwise, we […]</summary>
		<content><![CDATA[<p>Check out <a title="Bank Robbery Article" href="https://gma.yahoo.com/hoax-911-call-diverts-cops-actual-bank-robbery-132520415--abc-news-topstories.html?vp=1" target="_blank" rel="noopener noreferrer">this article </a>to see what a recent bank robbery suspect did to fool the police:</p>
<p>That is pretty bold.  But, when thinking deeper about it, it is pretty bold to rob a bank.  I think this demonstrates what the bad guys are willing to do for money.  Don’t underestimate the crooks.</p>
<p>Otherwise, we wouldn’t need security systems in Atlanta…</p>
<p>-Scott Hightower, Verified Security</p>
]]></content>
		<content_plain>Check out this article to see what a recent bank robbery suspect did to fool the police: That is pretty bold.  But, when thinking deeper about it, it is pretty bold to rob a bank.  I think this demonstrates what the bad guys are willing to do for money.  Don’t underestimate the crooks. Otherwise, we wouldn’t need security systems in Atlanta… -Scott Hightower, Verified Security</content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>695</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/copper-thieves-strike-again-in-atlanta-area/</url>
		<title>Copper Thieves Strike Again in Atlanta Area</title>
		<h1>Copper Thieves Strike Again in Atlanta Area</h1>
		<summary>The copper thieves are at it again–striking this time at a church in Jonesboro (near Atlanta).  It always amazes me how often churches are the victims of crime but they seem to be easy targets.  In this case, copper wiring and copper pipes were ripped from the walls of this church.  Here is the link […]</summary>
		<content><![CDATA[<p>The copper thieves are at it again–striking this time at a church in Jonesboro (near Atlanta).  It always amazes me how often churches are the victims of crime but they seem to be easy targets.  In this case, copper wiring and copper pipes were ripped from the walls of this church.  Here is the link to the full article about the theft:</p>
<p><a href="https://www.ajc.com/news/crime--law/atlanta-church-gutted-burglars/dkH3r5sl338OEFbCRLtRHL/">http://www.ajc.com/news/news/local/police-se-atlanta-church-damaged-by-copper-thieves/nXpbk/</a></p>
<p>A theft like this is not only expensive but it is very disruptive because the removal of copper wiring and pipes leaves the building unusable until the repair work can be completed.</p>
<p>There is a better way.  Verified video security can provide notification of crimes in progress.  A security system with video verification sends video clips of the crime in progress to a monitoring center where an operator can provide more details about the crime to the police department.  With a crime in progress, the police will likely respond much more quickly before further damage can be done.</p>
<p>Send any questions to me at <a href="mailto:scotth@verifiedsecurity.com" target="_blank" rel="noopener noreferrer">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>The copper thieves are at it again–striking this time at a church in Jonesboro (near Atlanta).  It always amazes me how often churches are the victims of crime but they seem to be easy targets.  In this case, copper wiring and copper pipes were ripped from the walls of this church.  Here is the link to the full article about the theft: http://www.ajc.com/news/news/local/police-se-atlanta-church-damaged-by-copper-thieves/nXpbk/ A theft like this is not only expensive but it is very disruptive because the removal of copper wiring and pipes leaves the building unusable until the repair work can be completed. There is a better way.  Verified video security can provide notification of crimes in progress.  A security system with video verification sends video clips of the crime in progress to a monitoring center where an operator can provide more details about the crime to the police department.  With a crime in progress, the police will likely respond much more quickly before further damage can be done. Send any questions to me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2024-06-19T13:52:06-04:00</modified>
	</item>
	<item>
		<id>686</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/thieves-make-off-with-five-tons-of-nutella/</url>
		<title>Thieves Make Off with Five Tons of Nutella</title>
		<h1>Thieves Make Off with Five Tons of Nutella</h1>
		<summary>It seems that someone has nabbed five and a half tons of Nutella, the wonderful chocolate hazelnut spread that everyone should try in one’s lifetime.  The heist occurred in the German town of Bad Hersfeld after a trailer of the spread was left parked in the center of town.  The value of the Nutella was […]</summary>
		<content><![CDATA[<p>It seems that someone has nabbed five and a half tons of <a title="Nutella Website" href="http://www.nutellausa.com/" target="_blank" rel="noopener noreferrer">Nutella</a>, the wonderful chocolate hazelnut spread that everyone should try in one’s lifetime.  The heist occurred in the German town of Bad Hersfeld after a trailer of the spread was left parked in the center of town.  The value of the Nutella was reported to be approximately $20,000 U.S. dollars.</p>
<p>The strange part of the story is that a truck full of Red Bull was stolen a few weeks ago from the same area and a truck full of coffee worth approximately $50,000 U.S. dollars was also stolen at a different time within the last month from the same area.</p>
<p>To me, this area in Bad Hersfeld is screaming for video surveillance cameras for remote monitoring.  With cameras in place and live remote viewing and/or advanced notifications based on motion detection, there should be a way to nab these thieves.</p>
<p><img decoding="async" alt="" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcS1P61KuC8huXXuOb2XjYZfsHuTWnAcqS5Z8VTxsHy98yTczq6Yxg"></p>
<p>This is the link to the full article about the thefts:</p>
<p><a href="http://www.sunnewsnetwork.ca/sunnews/world/archives/2013/04/20130408-091109.html">http://www.sunnewsnetwork.ca/sunnews/world/archives/2013/04/20130408-091109.html</a></p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>It seems that someone has nabbed five and a half tons of Nutella, the wonderful chocolate hazelnut spread that everyone should try in one’s lifetime.  The heist occurred in the German town of Bad Hersfeld after a trailer of the spread was left parked in the center of town.  The value of the Nutella was reported to be approximately $20,000 U.S. dollars. The strange part of the story is that a truck full of Red Bull was stolen a few weeks ago from the same area and a truck full of coffee worth approximately $50,000 U.S. dollars was also stolen at a different time within the last month from the same area. To me, this area in Bad Hersfeld is screaming for video surveillance cameras for remote monitoring.  With cameras in place and live remote viewing and/or advanced notifications based on motion detection, there should be a way to nab these thieves. This is the link to the full article about the thefts: http://www.sunnewsnetwork.ca/sunnews/world/archives/2013/04/20130408-091109.html -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>679</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/access-control-with-video-integration/</url>
		<title>Access Control with Video Integration</title>
		<h1>Access Control with Video Integration</h1>
		<summary>One of the features of some access control systems that many users are not aware of is the ability to integrate a video surveillance system with the access control system. Access control systems are used to verify that a card or fob presented at a card reader is a valid card and is authorized for […]</summary>
		<content><![CDATA[<p>One of the features of some access control systems that many users are not aware of is the ability to integrate a video surveillance system with the access control system.</p>
<p>Access control systems are used to verify that a card or fob presented at a card reader is a valid card and is authorized for use to access that particular door at a particular time.  However, the access control system is unable to determine if the person using the card is the person authorized to enter or if the card has been borrowed or stolen.</p>
<p>This is where video integration can augment the functionality of an access control system.  With a video system integrated into an access control system, specific cameras located at card access doors can be linked to those specific card readers so that there is video evidence logged with each presentation of a card.  So, as an example, if there is an invalid card read, video can be searched directly from the access control software to see who attempted to present an invalid card.</p>
<p><img loading="lazy" decoding="async" style="margin-left: 10px; margin-right: 10px;" title="Honeywell Access with Video Integration" alt="Picture of Video Integration" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcTibRQlwdU3AWzZSSU8kANke36dnkYEnLzW1GW0CpMmO_COFsL-ng" width="275" height="183"></p>
<p>By linking an access control system and a video surveillance system, the process of searching video for specific access control events becomes much quicker and easier which saves you time and money.</p>
<p>As always, email me at <a href="mailto:scotth@verifiedsecurity.com" target="_blank" rel="noopener noreferrer">scotth@verifiedsecurity.com</a> with any questions.</p>
<p>-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>One of the features of some access control systems that many users are not aware of is the ability to integrate a video surveillance system with the access control system. Access control systems are used to verify that a card or fob presented at a card reader is a valid card and is authorized for use to access that particular door at a particular time.  However, the access control system is unable to determine if the person using the card is the person authorized to enter or if the card has been borrowed or stolen. This is where video integration can augment the functionality of an access control system.  With a video system integrated into an access control system, specific cameras located at card access doors can be linked to those specific card readers so that there is video evidence logged with each presentation of a card.  So, as an example, if there is an invalid card read, video can be searched directly from the access control software to see who attempted to present an invalid card. By linking an access control system and a video surveillance system, the process of searching video for specific access control events becomes much quicker and easier which saves you time and money. As always, email me at scotth@verifiedsecurity.com with any questions. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>672</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/smartphone-apps-for-your-security-system/</url>
		<title>Smartphone Apps for Your Security System</title>
		<h1>Smartphone Apps for Your Security System</h1>
		<summary>Lately, it seems that there has been an incredible proliferation of smartphones and tablet computers.  Everywhere I go, I see more and more people using them.  With my new Android phone in hand and my iPad by my side, I have found that the power contained in these mobile devices is pretty incredible and I am always […]</summary>
		<content><![CDATA[<p>Lately, it seems that there has been an incredible proliferation of smartphones and tablet computers.  Everywhere I go, I see more and more people using them.  With my new Android phone in hand and my iPad by my side, I have found that the power contained in these mobile devices is pretty incredible and I am always amazed to see all of the new apps that make my life easier or more enjoyable.</p>
<p>As you might imagine, there are mobile security apps that can be used to monitor and manage the security of your home or business.  <a title="Total Connect Website" href="http://www.mytotalconnect.com" target="_blank" rel="noopener noreferrer">Total Connect </a>from Honeywell is the one we use to arm and disarm our security systems and to get emailed status alerts.  Also, many new video camera surveillance systems come with apps to let you look at your live video while on the go.</p>
<p><img decoding="async" alt="" src="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcRnG4QbD6QiUqQo_Fq7n0a2xVHit7RujeR9iPuvPAFlpvZB7IdGHQ" name="kLKvs-ozUDuECM:" data-sz="f"></p>
<p>As these mobile devices become more ubiquitous, I fully expect that we will have the ability to control more and more devices and features in our connected homes and businesses.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Lately, it seems that there has been an incredible proliferation of smartphones and tablet computers.  Everywhere I go, I see more and more people using them.  With my new Android phone in hand and my iPad by my side, I have found that the power contained in these mobile devices is pretty incredible and I am always amazed to see all of the new apps that make my life easier or more enjoyable. As you might imagine, there are mobile security apps that can be used to monitor and manage the security of your home or business.  Total Connect from Honeywell is the one we use to arm and disarm our security systems and to get emailed status alerts.  Also, many new video camera surveillance systems come with apps to let you look at your live video while on the go. As these mobile devices become more ubiquitous, I fully expect that we will have the ability to control more and more devices and features in our connected homes and businesses. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>664</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/what-are-the-most-important-features-of-an-access-control-system/</url>
		<title>What Are the Most Important Features of an Access Control System?</title>
		<h1>What Are the Most Important Features of an Access Control System?</h1>
		<summary>If you are considering the installation of an access control system to protect your facility, you will find that there are many different types of systems available.  You will find everything from manual keypads that control regular locks all the way up to card readers connected to database-driven systems run from servers. So, what features are […]</summary>
		<content><![CDATA[<p>If you are considering the installation of an access control system to protect your facility, you will find that there are many different types of systems available.  You will find everything from manual keypads that control regular locks all the way up to card readers connected to database-driven systems run from servers.</p>
<p>So, what features are most important when considering a new system?  Here they are:</p>
<p><span style="text-decoration: underline;">Reporting and Audit Trail</span> – A true access control system will keep a log of card use and store it in a database for future reporting.  So, when you need to determine who was the last person to use a card at a particular door, you would have the ability to run a report that would show you.</p>
<p><span style="text-decoration: underline;">Flexibility</span> – You will want to use a system with flexible software.  With a flexible system, you can make changes to cardholder records and add and delete information fields as needed.</p>
<p><span style="text-decoration: underline;">Ease of Use</span> – We have seen some access control systems that are very difficult to use.  We recommend <a title="Honeywell Access Systems" href="http://www.honeywellaccess.com" target="_blank" rel="noopener noreferrer">Honeywell access systems</a> as we find them to be very easy to use yet powerful enough to handle just about every access control scenario.</p>
<p><span style="text-decoration: underline;">Scheduled Backups</span> – With whatever access software package you choose, you will want the ability to schedule backups of the access database.  We have seen many customers who failed to backup up their databases and then have to call us to rebuild them from scratch when their servers crash.</p>
<p><span style="text-decoration: underline;">Integration</span> – Some access control systems can be integrated with intrusion alarm systems and with video systems so that everything can be managed from one user interface (one software package).  This makes it easy to manage all three and reduces complexity.</p>
<p>If you are contemplating the purchase of an access control system, spend some time test driving the management software before you buy.  There is a lot of variety in what is available and you should make sure you are comfortable with the features before you finalize your purchase.</p>
<p>As always, email me at <a href="mailto:scotth@remote-protection">scotth@remote-protection</a> with any questions.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>If you are considering the installation of an access control system to protect your facility, you will find that there are many different types of systems available.  You will find everything from manual keypads that control regular locks all the way up to card readers connected to database-driven systems run from servers. So, what features are most important when considering a new system?  Here they are: Reporting and Audit Trail – A true access control system will keep a log of card use and store it in a database for future reporting.  So, when you need to determine who was the last person to use a card at a particular door, you would have the ability to run a report that would show you. Flexibility – You will want to use a system with flexible software.  With a flexible system, you can make changes to cardholder records and add and delete information fields as needed. Ease of Use – We have seen some access control systems that are very difficult to use.  We recommend Honeywell access systems as we find them to be very easy to use yet powerful enough to handle just about every access control scenario. Scheduled Backups – With whatever access software package you choose, you will want the ability to schedule backups of the access database.  We have seen many customers who failed to backup up their databases and then have to call us to rebuild them from scratch when their servers crash. Integration – Some access control systems can be integrated with intrusion alarm systems and with video systems so that everything can be managed from one user interface (one software package).  This makes it easy to manage all three and reduces complexity. If you are contemplating the purchase of an access control system, spend some time test driving the management software before you buy.  There is a lot of variety in what is available and you should make sure you are comfortable with the features before you finalize your purchase. As always, email me at scotth@remote-protection with any questions. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>658</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/notify-me/</url>
		<title>Notify Me!</title>
		<h1>Notify Me!</h1>
		<summary>We are quickly entering a world of smart devices that can stay in touch with us remotely.  This gives us the ability to monitor and manage our environment on a real-time basis.  Since many of us are now carrying small computers with us in the form of smartphones, the increased technological horsepower and always-on connectivity […]</summary>
		<content><![CDATA[<p>We are quickly entering a world of smart devices that can stay in touch with us remotely.  This gives us the ability to monitor and manage our environment on a real-time basis.  Since many of us are now carrying small computers with us in the form of smartphones, the increased technological horsepower and always-on connectivity has created an environment where we can always be aware of what is happening in our homes and businesses.</p>
<p>One great example of a service that embodies this new ability to monitor our environment remotely is <a title="Total Connect Page" href="http://www.mytotalconnect.com/" target="_blank" rel="noopener noreferrer">Total Connect</a>.  <a title="Total Connect Page" href="http://www.mytotalconnect.com/" target="_blank" rel="noopener noreferrer">Total Connect </a>is a service that was developed by Honeywell and installed by security companies that allows anyone to monitor and manage their security and other environmental systems from anywhere at any time.  With a web browser or app on a tablet or smartphone, you can monitor and manage a variety of sensors and controls.</p>
<p><img loading="lazy" decoding="async" style="margin-right: 20px; margin-left: 20px;" alt="" src="data:image/jpeg;base64,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" width="276" height="183" name="nO7sgWReLOs52M:" data-sz="f"></p>
<p>One of the great features I like about this service is that we can install a sensor on just about anything and then tie it to <a title="Total Connect Page" href="http://www.mytotalconnect.com/" target="_blank" rel="noopener noreferrer">Total Connect </a>so that you are notified with an email or text message if the status of that sensor changes.  So, do you want to know when a door is opened?  We can notify you.  Do you want to know when it is closed?  We can notify you.  Do you want to know when the temperature is below freezing inside your home or business?  We can notify you.</p>
<p>The possiblities are only limited by your imagination.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>We are quickly entering a world of smart devices that can stay in touch with us remotely.  This gives us the ability to monitor and manage our environment on a real-time basis.  Since many of us are now carrying small computers with us in the form of smartphones, the increased technological horsepower and always-on connectivity has created an environment where we can always be aware of what is happening in our homes and businesses. One great example of a service that embodies this new ability to monitor our environment remotely is Total Connect.  Total Connect is a service that was developed by Honeywell and installed by security companies that allows anyone to monitor and manage their security and other environmental systems from anywhere at any time.  With a web browser or app on a tablet or smartphone, you can monitor and manage a variety of sensors and controls. One of the great features I like about this service is that we can install a sensor on just about anything and then tie it to Total Connect so that you are notified with an email or text message if the status of that sensor changes.  So, do you want to know when a door is opened?  We can notify you.  Do you want to know when it is closed?  We can notify you.  Do you want to know when the temperature is below freezing inside your home or business?  We can notify you. The possiblities are only limited by your imagination. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>647</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/video-in-the-cloud/</url>
		<title>Video in the Cloud</title>
		<h1>Video in the Cloud</h1>
		<summary>Cloud has become quite the buzzword when it comes to applications.  Let’s do this in the cloud; let’s do that in the cloud.  There have been some real success stories when it comes to hosted applications which are those applications that reside in the cloud.  Salesforce.com is one that immediately comes to mind.  But, not […]</summary>
		<content><![CDATA[<p>Cloud has become quite the buzzword when it comes to applications.  Let’s do this in the cloud; let’s do that in the cloud.  There have been some real success stories when it comes to hosted applications which are those applications that reside in the cloud.  Salesforce.com is one that immediately comes to mind.  But, not all applications have been well-suited to a hosted model.  With the ongoing march of technological progress, that is now changing.</p>
<p>One of the technologies that has improved over time is broadband Internet access.  As the broadband providers have increased the throughput of their networks, more bandwidth has become available to facilitate the delivery of hosted applications.  While the bandwidth has been readily available for basic application access from hosted providers, more bandwidth-intensive applications have not always been supported by the available bandwidth.  I believe that video surveillance applications fall into the latter category.</p>
<p>But, all of that is changing for several reasons.  First, we are seeing the availability of more bandwidth as broadband networks evolve.  Internet Service Providers are pushing fiber optic transportation technology deeper into their networks which helps to provide more bandwidth.  Second, video is becoming more compact.  More efficient H.264 compression is now widely adopted and there is work underway on the next generation video compression technology which has been dubbed H.265.  Third, technology and application developers have created hybrid solutions to allow for some local storage of surveillance video while also delivering some clips and clip control functionality through hosted applications in the cloud.</p>
<p>One example of this is <a title="Honeywell Maxpro Cloud website" href="http://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">MAXPRO Cloud from Honeywell</a>.  With this solution, a local device sits at the local video surveillance site and stores some small amount of video while also acting as the gateway for the cloud storage solution.  The local gateway device along with the cloud storage take the place of a traditional Digital Video Recorder.</p>
<p><img decoding="async" alt="" src="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcSBnxd6Wntnu7_hRxGGS-MfIS_Q9fVcxlgQ9YEzfB35sckg4Lvt" name="iTUDeLd-t6KLkM:" data-src="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcSBnxd6Wntnu7_hRxGGS-MfIS_Q9fVcxlgQ9YEzfB35sckg4Lvt" data-sz="f"></p>
<p>In <a title="Security InfoWatch article about hosted video" href="http://www.securityinfowatch.com/article/10713214/success-story-hosted-video-a-recipe-for-success-at-jersey-mikes-franchise-locations" target="_blank" rel="noopener noreferrer">this recent article from Security InfoWatch</a>, an example is provided of a Jersey Mike’s franchisee who is using a hosted video surveillance solution.  The article provides a good overview of how it works and the benefits of using a cloud-based solution.</p>
<p>While larger, enterprise-class video surveillance system installations will not be good candidates for hosted video applications, smaller video installations will migrate more and more towards hosted platforms for their ease of use and anywhere, any-time access.</p>
<p>If you have any questions, please email me at <a href="mailto:scotth@verifiedsecurity.com" target="_blank" rel="noopener noreferrer">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Cloud has become quite the buzzword when it comes to applications.  Let’s do this in the cloud; let’s do that in the cloud.  There have been some real success stories when it comes to hosted applications which are those applications that reside in the cloud.  Salesforce.com is one that immediately comes to mind.  But, not all applications have been well-suited to a hosted model.  With the ongoing march of technological progress, that is now changing. One of the technologies that has improved over time is broadband Internet access.  As the broadband providers have increased the throughput of their networks, more bandwidth has become available to facilitate the delivery of hosted applications.  While the bandwidth has been readily available for basic application access from hosted providers, more bandwidth-intensive applications have not always been supported by the available bandwidth.  I believe that video surveillance applications fall into the latter category. But, all of that is changing for several reasons.  First, we are seeing the availability of more bandwidth as broadband networks evolve.  Internet Service Providers are pushing fiber optic transportation technology deeper into their networks which helps to provide more bandwidth.  Second, video is becoming more compact.  More efficient H.264 compression is now widely adopted and there is work underway on the next generation video compression technology which has been dubbed H.265.  Third, technology and application developers have created hybrid solutions to allow for some local storage of surveillance video while also delivering some clips and clip control functionality through hosted applications in the cloud. One example of this is MAXPRO Cloud from Honeywell.  With this solution, a local device sits at the local video surveillance site and stores some small amount of video while also acting as the gateway for the cloud storage solution.  The local gateway device along with the cloud storage take the place of a traditional Digital Video Recorder. In this recent article from Security InfoWatch, an example is provided of a Jersey Mike’s franchisee who is using a hosted video surveillance solution.  The article provides a good overview of how it works and the benefits of using a cloud-based solution. While larger, enterprise-class video surveillance system installations will not be good candidates for hosted video applications, smaller video installations will migrate more and more towards hosted platforms for their ease of use and anywhere, any-time access. If you have any questions, please email me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>640</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/are-your-doors-propped-open/</url>
		<title>Are Your Doors Propped Open?</title>
		<h1>Are Your Doors Propped Open?</h1>
		<summary>When it comes to deploying a card access control system, one of the main functions is to secure specific entrances and to only allow certain authorized users to enter.  One of the quickest ways to defeat the security provided by an access control system is for someone to prop a door open. So, what is […]</summary>
		<content><![CDATA[<p>When it comes to deploying a card access control system, one of the main functions is to secure specific entrances and to only allow certain authorized users to enter.  One of the quickest ways to defeat the security provided by an access control system is for someone to prop a door open.</p>
<p>So, what is the best way to keep your doors secured?</p>
<p><img decoding="async" alt="" src="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcQwJg7BCY8U6KQaRZlyK2bbNnLwSfc7J-WH8HT2_ybXBeUFUZh3" name="D74uRhlonJ2lDM:" data-sz="f"></p>
<p>The access control systems we deploy have built-in door prop alarm functionality.  The <a title="Honeywell Access Control Systems Website" href="http://www.honeywellaccess.com" target="_blank" rel="noopener noreferrer">Honeywell access control systems</a> we recommend will automatically sound an alarm after a set period of time when a door is propped open.  When we deploy door prop alarms as part of an access control system, we install a sounder above each access door and then program the system to sound the alarm if a door is held open for too long.</p>
<p>This is a simple addition to a system and it can really make a difference to the security of your facility.</p>
<p>Email me with your questions at <a title="Email address" href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>When it comes to deploying a card access control system, one of the main functions is to secure specific entrances and to only allow certain authorized users to enter.  One of the quickest ways to defeat the security provided by an access control system is for someone to prop a door open. So, what is the best way to keep your doors secured? The access control systems we deploy have built-in door prop alarm functionality.  The Honeywell access control systems we recommend will automatically sound an alarm after a set period of time when a door is propped open.  When we deploy door prop alarms as part of an access control system, we install a sounder above each access door and then program the system to sound the alarm if a door is held open for too long. This is a simple addition to a system and it can really make a difference to the security of your facility. Email me with your questions at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>634</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/new-honeywell-case-study-about-managed-access-control/</url>
		<title>New Honeywell Case Study About Managed Access Control</title>
		<h1>New Honeywell Case Study About Managed Access Control</h1>
		<summary>One of the projects we really enjoyed working on in 2012 was the deployment of a managed access control system for Internap, a global information technology solutions company based in Atlanta.  With managed access control, we administer the system for our customers.  So, in this case, we manage the system for Internap which makes it […]</summary>
		<content><![CDATA[<p>One of the projects we really enjoyed working on in 2012 was the deployment of a managed access control system for Internap, a global information technology solutions company based in Atlanta.  With managed access control, we administer the system for our customers.  So, in this case, we manage the system for Internap which makes it easy for them.</p>
<p>With us managing the access control system, we add, change, and delete cardholder and access card records.  We also make any changes to time zones, door schedules and other parameters.  We run the reports and we make sure the database is regularly backed up.  So, our managed access service really does make it easy for our customers to have an access control system.</p>
<p>Recently, Honeywell wrote a case study about our project with Internap.  The case study can be accessed by clicking on <a title="Honeywell Case Study on Internap access control project" href="http://www.honeywellsystems.com/documents/L_ITNPCS_D.pdf" target="_blank" rel="noopener noreferrer">this link</a>.  In addition to the case study, we were also recently <a title="Honewyell Blog Post" href="http://blogs.honeywellsecurity.com/2013/01/internap/" target="_blank" rel="noopener noreferrer">featured on Honeywell’s security blog</a>.</p>
<p>As always, email me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a> with any questions.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>One of the projects we really enjoyed working on in 2012 was the deployment of a managed access control system for Internap, a global information technology solutions company based in Atlanta.  With managed access control, we administer the system for our customers.  So, in this case, we manage the system for Internap which makes it easy for them. With us managing the access control system, we add, change, and delete cardholder and access card records.  We also make any changes to time zones, door schedules and other parameters.  We run the reports and we make sure the database is regularly backed up.  So, our managed access service really does make it easy for our customers to have an access control system. Recently, Honeywell wrote a case study about our project with Internap.  The case study can be accessed by clicking on this link.  In addition to the case study, we were also recently featured on Honeywell’s security blog. As always, email me at scotth@verifiedsecurity.com with any questions. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>623</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/pictures-of-suspect-in-rash-of-car-burglaries/</url>
		<title>Pictures of Suspect in Rash of Car Burglaries</title>
		<h1>Pictures of Suspect in Rash of Car Burglaries</h1>
		<summary>The bad guys are at it again.  This time, there has been a rash of car burglaries in Gwinnett County.  The police are saying that they have linked 21 burglaries to one person and they are now trying to find him.  This is the link to the article with more details: The Gwinnett County Post […]</summary>
		<content><![CDATA[<p>The bad guys are at it again.  This time, there has been a rash of car burglaries in Gwinnett County.  The police are saying that they have linked 21 burglaries to one person and they are now trying to find him.  This is the link to the article with more details:</p>
<p>The <a title="Link to Gwinnett County Post article" href="http://www.gwinnettdailypost.com/news/2013/jan/29/police-seek-suspect-in-21-car-break-ins/" target="_blank" rel="noopener noreferrer">Gwinnett County Post posted a picture </a>of the suspect that was provided by the police.</p>
<p>One thing to note is that this appears to be a picture taken at a Target store (can’t be certain but it looks like Target).  Over the last few years, Target has upgraded their video surveillance capabilities and their investment is paying off as the pictures from those video surveillance systems are providing valuable evidence that can be used by police.</p>
<p>With the arrival of less expensive megapixel video options, high-quality video surveillance systems are becoming much more affordable.  And, they are much more effective.</p>
<p>Email me with any questions at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower</p>
<p> </p>
]]></content>
		<content_plain>The bad guys are at it again.  This time, there has been a rash of car burglaries in Gwinnett County.  The police are saying that they have linked 21 burglaries to one person and they are now trying to find him.  This is the link to the article with more details: The Gwinnett County Post posted a picture of the suspect that was provided by the police. One thing to note is that this appears to be a picture taken at a Target store (can’t be certain but it looks like Target).  Over the last few years, Target has upgraded their video surveillance capabilities and their investment is paying off as the pictures from those video surveillance systems are providing valuable evidence that can be used by police. With the arrival of less expensive megapixel video options, high-quality video surveillance systems are becoming much more affordable.  And, they are much more effective. Email me with any questions at scotth@verifiedsecurity.com. -Scott Hightower  </content_plain>
		<image></image>
		<modified>2021-06-03T16:30:33-04:00</modified>
	</item>
	<item>
		<id>616</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/the-future-of-crime/</url>
		<title>The Future of Crime</title>
		<h1>The Future of Crime</h1>
		<summary>Today is the first Monday of the new year.  As I think about what this year will bring, I try to find opportunities to challenge my current thinking and assumptions.  I came across a TED video that I thought was interesting as it provides a different perspective on the future of crime. If you are […]</summary>
		<content><![CDATA[<p>Today is the first Monday of the new year.  As I think about what this year will bring, I try to find opportunities to challenge my current thinking and assumptions.  I came across a TED video that I thought was interesting as it provides a different perspective on the future of crime.</p>
<p>If you are not familiar with TED, it is an organization that began with a conference in 1984.  TED stands for Technology, Engineering, and Design but is better known by the current moniker of TED.  As they state on their <a title="About TED" href="http://www.ted.com/pages/about" target="_blank" rel="noopener noreferrer">web page about the organization</a>, TED is devoted to “Ideas Worth Spreading.”  They have put many videos from their conferences up on their website and they are always interesting and inspirational.</p>
<p>The TED video I saw most recently featured Marc Goodman who heads an organization called <a title="Future Crimes Website" href="http://www.futurecrimes.com/" target="_blank" rel="noopener noreferrer">Future Crimes</a>.  In <a title="Marc Goodman TED Talk" href="http://www.ted.com/talks/marc_goodman_a_vision_of_crimes_in_the_future.html" target="_blank" rel="noopener noreferrer">his video</a>, he talks about the impact the Internet and our continued move towards openness will have on crime in the future.  It is interesting, thought-provoking, and worth a watch.</p>
<p>As always, email me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a> if you have any questions.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Today is the first Monday of the new year.  As I think about what this year will bring, I try to find opportunities to challenge my current thinking and assumptions.  I came across a TED video that I thought was interesting as it provides a different perspective on the future of crime. If you are not familiar with TED, it is an organization that began with a conference in 1984.  TED stands for Technology, Engineering, and Design but is better known by the current moniker of TED.  As they state on their web page about the organization, TED is devoted to “Ideas Worth Spreading.”  They have put many videos from their conferences up on their website and they are always interesting and inspirational. The TED video I saw most recently featured Marc Goodman who heads an organization called Future Crimes.  In his video, he talks about the impact the Internet and our continued move towards openness will have on crime in the future.  It is interesting, thought-provoking, and worth a watch. As always, email me at scotth@verifiedsecurity.com if you have any questions. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>604</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/control-your-thermostat-from-anywhere/</url>
		<title>Control Your Thermostat from Anywhere</title>
		<h1>Control Your Thermostat from Anywhere</h1>
		<summary>The last few mornings have been a bit chilly here in metro Atlanta.  This got me thinking about the great flexibility we have with the security and automation products that are now available to us. Did you know that there are thermostats that can be managed remotely over the Internet with services like Total Connect?  […]</summary>
		<content><![CDATA[<p>The last few mornings have been a bit chilly here in metro Atlanta.  This got me thinking about the great flexibility we have with the security and automation products that are now available to us.</p>
<p>Did you know that there are thermostats that can be managed remotely over the Internet with services like <a title="Honeywell Total Connect" href="http://mytotalconnect.com" target="_blank" rel="noopener noreferrer">Total Connect</a>?  So, with an Internet connection, you can now adjust your thermostat from anywhere at any time.  Wouldn’t it be nice to bump up the heat if you are planning to arrive at home a little earlier than you had originally planned?</p>
<p><span style="text-decoration: underline;"><img loading="lazy" decoding="async" title="Honeywell Thermostat" alt="Honeywell Thermostat" src="/wp-content/uploads/HW-Z-Wave-Thermostat.jpg" width="260" height="194"></span></p>
<p>With the technology available today, we are only limited by imagination when it comes to automating and managing the security and comfort of your home or business.</p>
<p>If you have any questions, email me at <a title="Scott Hightower's Email Address" href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>The last few mornings have been a bit chilly here in metro Atlanta.  This got me thinking about the great flexibility we have with the security and automation products that are now available to us. Did you know that there are thermostats that can be managed remotely over the Internet with services like Total Connect?  So, with an Internet connection, you can now adjust your thermostat from anywhere at any time.  Wouldn’t it be nice to bump up the heat if you are planning to arrive at home a little earlier than you had originally planned? With the technology available today, we are only limited by imagination when it comes to automating and managing the security and comfort of your home or business. If you have any questions, email me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:37-04:00</modified>
	</item>
	<item>
		<id>599</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/take-care-of-your-security-systems/</url>
		<title>Take Care of Your Security Systems</title>
		<h1>Take Care of Your Security Systems</h1>
		<summary>Welcome to 2013!  Since we have entered a new year, it is a good time to evaluate your plans for maintaining your security systems.  As with any electronic systems, security systems need care and attention to stay in good working order.  Here are some questions you should answer as you think about your systems: When […]</summary>
		<content><![CDATA[<p>Welcome to 2013!  Since we have entered a new year, it is a good time to evaluate your plans for maintaining your security systems.  As with any electronic systems, security systems need care and attention to stay in good working order.  Here are some questions you should answer as you think about your systems:</p>
<p>When was the last time you checked and replaced the back-up batteries in your burglar alarm system, fire alarm system, or access control system?  Batteries should be tested at least once a year to ensure that they are in good working condition.</p>
<p>Have you checked your Digital Video Recorder or Network Video Recorder recently to ensure that video is recording properly and that all of your cameras are working properly?  This type of testing should be done weekly.</p>
<p>Have you updated the holiday schedule in your access control system for the new year?</p>
<p>Have you backed up your access control system database recently?  Depending on the number of changes you make, this should be done weekly or monthly.</p>
<p>Checking and testing your systems regularly will extend the lives of those systems.  Now that we are in a new year, it is time to set up a program to take care of your security systems.</p>
<p>If you have any questions, email me at <a title="Scott Hightower Email Address" href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Welcome to 2013!  Since we have entered a new year, it is a good time to evaluate your plans for maintaining your security systems.  As with any electronic systems, security systems need care and attention to stay in good working order.  Here are some questions you should answer as you think about your systems: When was the last time you checked and replaced the back-up batteries in your burglar alarm system, fire alarm system, or access control system?  Batteries should be tested at least once a year to ensure that they are in good working condition. Have you checked your Digital Video Recorder or Network Video Recorder recently to ensure that video is recording properly and that all of your cameras are working properly?  This type of testing should be done weekly. Have you updated the holiday schedule in your access control system for the new year? Have you backed up your access control system database recently?  Depending on the number of changes you make, this should be done weekly or monthly. Checking and testing your systems regularly will extend the lives of those systems.  Now that we are in a new year, it is time to set up a program to take care of your security systems. If you have any questions, email me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>589</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/monitoring-for-more-than-security/</url>
		<title>Monitoring For More Than Security</title>
		<h1>Monitoring For More Than Security</h1>
		<summary>When most people think of security system monitoring, they think of monitoring of door and window sensors and motion detectors for intrusion detection.  But, monitoring can be used for so much more. There are a variety of sensors available to monitor different types of environmental conditions.  There are water sensors, temperature sensors, humidity sensors, heat […]</summary>
		<content><![CDATA[<p>When most people think of security system monitoring, they think of monitoring of door and window sensors and motion detectors for intrusion detection.  But, monitoring can be used for so much more.</p>
<p>There are a variety of sensors available to monitor different types of environmental conditions.  There are water sensors, temperature sensors, humidity sensors, heat detectors, and more.  All of these sensors can be connected to an existing security system to monitor for changes in environmental conditions.  Or, they can be used as part of a stand-alone system to monitor only for changes in a home or business environment.</p>
<img loading="lazy" decoding="async" aria-describedby="caption-attachment-590" alt="Picture of Temperature Sensor" src="/wp-content/uploads/t-1000_pr.jpg" width="131" height="131"><p id="caption-attachment-590">Temperature Sensor</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p>Do you worry about pipes bursting while you are traveling for the holidays?  How about that hot water heater?  How old is it?  I have had a water pipe rupture in my house and fortunately, I was home at the time.  This can easily happen in a home or business can can cause plenty of damage if not fixed quickly.</p>
<p>By adding environmental sensors to your security system and then using Total Connect to generate email alerts, you can be notified if the temperature rises, if a water sensor detects water, or if the humidity increases above a preset level.</p>
<p>So, with a combination of monitoring sensors and various types of notification available, you never have to face unhappy surprises again.</p>
<p>If you have any questions, email me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>When most people think of security system monitoring, they think of monitoring of door and window sensors and motion detectors for intrusion detection.  But, monitoring can be used for so much more. There are a variety of sensors available to monitor different types of environmental conditions.  There are water sensors, temperature sensors, humidity sensors, heat detectors, and more.  All of these sensors can be connected to an existing security system to monitor for changes in environmental conditions.  Or, they can be used as part of a stand-alone system to monitor only for changes in a home or business environment. Temperature Sensor           Do you worry about pipes bursting while you are traveling for the holidays?  How about that hot water heater?  How old is it?  I have had a water pipe rupture in my house and fortunately, I was home at the time.  This can easily happen in a home or business can can cause plenty of damage if not fixed quickly. By adding environmental sensors to your security system and then using Total Connect to generate email alerts, you can be notified if the temperature rises, if a water sensor detects water, or if the humidity increases above a preset level. So, with a combination of monitoring sensors and various types of notification available, you never have to face unhappy surprises again. If you have any questions, email me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>583</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/9-billion-dollars-lost-to-return-fraud-every-year/</url>
		<title>9 Billion Dollars Lost to Return Fraud Every Year</title>
		<h1>9 Billion Dollars Lost to Return Fraud Every Year</h1>
		<summary>Wow, the National Retail Federation reported that 9 billion dollars are lost to return fraud every year by retailers.  What is return fraud?  According to a recent article in the online version of USA Today, return fraud is defined as “a crime where people exchange stolen goods for cash, use counterfeit receipts or bring back […]</summary>
		<content><![CDATA[<p>Wow, <a title="National Retail Federation Report" href="http://www.nrf.com/modules.php?name=News&amp;op=viewlive&amp;sp_id=1472" target="_blank" rel="noopener noreferrer">the National Retail Federation reported</a> that 9 billion dollars are lost to return fraud every year by retailers.  What is return fraud?  According to a <a title="USA Today Article about Return Fraud" href="http://www.usatoday.com/story/money/business/2012/12/11/holiday-shoplifting-return-fraud/1761351/" target="_blank" rel="noopener noreferrer">recent article in the online version of USA Today</a>, return fraud is defined as “a crime where people exchange stolen goods for cash, use counterfeit receipts or bring back items that have already been worn or used.”</p>
<p>That is a lot of money to lose and it explains why retailers are concerned about their return policies.</p>
<p>Some of the fraud is perpetrated by customers and some by employees.  Documenting these crimes for prosecution is the role of a good video security system.  Cameras at point-of-sale registers can capture return fraud crimes in action and the video can be used in the prosecution of the perpetrators.</p>
<p>The key to using the video surveillance system to capture the evidence is to use the correct cameras with the right lenses and to have them focused on the view needed to maximize the capture of the evidence.  As an example, a camera looking out over the store from behind the register clerk will not capture the evidence needed in a return fraud case involving the use of counterfeit store receipts.</p>
<p>Criminals are early adopters of technology so this type of fraud will continue.  The correct application of security technology can help catch these criminals in action.</p>
<p>Email me at <a href="mailto:scotth@remote-protection">scotth@remote-protection</a> if you have any questions or feedback.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Wow, the National Retail Federation reported that 9 billion dollars are lost to return fraud every year by retailers.  What is return fraud?  According to a recent article in the online version of USA Today, return fraud is defined as “a crime where people exchange stolen goods for cash, use counterfeit receipts or bring back items that have already been worn or used.” That is a lot of money to lose and it explains why retailers are concerned about their return policies. Some of the fraud is perpetrated by customers and some by employees.  Documenting these crimes for prosecution is the role of a good video security system.  Cameras at point-of-sale registers can capture return fraud crimes in action and the video can be used in the prosecution of the perpetrators. The key to using the video surveillance system to capture the evidence is to use the correct cameras with the right lenses and to have them focused on the view needed to maximize the capture of the evidence.  As an example, a camera looking out over the store from behind the register clerk will not capture the evidence needed in a return fraud case involving the use of counterfeit store receipts. Criminals are early adopters of technology so this type of fraud will continue.  The correct application of security technology can help catch these criminals in action. Email me at scotth@remote-protection if you have any questions or feedback. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2021-04-06T16:08:28-04:00</modified>
	</item>
	<item>
		<id>580</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/more-than-a-card-reader/</url>
		<title>More Than a Card Reader</title>
		<h1>More Than a Card Reader</h1>
		<summary>For many of you who use access control systems to manage the traffic coming and going to your facility, you may think of your system as a group of card readers.  When cardholders arrive at the office, they present their cards to the readers and are granted access to your building. But, access control systems can […]</summary>
		<content><![CDATA[<p>For many of you who use access control systems to manage the traffic coming and going to your facility, you may think of your system as a group of card readers.  When cardholders arrive at the office, they present their cards to the readers and are granted access to your building.</p>
<p>But, access control systems can be so much more than a set of card readers.  For example, video can be integrated into your access control system to supplement the standard reporting of your system.  Would it be useful to have cameras near your card readers so that you could review recorded video if someone attempted to make an unauthorized entrance?  Or, would you ever want to take a peek at a video clip if your access control reports showed that some of your cardholders were accessing the building at unusual hours of the day?</p>
<p>With video integration, camera views can be linked to card readers so that video clips can be retrieved based on access control events.  These events might involve valid cards used or they might involve attempts to use invalid cards.  Video verification of access control events can give you the true picture of what is happening at your facility.</p>
<p>If you have any questions, please email me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>For many of you who use access control systems to manage the traffic coming and going to your facility, you may think of your system as a group of card readers.  When cardholders arrive at the office, they present their cards to the readers and are granted access to your building. But, access control systems can be so much more than a set of card readers.  For example, video can be integrated into your access control system to supplement the standard reporting of your system.  Would it be useful to have cameras near your card readers so that you could review recorded video if someone attempted to make an unauthorized entrance?  Or, would you ever want to take a peek at a video clip if your access control reports showed that some of your cardholders were accessing the building at unusual hours of the day? With video integration, camera views can be linked to card readers so that video clips can be retrieved based on access control events.  These events might involve valid cards used or they might involve attempts to use invalid cards.  Video verification of access control events can give you the true picture of what is happening at your facility. If you have any questions, please email me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>573</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/unlock-doors-with-a-smartphone/</url>
		<title>Unlock Doors with a Smartphone?</title>
		<h1>Unlock Doors with a Smartphone?</h1>
		<summary>There is a new technology that is slowly making its way into the world of traditional door access control.  The technology is called Near Field Communication or NFC.  Some newer smartphones are built with NFC chips inside of them which will allow those phones to control devices just by holding the phone near a NFC reader. […]</summary>
		<content><![CDATA[<p>There is a new technology that is slowly making its way into the world of traditional door access control.  The technology is called <a title="Wikipedia Entry on Near Field Communication" href="http://en.wikipedia.org/wiki/Near_field_communication" target="_blank" rel="noopener noreferrer">Near Field Communication or NFC</a>.  Some newer smartphones are built with NFC chips inside of them which will allow those phones to control devices just by holding the phone near a NFC reader.</p>
<p>You may have read about this technology as there have been some news articles about <a title="Google's Website" href="http://www.google.com" target="_blank" rel="noopener noreferrer">Google’s</a> efforts to use NFC technology to enable mobile payments as part of their Google Wallet strategy.</p>
<p><img loading="lazy" decoding="async" style="margin: 1px 5px; border: 0px currentColor;" title="NFC Access" src="http://www2.pcmag.com/media/images/319542-google-wallet.jpg?thumb=y" alt="Google Wallet" width="174" height="158" border="0"><a title="Article about NFC Payments" href="http://www.pcmag.com/article2/0,2817,2411219,00.asp" target="_blank" rel="noopener noreferrer">In this article from October 20th, 2012</a>, Google states that early adopters are beginning to use NFC payment technology but that widespread adoption is still three to five years away.  As with any new technology, NFC use will continue to grow and will eventually be widely available.</p>
<p>So, what does this have to do with access control?  There are companies in the security industry that are conducting trials of using smartphones with embedded NFC technology to act as credentials in order to open access-controlled doors.  So, instead of having to carry around an access card or keyfob, you would just put your NFC-enabled smartphone up against a NFC reader to release the door.  Much easier!</p>
<p><a title="HID Global Security Website" href="http://www.hidglobal.com/" target="_blank" rel="noopener noreferrer">HID</a>, a leading provider of access control readers and credentials, has been conducting a trial of using NFC-enabled smartphones as access control credentials with two companies in Silicon Valley, <a title="Netflix Website" href="http://www.netflix.com" target="_blank" rel="noopener noreferrer">Netflix</a> and <a title="Good Technology Website" href="http://www1.good.com/" target="_blank" rel="noopener noreferrer">Good Technology</a>.  A <a title="NFC World Article about NFC Access Trials" href="http://www.nfcworld.com/2012/10/03/318206/hid-global-reports-on-silicon-valley-nfc-access-control-pilots/" target="_blank" rel="noopener noreferrer">recent article about the technology trials</a> at Good Technology stated that “more than 80% of respondents felt the smartphone was more convenient to use than their current access card, primarily because they never forget their phones like they do their badges. All Good Technology respondents said they liked the look of the door unlock application on their phones, and said it was intuitive and easy to use.”</p>
<p>There were a number of other statistics from the article that demonstrated the enthusiasm that the trial participants had for using this new technology to grant passage through access control doors.  With positive results like these and the proliferation of smartphones with embedded NFC technology, it will only be a matter of time before we see widespread use of smartphones for access control credentials.</p>
<p>Soon, you too will be able to unlock a door with a smartphone!</p>
<p>If you have questions about how NFC technology works, let me know.  You can reach me at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>There is a new technology that is slowly making its way into the world of traditional door access control.  The technology is called Near Field Communication or NFC.  Some newer smartphones are built with NFC chips inside of them which will allow those phones to control devices just by holding the phone near a NFC reader. You may have read about this technology as there have been some news articles about Google’s efforts to use NFC technology to enable mobile payments as part of their Google Wallet strategy. In this article from October 20th, 2012, Google states that early adopters are beginning to use NFC payment technology but that widespread adoption is still three to five years away.  As with any new technology, NFC use will continue to grow and will eventually be widely available. So, what does this have to do with access control?  There are companies in the security industry that are conducting trials of using smartphones with embedded NFC technology to act as credentials in order to open access-controlled doors.  So, instead of having to carry around an access card or keyfob, you would just put your NFC-enabled smartphone up against a NFC reader to release the door.  Much easier! HID, a leading provider of access control readers and credentials, has been conducting a trial of using NFC-enabled smartphones as access control credentials with two companies in Silicon Valley, Netflix and Good Technology.  A recent article about the technology trials at Good Technology stated that “more than 80% of respondents felt the smartphone was more convenient to use than their current access card, primarily because they never forget their phones like they do their badges. All Good Technology respondents said they liked the look of the door unlock application on their phones, and said it was intuitive and easy to use.” There were a number of other statistics from the article that demonstrated the enthusiasm that the trial participants had for using this new technology to grant passage through access control doors.  With positive results like these and the proliferation of smartphones with embedded NFC technology, it will only be a matter of time before we see widespread use of smartphones for access control credentials. Soon, you too will be able to unlock a door with a smartphone! If you have questions about how NFC technology works, let me know.  You can reach me at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>565</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/access-control-without-software/</url>
		<title>Access Control Without Software</title>
		<h1>Access Control Without Software</h1>
		<summary>As I discussed in this previous blog post, there are easier ways to manage your card access control system.  In that previous post, I discussed an option for managing your access control system with just a web browser instead of having to use a Windows-based software package for the management of your system. In this post, […]</summary>
		<content><![CDATA[<p>As I discussed in <a title="Easier Access Control Blog Post" href="/?p=503" target="_blank" rel="noopener noreferrer">this previous blog post</a>, there are easier ways to manage your card access control system.  In that previous post, I discussed an option for managing your access control system with just a web browser instead of having to use a Windows-based software package for the management of your system.</p>
<p>In this post, I want to share with you another option for operating your access control system.  Managed or hosted access control platforms are now available which allow you to outsource the management of your access control system.  With a managed or hosted access control system, the door control hardware still resides inside your facility but any changes are made by a third-party company like ours that hosts and manages the access control software for a monthly fee.</p>
<p>So, what are the advantages of going with a managed access control solution?  The biggest advantage of this approach is that you no longer have to learn how to use access control software because someone else is doing it for you.  If you don’t use access control software every day (which is a likely scenario), you can easily forget how to perform certain functions.  For example, a holiday group is usually updated once a year.  Will you remember how to make the changes to your holiday group when the time comes?  Also, when you need a specific report from your access control system, do you know how to get it?  If you have an access control expert managing your access control system for you, getting that report is as easy as making a phone call or sending an email.</p>
<p>The second advantage to going with a managed access solution is that you no longer have to manage the server that contains the access software.  So, you don’t have to back up the server, you don’t have to install Windows updates to the server, and you don’t have to worry about viruses and other malware infecting the server when you no longer have to manage it.  We have customers that have had their access control server crash without a current backup file and they had to spend a lot of money to rebuild the server and completely re-program it.  With a managed access control solution, the third-party company that hosts your access database takes care of the server so you don’t have to worry about it.</p>
<p>The third advantage of a managed access control solution is that you automatically get new features when they are available.  So, a managed access control system is essentially a <a title="Wikipedia Cloud Computer Entry" href="http://en.wikipedia.org/wiki/Cloud_computing" target="_blank" rel="noopener noreferrer">cloud-based solution </a>so that you don’t have to pay for new software to get the latest software upgrades.  The third-party company that manages your access control platform would update the management software when a new version is available so that new features automatically become available.</p>
<p>So, as you can see, there are some great benefits to having someone else host and manage your access control system.  It is a worry-free way to make sure you are maximizing the use of your system and getting the performance you need.</p>
<p>Feel free to email me with any questions at <a href="mailto:scotth@verifiedsecurity.com">scotth@verifiedsecurity.com</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>As I discussed in this previous blog post, there are easier ways to manage your card access control system.  In that previous post, I discussed an option for managing your access control system with just a web browser instead of having to use a Windows-based software package for the management of your system. In this post, I want to share with you another option for operating your access control system.  Managed or hosted access control platforms are now available which allow you to outsource the management of your access control system.  With a managed or hosted access control system, the door control hardware still resides inside your facility but any changes are made by a third-party company like ours that hosts and manages the access control software for a monthly fee. So, what are the advantages of going with a managed access control solution?  The biggest advantage of this approach is that you no longer have to learn how to use access control software because someone else is doing it for you.  If you don’t use access control software every day (which is a likely scenario), you can easily forget how to perform certain functions.  For example, a holiday group is usually updated once a year.  Will you remember how to make the changes to your holiday group when the time comes?  Also, when you need a specific report from your access control system, do you know how to get it?  If you have an access control expert managing your access control system for you, getting that report is as easy as making a phone call or sending an email. The second advantage to going with a managed access solution is that you no longer have to manage the server that contains the access software.  So, you don’t have to back up the server, you don’t have to install Windows updates to the server, and you don’t have to worry about viruses and other malware infecting the server when you no longer have to manage it.  We have customers that have had their access control server crash without a current backup file and they had to spend a lot of money to rebuild the server and completely re-program it.  With a managed access control solution, the third-party company that hosts your access database takes care of the server so you don’t have to worry about it. The third advantage of a managed access control solution is that you automatically get new features when they are available.  So, a managed access control system is essentially a cloud-based solution so that you don’t have to pay for new software to get the latest software upgrades.  The third-party company that manages your access control platform would update the management software when a new version is available so that new features automatically become available. So, as you can see, there are some great benefits to having someone else host and manage your access control system.  It is a worry-free way to make sure you are maximizing the use of your system and getting the performance you need. Feel free to email me with any questions at scotth@verifiedsecurity.com. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>559</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/city-of-atlanta-to-add-surveillance-cameras/</url>
		<title>City of Atlanta to Add Surveillance Cameras</title>
		<h1>City of Atlanta to Add Surveillance Cameras</h1>
		<summary>As reported this week by the Atlanta Journal-Constitution (AJC), the City Council for the City of Atlanta voted to spend $2.25 million to expand its video surveillance presence in the city.  City of Atlanta officials are pointing to the existing video surveillance infrastructure as one reason that crime in some categories has been reduced. According […]</summary>
		<content><![CDATA[<p><a title="AJC Article about Video Surveillance in Atlanta" href="http://www.ajc.com/news/news/atlanta-council-votes-to-spend/nSdbc/" target="_blank" rel="noopener noreferrer">As reported this week by the Atlanta Journal-Constitution (AJC), </a>the City Council for the City of Atlanta voted to spend $2.25 million to expand its video surveillance presence in the city.  City of Atlanta officials are pointing to the existing video surveillance infrastructure as one reason that crime in some categories has been reduced.</p>
<p>According to the AJC, “Atlanta’s Chief Operating Officer Duriya Farooqui said video surveillance — which has been in place in its current form since last September — for has become a ‘key part of our crime reduction strategy to provide real time information.'”</p>
<p>This new project will add 112 video surveillance cameras to the 762 existing video surveillance cameras in Atlanta.</p>
<p><a title="AJC Article about Atlanta Video Surveillance" href="http://www.ajc.com/news/news/atlanta-council-votes-to-spend/nSdbc/" target="_blank" rel="noopener noreferrer">Read more about it in the AJC article.</a></p>
<p>-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>As reported this week by the Atlanta Journal-Constitution (AJC), the City Council for the City of Atlanta voted to spend $2.25 million to expand its video surveillance presence in the city.  City of Atlanta officials are pointing to the existing video surveillance infrastructure as one reason that crime in some categories has been reduced. According to the AJC, “Atlanta’s Chief Operating Officer Duriya Farooqui said video surveillance — which has been in place in its current form since last September — for has become a ‘key part of our crime reduction strategy to provide real time information.&apos;” This new project will add 112 video surveillance cameras to the 762 existing video surveillance cameras in Atlanta. Read more about it in the AJC article. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>503</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/easier-access-control/</url>
		<title>Easier Access Control</title>
		<h1>Easier Access Control</h1>
		<summary>Do you have an access control system for your facility that allows you to use access cards or keyfobs to open locked doors?  If so, you probably manage that system with a server that has software that holds the system configurations and the list of cardholders. If you are like many people that we talk […]</summary>
		<content><![CDATA[<p>Do you have an access control system for your facility that allows you to use access cards or keyfobs to open locked doors?  If so, you probably manage that system with a server that has software that holds the system configurations and the list of cardholders.</p>
<p>If you are like many people that we talk to who have to manage access control systems, the software can sometimes be cumbersome to use.  And, the server has to be maintained which means ensuring that it stays virus-free and that the access control database is backed up (we hope you are backing up your database regularly!).</p>
<p>There are some new technology options for managing access control systems that do not require managing a server with software.  We will talk about the first option in this blog post with more information coming in future posts.</p>
<p>Some newer access control systems will allow you to store the database in the control panel (instead of on a server) and to use a web browser to manage your system.  One example of this is Honeywell’s NetAXS platform.  The NetAXS system can be used with just a web browser or it can be used as part of a larger system that includes a full server deployment with management software.</p>
<p>Many of our customers find it easy and hassle-free to manage their access control systems with only a web browser.  No more servers to maintain!  And, the Honeywell NetAXS system has many of the standard features of a full-blown access control system.</p>
<p>Recently, Honeywell released an enhancement to their NetAXS platform that allows for basic video integration.  So, with this new enhancement, a few cameras can be added to the basic access control platform so that clips can be recorded when triggered by access control events like valid and invalid card reads.</p>
<p>In a future post, we will talk about managed access platforms and the benefits they bring.  As always, let us know if you have questions.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Do you have an access control system for your facility that allows you to use access cards or keyfobs to open locked doors?  If so, you probably manage that system with a server that has software that holds the system configurations and the list of cardholders. If you are like many people that we talk to who have to manage access control systems, the software can sometimes be cumbersome to use.  And, the server has to be maintained which means ensuring that it stays virus-free and that the access control database is backed up (we hope you are backing up your database regularly!). There are some new technology options for managing access control systems that do not require managing a server with software.  We will talk about the first option in this blog post with more information coming in future posts. Some newer access control systems will allow you to store the database in the control panel (instead of on a server) and to use a web browser to manage your system.  One example of this is Honeywell’s NetAXS platform.  The NetAXS system can be used with just a web browser or it can be used as part of a larger system that includes a full server deployment with management software. Many of our customers find it easy and hassle-free to manage their access control systems with only a web browser.  No more servers to maintain!  And, the Honeywell NetAXS system has many of the standard features of a full-blown access control system. Recently, Honeywell released an enhancement to their NetAXS platform that allows for basic video integration.  So, with this new enhancement, a few cameras can be added to the basic access control platform so that clips can be recorded when triggered by access control events like valid and invalid card reads. In a future post, we will talk about managed access platforms and the benefits they bring.  As always, let us know if you have questions. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2021-04-06T16:09:44-04:00</modified>
	</item>
	<item>
		<id>539</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/getting-your-video-while-on-the-go/</url>
		<title>Getting Your Video While On the Go</title>
		<h1>Getting Your Video While On the Go</h1>
		<summary>Video surveillance cameras are widely deployed in many homes and businesses.  In fact, this article from Popular Mechanics magazine states that “there are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week.”  But, we often encounter users and owners of video cameras who are […]</summary>
		<content><![CDATA[<p>Video surveillance cameras are widely deployed in many homes and businesses.  In fact, <a title="Popular Mechanics Magazine article on Video Surveillance" href="http://www.popularmechanics.com/technology/military/4236865" target="_blank" rel="noopener noreferrer">this article from Popular Mechanics magazine</a> states that “there are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week.”  But, we often encounter users and owners of video cameras who are not able to view their video whenever they want from wherever they want which makes that video much less useful.</p>
<p>There are now tools to make remote video viewing easier.  Just about every new Digital Video Recorder (DVR) or Network Video Recorder (NVR) that is sold in the marketplace today is designed for remote video viewing.  For our customers that have these devices, we often need to make adjustments to their data networks in order to set up the remote video viewing so this is something to keep in mind when purchasing a DVR or NVR.</p>
<p>Newer to the market are cloud-based video services like <a title="Total Connect from Honeywell" href="http://www.mytotalconnect.com/" target="_blank" rel="noopener noreferrer">Total Connect </a>and <a title="Honeywell Maxpro Cloud" href="http://www.maxprocloud.com/" target="_blank" rel="noopener noreferrer">Maxpro Cloud </a>from Honeywell.  With these services, video is captured locally from a home or business and then stored on remote servers.  The users of these systems can then access live and recorded video on those servers from computers and mobile devices like iPhones, iPads, and Android phones and tablets.</p>
<p>So, there are many options now available for viewing remote video from anywhere at any time.  With the proliferation of mobile devices and new apps created every day, more and more choices are available to make it easy to view video on the go.</p>
<p>-Scott</p>
<p>Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p><img loading="lazy" decoding="async" title="Total Connect Remote Video" src="/wp-content/uploads/Remote-Control-and-Video-Image2.jpg" alt="Total Connect Remote Video" width="251" height="201"></p>
]]></content>
		<content_plain>Video surveillance cameras are widely deployed in many homes and businesses.  In fact, this article from Popular Mechanics magazine states that “there are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week.”  But, we often encounter users and owners of video cameras who are not able to view their video whenever they want from wherever they want which makes that video much less useful. There are now tools to make remote video viewing easier.  Just about every new Digital Video Recorder (DVR) or Network Video Recorder (NVR) that is sold in the marketplace today is designed for remote video viewing.  For our customers that have these devices, we often need to make adjustments to their data networks in order to set up the remote video viewing so this is something to keep in mind when purchasing a DVR or NVR. Newer to the market are cloud-based video services like Total Connect and Maxpro Cloud from Honeywell.  With these services, video is captured locally from a home or business and then stored on remote servers.  The users of these systems can then access live and recorded video on those servers from computers and mobile devices like iPhones, iPads, and Android phones and tablets. So, there are many options now available for viewing remote video from anywhere at any time.  With the proliferation of mobile devices and new apps created every day, more and more choices are available to make it easy to view video on the go. -Scott Scott Hightower, Verified Security</content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>525</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/public-cameras-vandalized/</url>
		<title>Public Cameras Vandalized</title>
		<h1>Public Cameras Vandalized</h1>
		<summary>It seems that there is a growing problem of public camera vandalism.  There have been two recent instances in the news where public video surveillance systems were damaged.  The first happened right here in metro Atlanta and was reported by the AJC: http://www.ajc.com/news/news/local/wire-thefts-disable-all-ga-400-traffic-cameras/nR5Rj/ The most recent incident happened in Maryland as reported by NBC News: http://usnews.nbcnews.com/_news/2012/09/14/13855944-cops-set-up-cameras-to-watch-the-cameras-that-watch-you […]</summary>
		<content><![CDATA[<p>It seems that there is a growing problem of public camera vandalism.  There have been two recent instances in the news where public video surveillance systems were damaged.  The first happened right here in metro Atlanta and was reported by the AJC:</p>
<p><a title="AJC News Article about Camera Vandalism" href="http://www.ajc.com/news/news/local/wire-thefts-disable-all-ga-400-traffic-cameras/nR5Rj/" target="_blank" rel="noopener noreferrer">http://www.ajc.com/news/news/local/wire-thefts-disable-all-ga-400-traffic-cameras/nR5Rj/</a></p>
<p>The most recent incident happened in Maryland as reported by NBC News:</p>
<p><a title="NBC News Article about Camera Vandalism" href="http://usnews.nbcnews.com/_news/2012/09/14/13855944-cops-set-up-cameras-to-watch-the-cameras-that-watch-you" target="_blank" rel="noopener noreferrer">http://usnews.nbcnews.com/_news/2012/09/14/13855944-cops-set-up-cameras-to-watch-the-cameras-that-watch-you</a></p>
<p>The driving incentive for these thieves appears to be copper wiring theft.  Copper prices are still fairly high so the criminals are looking for ways to gather copper for recycling.  These thefts are impacting the operations of municipalities around the country.  As wired and wireless surveillance cameras become more popular, the opportunity for theft increases.</p>
<p>As mentioned in the NBC News article, there are ways that cameras can be protected.  The lesson here is that it is important to think about cameras both as a device that can protect and as a device that needs to be protected.</p>
<p>-Scott Hightower, <a title="Verified Security Home Page" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>It seems that there is a growing problem of public camera vandalism.  There have been two recent instances in the news where public video surveillance systems were damaged.  The first happened right here in metro Atlanta and was reported by the AJC: http://www.ajc.com/news/news/local/wire-thefts-disable-all-ga-400-traffic-cameras/nR5Rj/ The most recent incident happened in Maryland as reported by NBC News: http://usnews.nbcnews.com/_news/2012/09/14/13855944-cops-set-up-cameras-to-watch-the-cameras-that-watch-you The driving incentive for these thieves appears to be copper wiring theft.  Copper prices are still fairly high so the criminals are looking for ways to gather copper for recycling.  These thefts are impacting the operations of municipalities around the country.  As wired and wireless surveillance cameras become more popular, the opportunity for theft increases. As mentioned in the NBC News article, there are ways that cameras can be protected.  The lesson here is that it is important to think about cameras both as a device that can protect and as a device that needs to be protected. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>498</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/surprise-in-san-jose/</url>
		<title>Surprise in San Jose</title>
		<h1>Surprise in San Jose</h1>
		<summary>The residents of San Jose, California got surprised recently by the passage of a new alarm response ordinance.  According to this article in the San Jose Mercury News from January, 2012, the San Jose police department has decided not to respond to any security system signals unless there is verification of a crime in progress. […]</summary>
		<content><![CDATA[<p>The residents of San Jose, California got surprised recently by the passage of a new alarm response ordinance.  <a title="San Jose Mercury News Article about Verified Alarm Response" href="http://www.mercurynews.com/crime-courts/ci_19653480" target="_blank" rel="noopener noreferrer">According to this article in the San Jose Mercury News from </a>January, 2012, the San Jose police department has decided not to respond to any security system signals unless there is verification of a crime in progress.</p>
<p>Regular readers of our blog know that we have discussed verified response before.  Across the country, the budgets of local municipalities are getting stretched pretty thin and the police departments are tired of responding to nuisance alarms that are not generated by an actual crime in progress.  So, the momentum around requiring some sort of verification prior to dispatching officers to a home or business is building.</p>
<p>The good news is that there are technologies that can help business owners and homeowners with verification.  Video surveillance systems can be set up so that live and recorded video can be viewed remotely over the Internet with a web browser or on a smartphone.  And, new technologies like those in a <a title="Videofied Home Page" href="http://www.videofied.com/" target="_blank" rel="noopener noreferrer">Videofied</a> system can record brief video clips when motion is detected and transmit it to a security monitoring center so that an operator on duty can determine if an actual crime is in progress.</p>
<p>I don’t think that the calls for video verification by over-worked police departments will diminish–I think they will grow instead.</p>
<p>-Scott Hightower, <a title="Verified Security Home Page" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>The residents of San Jose, California got surprised recently by the passage of a new alarm response ordinance.  According to this article in the San Jose Mercury News from January, 2012, the San Jose police department has decided not to respond to any security system signals unless there is verification of a crime in progress. Regular readers of our blog know that we have discussed verified response before.  Across the country, the budgets of local municipalities are getting stretched pretty thin and the police departments are tired of responding to nuisance alarms that are not generated by an actual crime in progress.  So, the momentum around requiring some sort of verification prior to dispatching officers to a home or business is building. The good news is that there are technologies that can help business owners and homeowners with verification.  Video surveillance systems can be set up so that live and recorded video can be viewed remotely over the Internet with a web browser or on a smartphone.  And, new technologies like those in a Videofied system can record brief video clips when motion is detected and transmit it to a security monitoring center so that an operator on duty can determine if an actual crime is in progress. I don’t think that the calls for video verification by over-worked police departments will diminish–I think they will grow instead. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2021-04-06T16:07:23-04:00</modified>
	</item>
	<item>
		<id>485</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/office-creepers-still-at-work/</url>
		<title>Office Creepers Still at Work</title>
		<h1>Office Creepers Still at Work</h1>
		<summary>Have you herd of the term “Office Creeper?”  If not, the definition can be found on this Word Spy web page.  Essentially, an Office Creeper is someone who sneaks into an office building during regular work hours to steal personal property from offices in that building. In case you are wondering if this really happens, […]</summary>
		<content><![CDATA[<p><span style="font-family: arial,helvetica,sans-serif;">Have you herd of the term “Office Creeper?”  If not, the definition can be found on <a title="Office Creeper definition webpage" href="http://wordspy.com/words/officecreeper.asp" target="_blank" rel="noopener noreferrer">this Word Spy web page</a>.  Essentially, an Office Creeper is someone who sneaks into an office building during regular work hours to steal personal property from offices in that building.</span></p>
<p><span style="font-family: arial,helvetica,sans-serif;">In case you are wondering if this really happens, check out this video news story about a recent Office Creeper in Addison, Texas.  The clip includes surveillance video of the crime in progress:</span></p>
<p><span style="font-family: arial,helvetica,sans-serif;"> <object width="576" height="324" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="src" value="http://media.nbcdfw.com/designvideo/embeddedPlayer.swf?pid=NKH3QyGLOk1Y05EhsU_Mhu6dIqKwsc_o"><param name="flashvars" value="v=http%3A%2F%2Fwww.nbcdfw.com%2Fi%2Fembed_new%2F%3Fcid%3D137233803&amp;path=%2Fnews/local"><param name="allowfullscreen" value="true"><param name="allowscriptaccess" value="always"><embed width="576" height="324" type="application/x-shockwave-flash" src="http://media.nbcdfw.com/designvideo/embeddedPlayer.swf?pid=NKH3QyGLOk1Y05EhsU_Mhu6dIqKwsc_o" flashvars="v=http%3A%2F%2Fwww.nbcdfw.com%2Fi%2Fembed_new%2F%3Fcid%3D137233803&amp;path=%2Fnews/local" allowfullscreen="true" allowscriptaccess="always"></embed></object></span></p>
<p style="font-size: small;"><span style="font-family: arial,helvetica,sans-serif;">So, as you can see, you have to be careful even if you are in an office building.</span></p>
<p style="font-size: small;"><span style="font-family: arial,helvetica,sans-serif;">According to the news story, the business owner and the police were happy with the quality of the surveillance video.  Are you happy with your video surveillance system?  Do you have one?  Are you missing an opportunity to monitor what is happening in your business?</span></p>
<p style="font-size: small;"><span style="font-family: arial,helvetica,sans-serif;">Don’t let the bad guys creep up on you!</span></p>
<p style="font-size: small;"><span style="font-family: arial,helvetica,sans-serif;">-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></span></p>
<p style="font-size: small;"> </p>
<p style="font-size: small;"> </p>
]]></content>
		<content_plain>Have you herd of the term “Office Creeper?”  If not, the definition can be found on this Word Spy web page.  Essentially, an Office Creeper is someone who sneaks into an office building during regular work hours to steal personal property from offices in that building. In case you are wondering if this really happens, check out this video news story about a recent Office Creeper in Addison, Texas.  The clip includes surveillance video of the crime in progress:   So, as you can see, you have to be careful even if you are in an office building. According to the news story, the business owner and the police were happy with the quality of the surveillance video.  Are you happy with your video surveillance system?  Do you have one?  Are you missing an opportunity to monitor what is happening in your business? Don’t let the bad guys creep up on you! -Scott Hightower, Verified Security    </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>481</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/thieves-dig-tunnel-to-reach-cash/</url>
		<title>Thieves Dig Tunnel to Reach Cash</title>
		<h1>Thieves Dig Tunnel to Reach Cash</h1>
		<summary>Today’s post comes from an article posted recently online by The Telegraph about a heist in Manchester, England.  I think this article shows the incredible steps that thieves will take to steal. In the article, the police detail how the thieves spent months to dig a 100 foot tunnel that extended from a railway embankment, […]</summary>
		<content><![CDATA[<p>Today’s post comes from an article posted recently online by The Telegraph about a heist in Manchester, England.  I think <a title="Telegraph Article" href="http://www.telegraph.co.uk/news/uknews/crime/9014449/Thieves-dig-100ft-tunnel-to-reach-cash-machine.html" target="_blank" rel="noopener noreferrer">this article </a>shows the incredible steps that thieves will take to steal.</p>
<p>In <a title="Telegraph Article" href="http://www.telegraph.co.uk/news/uknews/crime/9014449/Thieves-dig-100ft-tunnel-to-reach-cash-machine.html" target="_blank" rel="noopener noreferrer">the article</a>, the police detail how the thieves spent months to dig a 100 foot tunnel that extended from a railway embankment, went under a parking deck, and then under a shop that had an ATM that was the target of the crooks.  They were able to cut through the concrete floor and get the ATM.  But, the police pointed out that they probably only captured about 6,000 British pounds (about $9,300 U.S. dollars based on today’s conversion rates).</p>
<p>So, if these thieves would go to all of this work to get just over $9,000, imagine what others would be willing to do to break into your business.  If you don’t have a security system for your business, now might be the time to consider getting one.</p>
<p>-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Today’s post comes from an article posted recently online by The Telegraph about a heist in Manchester, England.  I think this article shows the incredible steps that thieves will take to steal. In the article, the police detail how the thieves spent months to dig a 100 foot tunnel that extended from a railway embankment, went under a parking deck, and then under a shop that had an ATM that was the target of the crooks.  They were able to cut through the concrete floor and get the ATM.  But, the police pointed out that they probably only captured about 6,000 British pounds (about $9,300 U.S. dollars based on today’s conversion rates). So, if these thieves would go to all of this work to get just over $9,000, imagine what others would be willing to do to break into your business.  If you don’t have a security system for your business, now might be the time to consider getting one. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>459</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/wait-its-not-halloween-tweety-and-elmo-rob-convenience-store/</url>
		<title>Wait, It&#8217;s Not Halloween! Tweety Bird and Elmo Rob Convenience Store</title>
		<h1>Wait, It&#8217;s Not Halloween! Tweety Bird and Elmo Rob Convenience Store</h1>
		<summary>From our friends at the Atlanta Journal-Constitution (AJC) comes this latest tale of a cowardly caper.  Last Friday, two teenagers, one dressed as Tweety Bird and one dressed as Elmo, robbed a convenience store in south Georgia.  They were apprehended shortly after.  This is the link to the article: http://www.ajc.com/news/cops-teens-in-elmo-1264616.html If you own a retail […]</summary>
		<content><![CDATA[<p>From our friends at the Atlanta Journal-Constitution (AJC) comes this latest tale of a cowardly caper.  Last Friday, two teenagers, one dressed as Tweety Bird and one dressed as Elmo, robbed a convenience store in south Georgia.  They were apprehended shortly after.  This is the link to the article:</p>
<p><a title="AJC Article about Robbery" href="http://www.ajc.com/news/cops-teens-in-elmo-1264616.html" target="_blank" rel="noopener noreferrer">http://www.ajc.com/news/cops-teens-in-elmo-1264616.html</a></p>
<p>If you own a retail establishment or another business that handles cash, have you thought about what you would do if your business was robbed?  Having a good video surveillance system can help deter crime and can help identify the bad guys when a crime is committed.  Having silent duress or panic buttons installed and connected to your security system can help summon the police more quickly.</p>
<p>Be vigilant – you never know when Tweety and Elmo may come calling…</p>
<p>-Scott Hightower, <a title="Verified Security Home Page" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>From our friends at the Atlanta Journal-Constitution (AJC) comes this latest tale of a cowardly caper.  Last Friday, two teenagers, one dressed as Tweety Bird and one dressed as Elmo, robbed a convenience store in south Georgia.  They were apprehended shortly after.  This is the link to the article: http://www.ajc.com/news/cops-teens-in-elmo-1264616.html If you own a retail establishment or another business that handles cash, have you thought about what you would do if your business was robbed?  Having a good video surveillance system can help deter crime and can help identify the bad guys when a crime is committed.  Having silent duress or panic buttons installed and connected to your security system can help summon the police more quickly. Be vigilant – you never know when Tweety and Elmo may come calling… -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>453</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/hard-drive-shortage-may-affect-dvr-availability-and-pricing/</url>
		<title>Hard Drive Shortage May Affect DVR Availability and Pricing</title>
		<h1>Hard Drive Shortage May Affect DVR Availability and Pricing</h1>
		<summary>If you are a regular follower of the news, you will know about the major floods that have inundated parts of Thailand.  Unfortunately, some of the areas that experienced the heavy flooding contained factories that manufactured electronic goods that are regularly consumed here in the United States.  One example of a product that is now […]</summary>
		<content><![CDATA[<p>If you are a regular follower of the news, you will know about the major floods that have inundated parts of Thailand.  Unfortunately, some of the areas that experienced the heavy flooding contained factories that manufactured electronic goods that are regularly consumed here in the United States.  One example of a product that is now in short supply because of these terrible floods is the hard disk drive.  Western Digital is a major manufacturer of hard drives and this is a picture of one of their factories in Thailand:</p>
<p><img loading="lazy" decoding="async" title="Flooded Western Digital Hard disk Factory in Bang Pa-In (close to Bangkok), Thailand" src="http://www.brightsideofnews.com/Data/2011_11_1/PHOTO-Horrific-Images-of-Flooded-Western-Digital-Factory/WD_FloodE_689.jpg" alt="Flooded Western Digital Hard disk Factory in Bang Pa-In (close to Bangkok), Thailand" width="689" height="517" border="0" hspace="0"></p>
<p>As you can see, things are looking a little soggy there.  So, why is this important?  Hard drives are used in almost every computer and in many other electronic devices.  If you have a Digital Video Recorder (DVR) to record video from surveillance cameras, that DVR has a hard drive in it.  If you are using a server or Network Video Recorder (NVR) for your video surveillance system, it would have a hard drive in it too.</p>
<p>Right now, DVRs, NVRs, and video servers are still readily available.  However, there is concern from some of our manufacturing partners that the supply of hard drives may become really tight throughout the next year as the impact of the flooding ripples through the supply chain.</p>
<p>As DVRs, NVRs, and video servers get old, the hard drives are often the first parts to fail.  If you think about it,  your video surveillance system runs all the time and never takes a vacation.  So, the moving parts in the hard drive tend to fail after a certain amount of time.</p>
<p>So, while we do not want to cause alarm about hard drive shortages, it is something to think about.  If there is a shortage as predicted for 2012, it will become difficult to get replacement hard drives for DVRs and NVRs and it may become difficult to get new DVRs and NVRs until the supply can catch up again.</p>
<p>If you want to read more about the impact of the flooding on the hard drive supply, <a title="New York Times Article about Thailand Flooding" href="http://www.nytimes.com/2011/11/07/business/global/07iht-floods07.html?pagewanted=all" target="_blank" rel="noopener noreferrer">this is a link to an article in the New York Times.</a></p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>If you are a regular follower of the news, you will know about the major floods that have inundated parts of Thailand.  Unfortunately, some of the areas that experienced the heavy flooding contained factories that manufactured electronic goods that are regularly consumed here in the United States.  One example of a product that is now in short supply because of these terrible floods is the hard disk drive.  Western Digital is a major manufacturer of hard drives and this is a picture of one of their factories in Thailand: As you can see, things are looking a little soggy there.  So, why is this important?  Hard drives are used in almost every computer and in many other electronic devices.  If you have a Digital Video Recorder (DVR) to record video from surveillance cameras, that DVR has a hard drive in it.  If you are using a server or Network Video Recorder (NVR) for your video surveillance system, it would have a hard drive in it too. Right now, DVRs, NVRs, and video servers are still readily available.  However, there is concern from some of our manufacturing partners that the supply of hard drives may become really tight throughout the next year as the impact of the flooding ripples through the supply chain. As DVRs, NVRs, and video servers get old, the hard drives are often the first parts to fail.  If you think about it,  your video surveillance system runs all the time and never takes a vacation.  So, the moving parts in the hard drive tend to fail after a certain amount of time. So, while we do not want to cause alarm about hard drive shortages, it is something to think about.  If there is a shortage as predicted for 2012, it will become difficult to get replacement hard drives for DVRs and NVRs and it may become difficult to get new DVRs and NVRs until the supply can catch up again. If you want to read more about the impact of the flooding on the hard drive supply, this is a link to an article in the New York Times. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>434</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/portal/</url>
		<title>Client Portal</title>
		<h1>Client Portal</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Access your account information and history by visiting https://www.myalarms.com/Account/Login”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_HTVbl”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_code_block”,”id”:”MZ6pN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””,”language”:””}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Access your account information and history by visiting https://www.myalarms.com/Account/Login”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_HTVbl”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_code_block”,”id”:”MZ6pN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””,”language”:””}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</p>
]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Access your account information and history by visiting https://www.myalarms.com/Account/Login”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_HTVbl”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_code_block”,”id”:”MZ6pN”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:””,”language”:””}]}],”section_settings”:””},”scripts”:{},”css”:{},”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:{},”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2020-10-21T16:33:57-04:00</modified>
	</item>
	<item>
		<id>424</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/thieves-drag-atm-out-of-macon-target-store-with-pickup-truck/</url>
		<title>Thieves Drag ATM Out of Macon Target Store with Pickup Truck</title>
		<h1>Thieves Drag ATM Out of Macon Target Store with Pickup Truck</h1>
		<summary>From television station WMAZ Channel 13 in Macon, Georgia (just south of Atlanta) comes this latest story of thievery.  As you will see in the video clip on their website, several thugs drove a white pickup truck through the front doors of Target and then loaded up the ATM that was located near the front of […]</summary>
		<content><![CDATA[<p>From television station WMAZ Channel 13 in Macon, Georgia (just south of Atlanta) comes this latest story of thievery.  As you will see in the video clip on their website, several thugs drove a white pickup truck through the front doors of Target and then loaded up the ATM that was located near the front of the store.  This is the link to the story with video on the WMAZ website:</p>
<p><a title="Target Burglary" href="http://www.13wmaz.com/news/article/155487/153/Truck-Damages-Macon-Target-in-ATM-Theft-" target="_blank" rel="noopener noreferrer">WMAZ Story about Target Burglary</a></p>
<p>Fortunately, Target has pretty good video surveillance systems.  From what I know, they have deployed Axis IP cameras in many of their stores.  So, they were able to get some pretty good video of the incident which will help the police.</p>
<p>It is important for any retail business or any business with a storefront to remember not to put valuable items on display near the front of the store.  This just makes it easier for the bad guys to conduct a hit and run operation.</p>
<p>As we move through the holiday season, it is important to be vigilant.  Property crime usually increases this time of year.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>From television station WMAZ Channel 13 in Macon, Georgia (just south of Atlanta) comes this latest story of thievery.  As you will see in the video clip on their website, several thugs drove a white pickup truck through the front doors of Target and then loaded up the ATM that was located near the front of the store.  This is the link to the story with video on the WMAZ website: WMAZ Story about Target Burglary Fortunately, Target has pretty good video surveillance systems.  From what I know, they have deployed Axis IP cameras in many of their stores.  So, they were able to get some pretty good video of the incident which will help the police. It is important for any retail business or any business with a storefront to remember not to put valuable items on display near the front of the store.  This just makes it easier for the bad guys to conduct a hit and run operation. As we move through the holiday season, it is important to be vigilant.  Property crime usually increases this time of year. -Scott Hightower, Verified Security</content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>400</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/new-technologies-for-fire-alarm-system-communication/</url>
		<title>New Technologies for Fire Alarm System Communication Can Help You Save Money</title>
		<h1>New Technologies for Fire Alarm System Communication Can Help You Save Money</h1>
		<summary>If you have a commercial fire alarm system protecting your business, it is likely that you are aware of the ongoing expense of paying for two telephone lines for monitoring that system.  The National Fire Alarm Code requires a dedicated primary telephone line and a backup telephone line (which can be shared) for all monitored […]</summary>
		<content><![CDATA[<p>If you have a commercial fire alarm system protecting your business, it is likely that you are aware of the ongoing expense of paying for two telephone lines for monitoring that system.  The National Fire Alarm Code requires a dedicated primary telephone line and a backup telephone line (which can be shared) for all monitored commercial fire alarm systems that use telephone lines for communication.  The monthly phone bills can get expensive!</p>
<p>The good news is that there is a new alternative communication option that can completely eliminate the need for two telephone lines for commercial fire alarm systems.  The National Fire Alarm Code  allows for the use of alternative communication technologies as long as they meet certain criteria.</p>
<p>Fire alarm system manufacturers like Honeywell have recognized the need for these alternative technologies and have begun providing new fire alarm system communicators that do not require telephone lines.  One product that can help is the <a title="IPGSM-DP Webpage" href="http://www.honeywellpower.com/fire-ipgsmdp.html" target="_blank" rel="noopener noreferrer">Honeywell IPGSM-DP</a> which is a dual-path communicator that can use a combination of your Internet connection and a GSM wireless (cellular) connection or which can use GSM wireless alone to satisfy the Fire Alarm Code requirements.</p>
<p>This device (pictured below) can help you to significantly reduce your telecommunications expenses related to monitoring commercial fire alarm systems.  The other big benefit is that these units are supervised more often than a system using traditional telephone lines.  What does that mean?  In a traditional fire alarm system using telephone lines for communication, the fire alarm control panel dials into the monitoring center once every 24 hours to check the integrity of the communications path.  When using GSM wireless as the only path for communication, the integrity is checked every five minutes.  So, you would know much more quickly if there is a problem with the communication of your fire alarm system.</p>
<p><img loading="lazy" decoding="async" style="margin: 3px 5px; border: 0px;" title="Honeywell Fire Alarm Communicator" src="http://www.honeywellpower.com/images/IPGSM%20open.jpg" alt="Fire Alarm Communicator" width="90" height="119" align="left" border="0" hspace="5" vspace="3"></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p>So, there are several benefits to using a new technology for fire alarm communication.  If you have any questions about these new technologies, please let us know.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>If you have a commercial fire alarm system protecting your business, it is likely that you are aware of the ongoing expense of paying for two telephone lines for monitoring that system.  The National Fire Alarm Code requires a dedicated primary telephone line and a backup telephone line (which can be shared) for all monitored commercial fire alarm systems that use telephone lines for communication.  The monthly phone bills can get expensive! The good news is that there is a new alternative communication option that can completely eliminate the need for two telephone lines for commercial fire alarm systems.  The National Fire Alarm Code  allows for the use of alternative communication technologies as long as they meet certain criteria. Fire alarm system manufacturers like Honeywell have recognized the need for these alternative technologies and have begun providing new fire alarm system communicators that do not require telephone lines.  One product that can help is the Honeywell IPGSM-DP which is a dual-path communicator that can use a combination of your Internet connection and a GSM wireless (cellular) connection or which can use GSM wireless alone to satisfy the Fire Alarm Code requirements. This device (pictured below) can help you to significantly reduce your telecommunications expenses related to monitoring commercial fire alarm systems.  The other big benefit is that these units are supervised more often than a system using traditional telephone lines.  What does that mean?  In a traditional fire alarm system using telephone lines for communication, the fire alarm control panel dials into the monitoring center once every 24 hours to check the integrity of the communications path.  When using GSM wireless as the only path for communication, the integrity is checked every five minutes.  So, you would know much more quickly if there is a problem with the communication of your fire alarm system.         So, there are several benefits to using a new technology for fire alarm communication.  If you have any questions about these new technologies, please let us know. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>391</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/holiday-decorations-swiped-in-macon/</url>
		<title>Holiday Decorations Swiped in Macon</title>
		<h1>Holiday Decorations Swiped in Macon</h1>
		<summary>The Grinch is back!  In the latest caper, thieves broke into a storage area for holiday decorations in the city of Macon and stripped all of the copper from the decorations.  Here is the link to the article in the Atlanta Business Chronicle: http://www.bizjournals.com/atlanta/morning_call/2011/11/copper-thieves-destroy-macons-holiday.html?surround=etf&amp;ana=e_article Would you think you would have to secure the holiday decorations with […]</summary>
		<content><![CDATA[<p>The Grinch is back!  In the latest caper, thieves broke into a storage area for holiday decorations in the city of Macon and stripped all of the copper from the decorations.  Here is the link to the article in the Atlanta Business Chronicle:</p>
<p><a title="Article about Macon Copper Theft" href="http://www.bizjournals.com/atlanta/morning_call/2011/11/copper-thieves-destroy-macons-holiday.html?surround=etf&amp;ana=e_article" target="_blank" rel="noopener noreferrer">http://www.bizjournals.com/atlanta/morning_call/2011/11/copper-thieves-destroy-macons-holiday.html?surround=etf&amp;ana=e_article</a></p>
<p>Would you think you would have to secure the holiday decorations with something more than a lock on a storage space?</p>
<p>These days, you do.  It is a shame but it is the way life is in America these days.  Desperate people are stripping copper from holiday decorations.</p>
<p>As regular readers know, there are many ways that commercial facilities can be secured.  From commercial security systems to video surveillance systems to unique security systems like <a title="Videofied Home Page" href="http://www.videofied.com" target="_blank" rel="noopener noreferrer">Videofied</a> that combine the two, there are very cost-effective solutions that can protect the assets of any business.</p>
<p>Keep the Grinch away this holiday season!</p>
<p>-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>The Grinch is back!  In the latest caper, thieves broke into a storage area for holiday decorations in the city of Macon and stripped all of the copper from the decorations.  Here is the link to the article in the Atlanta Business Chronicle: http://www.bizjournals.com/atlanta/morning_call/2011/11/copper-thieves-destroy-macons-holiday.html?surround=etf&amp;ana=e_article Would you think you would have to secure the holiday decorations with something more than a lock on a storage space? These days, you do.  It is a shame but it is the way life is in America these days.  Desperate people are stripping copper from holiday decorations. As regular readers know, there are many ways that commercial facilities can be secured.  From commercial security systems to video surveillance systems to unique security systems like Videofied that combine the two, there are very cost-effective solutions that can protect the assets of any business. Keep the Grinch away this holiday season! -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>382</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/tis-the-season/</url>
		<title>&#8216;Tis the Season&#8230;</title>
		<h1>&#8216;Tis the Season&#8230;</h1>
		<summary>Well, now that Halloween is over, it is time for the crooks and criminals to turn their attention to the other upcoming holidays.  We have now entered the prime season for retail theft.  With stores and display windows filled with lots of potential presents and other goodies, the crooks come out en masse.  Want an […]</summary>
		<content><![CDATA[<p>Well, now that Halloween is over, it is time for the crooks and criminals to turn their attention to the other upcoming holidays.  We have now entered the prime season for retail theft.  With stores and display windows filled with lots of potential presents and other goodies, the crooks come out en masse.  Want an indication that the fun has begun?  See this article from today’s Atlanta Journal-Constitution newspaper:</p>
<p><a title="Attempted Burglary at Apple Store" href="http://www.ajc.com/news/north-fulton/three-men-arrested-for-1217220.html" target="_blank" rel="noopener noreferrer">http://www.ajc.com/news/north-fulton/three-men-arrested-for-1217220.html</a></p>
<p>Apparently, three men tried to burglarize the Apple store at North Point Mall.  The good news is that the police responded to an alarm system signal and were able to apprehend the suspected burglars.</p>
<p>So, as we get closer to the next set of holidays, be on the lookout for more of this type of activity at your business and make sure your commercial security system is working.  ‘Tis the season for burglaries and thefts.</p>
<p>-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Well, now that Halloween is over, it is time for the crooks and criminals to turn their attention to the other upcoming holidays.  We have now entered the prime season for retail theft.  With stores and display windows filled with lots of potential presents and other goodies, the crooks come out en masse.  Want an indication that the fun has begun?  See this article from today’s Atlanta Journal-Constitution newspaper: http://www.ajc.com/news/north-fulton/three-men-arrested-for-1217220.html Apparently, three men tried to burglarize the Apple store at North Point Mall.  The good news is that the police responded to an alarm system signal and were able to apprehend the suspected burglars. So, as we get closer to the next set of holidays, be on the lookout for more of this type of activity at your business and make sure your commercial security system is working.  ‘Tis the season for burglaries and thefts. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>338</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/carbon-monoxide-the-silent-killer/</url>
		<title>Carbon Monoxide &#8211; The Silent Killer</title>
		<h1>Carbon Monoxide &#8211; The Silent Killer</h1>
		<summary>It is that time of year again–the time when we fire up our furnaces, space heaters, and other indoor heat sources.  Indoor heating systems that burn fuel create carbon monoxide (CO) as a by-product of the fuel combustion that generates heat.  Carbon monoxide is colorless and odorless so it can be a silent killer as […]</summary>
		<content><![CDATA[<p>It is that time of year again–the time when we fire up our furnaces, space heaters, and other indoor heat sources.  Indoor heating systems that burn fuel create carbon monoxide (CO) as a by-product of the fuel combustion that generates heat.  Carbon monoxide is colorless and odorless so it can be a silent killer as it is often undetected until exposure to it results in injury or death.</p>
<p><a title="CDC Report on Carbon Monoxide Poisoning" href="http://www.cdc.gov/mmwr/preview/mmwrhtml/mm6030a2.htm?s_cid=mm6030a2_w" target="_blank" rel="noopener noreferrer">According to a report from the Centers for Disease Control and Prevention (CDC)</a>, “…non-fire related CO poisoning is responsible for approximately 15,000 emergency room visits and almost 500 deaths annually in the United States.”</p>
<p>The frustrating part for us is that all of these emergency room visits and deaths could be avoided if proper CO detection systems are used.  CO detectors from companies like <a title="System Sensor Carbon Monoxide Detector" href="http://www.systemsensor.com/products/conv/?UniqueID=145" target="_blank" rel="noopener noreferrer">System Sensor</a> can be added to residential alarm systems and commercial fire alarm systems.  These detectors are fairly inexpensive and can notify building occupants as well as a central monitoring center when levels of carbon monoxide become too high.</p>
<img loading="lazy" decoding="async" title="System Sensor CO1224T Detector" src="http://www.systemsensor.com/images/products/CO1224T.jpg" alt="System Sensor CO1224T Detector" width="194" height="188"><p>System Sensor CO Detector</p>
<p>If you do not have carbon monoxide detection devices in your home or business, you should check into what it would take to add this valuable protection to your security or fire alarm system.  A little investment now can save lives later.</p>
<p>-Scott Hightower, <a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>It is that time of year again–the time when we fire up our furnaces, space heaters, and other indoor heat sources.  Indoor heating systems that burn fuel create carbon monoxide (CO) as a by-product of the fuel combustion that generates heat.  Carbon monoxide is colorless and odorless so it can be a silent killer as it is often undetected until exposure to it results in injury or death. According to a report from the Centers for Disease Control and Prevention (CDC), “…non-fire related CO poisoning is responsible for approximately 15,000 emergency room visits and almost 500 deaths annually in the United States.” The frustrating part for us is that all of these emergency room visits and deaths could be avoided if proper CO detection systems are used.  CO detectors from companies like System Sensor can be added to residential alarm systems and commercial fire alarm systems.  These detectors are fairly inexpensive and can notify building occupants as well as a central monitoring center when levels of carbon monoxide become too high. System Sensor CO Detector If you do not have carbon monoxide detection devices in your home or business, you should check into what it would take to add this valuable protection to your security or fire alarm system.  A little investment now can save lives later. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:22:49-04:00</modified>
	</item>
	<item>
		<id>328</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/new-180-degree-20-megapixel-camera-from-arecont-vision/</url>
		<title>New 180 Degree, 20 Megapixel Camera from Arecont Vision</title>
		<h1>New 180 Degree, 20 Megapixel Camera from Arecont Vision</h1>
		<summary>Arecont Vision, a leading manufacturer of megapixel video surveillance (CCTV) cameras, has released a new 20 megapixel, 180 degree, day/night, dome camera.  This new camera has four 5-megapixel imagers in one dome camera housing and it allows users to get wide views with high-resolution quality.  I predict that megapixel video surveillance cameras will soon become the […]</summary>
		<content><![CDATA[<p>Arecont Vision, a leading manufacturer of megapixel video surveillance (CCTV) cameras, has released a new 20 megapixel, 180 degree, day/night, dome camera.  This new camera has four 5-megapixel imagers in one dome camera housing and it allows users to get wide views with high-resolution quality.</p>
<img loading="lazy" decoding="async" aria-describedby="caption-attachment-330" title="Arecont Vision AV20185DN Camera" src="/wp-content/uploads/Picture-of-Arecont-Vision-20-Meg-180-Degree-Dome.jpg" alt="Picture of Arecont Vision Camera" width="274" height="187"><p id="caption-attachment-330">Arecont Vision AV20185DN Camera</p>
<p> I predict that megapixel video surveillance cameras will soon become the norm in the video surveillance world.  If given a choice today, would you buy a standard-definition analog television for your home or would you buy the digital, high-definition version?  Of cource, you would buy the high-def TV!</p>
<p> It is the same with video surveillance cameras.  Once you see the high-definition images from a megapixel camera, you won’t want to go back to standard-definition, analog cameras.</p>
<p>If you want to learn more about this new camera from Arecont Vision, <a title="Arecont Vision web link" href="http://www.arecontvision.com/AV20185DN-AV20365DN.html" target="_blank" rel="noopener noreferrer">this is the link to the product page on their website.</a></p>
<p>If you want to learn more about megapixel video surveillance cameras, give us a call or <a title="Email Link for Verified Security" href="mailto:info@verifiedsecurity.com" target="_blank" rel="noopener noreferrer">drop us a note</a>.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>Arecont Vision, a leading manufacturer of megapixel video surveillance (CCTV) cameras, has released a new 20 megapixel, 180 degree, day/night, dome camera.  This new camera has four 5-megapixel imagers in one dome camera housing and it allows users to get wide views with high-resolution quality. Arecont Vision AV20185DN Camera  I predict that megapixel video surveillance cameras will soon become the norm in the video surveillance world.  If given a choice today, would you buy a standard-definition analog television for your home or would you buy the digital, high-definition version?  Of cource, you would buy the high-def TV!  It is the same with video surveillance cameras.  Once you see the high-definition images from a megapixel camera, you won’t want to go back to standard-definition, analog cameras. If you want to learn more about this new camera from Arecont Vision, this is the link to the product page on their website. If you want to learn more about megapixel video surveillance cameras, give us a call or drop us a note. -Scott Hightower, Verified Security</content_plain>
		<image>https://verifiedsecurity.com/wp-content/uploads/Picture-of-Arecont-Vision-20-Meg-180-Degree-Dome.jpg</image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>319</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/more-copper-theft/</url>
		<title>More Copper Theft&#8230;</title>
		<h1>More Copper Theft&#8230;</h1>
		<summary>Well, we have another day with another story of copper theft in Georgia.  As I have discussed several times, copper prices have almost doubled over the last couple of years, making it an attractive target for thieves.  The most recent target was a school system near Columbus, Georgia and the article states that over $100.000 of […]</summary>
		<content><![CDATA[<p>Well, we have another day with another story of copper theft in Georgia.  As I have discussed several times, copper prices have almost doubled over the last couple of years, making it an attractive target for thieves.  The most recent target was a school system near Columbus, Georgia and the article states that over $100.000 of copper wire was stolen from a warehouse.  Here is the link to the article:</p>
<p><a title="AJC News Article on Copper Theft" href="http://www.ajc.com/news/more-than-100-000-1204497.html" target="_blank" rel="noopener noreferrer">http://www.ajc.com/news/more-than-100-000-1204497.html</a></p>
<p>For those of us in the commercial security business, it is frustrating to see these types of thefts continue, especially when we know there are some very effective security measures that can be put in place for much less than $100,000.</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Well, we have another day with another story of copper theft in Georgia.  As I have discussed several times, copper prices have almost doubled over the last couple of years, making it an attractive target for thieves.  The most recent target was a school system near Columbus, Georgia and the article states that over $100.000 of copper wire was stolen from a warehouse.  Here is the link to the article: http://www.ajc.com/news/more-than-100-000-1204497.html For those of us in the commercial security business, it is frustrating to see these types of thefts continue, especially when we know there are some very effective security measures that can be put in place for much less than $100,000. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>298</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/did-gumby-do-it/</url>
		<title>Did Gumby Do It?</title>
		<h1>Did Gumby Do It?</h1>
		<summary>Have you heard of Art Clokey? He was the creator of Gumby, the beloved green clay television star. He died in 2010 but October 12 would have been his 90th birthday. This is a link to his Wikipedia article: Wikipedia Entry on Art Clokey So, what does this have to do with a security blog? […]</summary>
		<content><![CDATA[<p>Have you heard of Art Clokey? He was the creator of Gumby, the beloved green clay television star. He died in 2010 but October 12 would have been his 90th birthday. This is a link to his Wikipedia article:</p>
<p><a title="Art Clokey Wikipedia Page" href="http://en.wikipedia.org/wiki/Art_Clokey" target="_blank" rel="noopener noreferrer">Wikipedia Entry on Art Clokey</a></p>
<p>So, what does this have to do with a security blog?</p>
<img loading="lazy" decoding="async" aria-describedby="caption-attachment-306" title="Alleged Gumby Robbery Picture" src="/wp-content/uploads/Gumby-Robbery-Picture.jpg" alt="Alleged Gumby Robber" width="300" height="225"><p id="caption-attachment-306">Alleged Gumby Robber</p>
<p>Well, recently, a young man dressed as Gumby tried to rob a San Diego-area convenience store and the incident was captured on the store’s video surveillance system.  This is a link to ABC news video (including the video surveillance clips) about the incident:</p>
<p><a title="Gumby Robbery Surveillance Video" href="http://abcnews.go.com/Video/playerIndex?id=14463863" target="_blank" rel="noopener noreferrer">Gumby Robbery Surveillance Video</a></p>
<p>While this is pretty humorous overall, it is fortunate that this store did have video of the incident to help the police see how the event played out.  However, the video quality is not very good and better quality video could have helped.</p>
<p>The newest generation of video surveillance cameras can provide high-definition or megapixel video quality.  And, the prices have been coming down as the technology has improved (think about how affordable high-definition televisions have become).  So, there is no need to suffer with poor quality surveillance video!  There are much better solutions available now.</p>
<p>-Scott Hightower</p>
<p><a title="Verified Security website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></content>
		<content_plain>Have you heard of Art Clokey? He was the creator of Gumby, the beloved green clay television star. He died in 2010 but October 12 would have been his 90th birthday. This is a link to his Wikipedia article: Wikipedia Entry on Art Clokey So, what does this have to do with a security blog? Alleged Gumby Robber Well, recently, a young man dressed as Gumby tried to rob a San Diego-area convenience store and the incident was captured on the store’s video surveillance system.  This is a link to ABC news video (including the video surveillance clips) about the incident: Gumby Robbery Surveillance Video While this is pretty humorous overall, it is fortunate that this store did have video of the incident to help the police see how the event played out.  However, the video quality is not very good and better quality video could have helped. The newest generation of video surveillance cameras can provide high-definition or megapixel video quality.  And, the prices have been coming down as the technology has improved (think about how affordable high-definition televisions have become).  So, there is no need to suffer with poor quality surveillance video!  There are much better solutions available now. -Scott Hightower Verified Security                    </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>10</id>
		<type>page</type>
		<url>https://verifiedsecurity.com/services/</url>
		<title>Services</title>
		<h1>Services</h1>
		<summary>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Manage the security of your facility from anywhere at any time with our convenient and flexible cloud-based systems.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_QK0tR”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”Un3mk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Facility Access Control Systems“},{“component”:”hc_space”,”id”:”UEEPF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”74DUm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our access control systems provide you with incredible flexibility to manage the security of your facilities. Whether you are responsible for a small strip mall, a church, a medium-sized office building, or a large […]</summary>
		<content><![CDATA[<p>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Manage the security of your facility from anywhere at any time with our convenient and flexible cloud-based systems.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_QK0tR”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”Un3mk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”</p>
<h3>Facility Access Control Systems&lt;\/h3&gt;“},{“component”:”hc_space”,”id”:”UEEPF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”74DUm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our access control systems provide you with incredible flexibility to manage the security of your facilities. Whether you are responsible for a small strip mall, a church, a medium-sized office building, or a large manufacturing facility \u2013 controlling access to your buildings is a critical component of managing risk today.\n\nWith our flexible cloud-based systems, you can manage access to your facility from anywhere at any time. These are some of the key features and benefits:”},{“component”:”hc_space”,”id”:”bI38o”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”tO8i1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”07Heg”,”icon”:”fa fa-chevron-right”,”text”:”Lock and unlock doors over the web or with a mobile app.”},{“component”:”repeater_item”,”id”:”JmY1t”,”icon”:”fa fa-chevron-right”,”text”:”Add and delete users and cardholders from anywhere at any time.”},{“component”:”repeater_item”,”id”:”oEDqh”,”icon”:”fa fa-chevron-right”,”text”:”Utilize reporting tools to monitor the activity at your facility.”},{“component”:”repeater_item”,”id”:”upeny”,”icon”:”fa fa-chevron-right”,”text”:”Use the mobile app to manage your facility access from anywhere.”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”IRG64″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”fKlf1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our cloud-based access control solution also integrates with camera systems and intrusion alarm systems to give you an easy-to-use unified interface for managing the security of your facility.\n\nWe also now have mobile credentials which allow you to use your smartphone instead of an access card to gain access to your facility. <a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/mobile-credentials%5C/%5C%22">For more information on mobile credentials, click on this sentence to visit our mobile credential page&lt;\/a&gt;.”},{“component”:”hc_space”,”id”:”u9kM9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_button”,”id”:”REsWP”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”left”,”animation”:false,”text”:”Learn More About Access Control Here”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/access-control-systems\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”p1nqM”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_space”,”id”:”FIp72″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_08vR2″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”SZSu2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Video Surveillance Systems&lt;\/h3&gt;“},{“component”:”hc_space”,”id”:”wQkT3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”TpDFt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Camera (also known as CCTV or Video Surveillance Systems) systems have become much more sophisticated in recent years. With the introduction of IP-based systems and megapixel images, newer security cameras can provide much more information and clarity than they could in the past.  If you haven\u2019t seen the image from a megapixel surveillance camera, contact us for a free demonstration.\n\nOur latest Digital Video Systems provide much faster access to critical video recordings than older recording solutions. These digital recording units allow you to easily search for recorded video events and can be connected via the Internet to allow you to view the video from a remote computer or a mobile device like an iPhone, Android smartphone, or tablet. Also, these newer systems allow for cloud-based recording and management.”},{“component”:”hc_space”,”id”:”EMDYI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_button”,”id”:”P2Ppn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”left”,”animation”:false,”text”:”Learn More About Video Surveillance Here”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/video-surveillance\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”TPS42″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_space”,”id”:”vS8Dl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_column”,”id”:”column_qpBqk”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”xUjDp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Intrusion Detection&lt;\/h3&gt;“},{“component”:”hc_space”,”id”:”ERvty”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”SKZN1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Today\u2019s security systems are much more advanced. With remote accessibility via the Internet or through a mobile device like an iPhone or iPad, Android device, you can arm and disarm your system from anywhere and receive emails and text messages with updates on the status of your alarm system. By utilizing a wide range of detection devices, our intrusion detection systems can give you the advanced knowledge and control you need to effectively manage the security of your organization.\n\nThese are some of the great features and benefits that come with our security systems:”},{“component”:”hc_space”,”id”:”G2PLv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”dzciz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”PSndt”,”icon”:”fa fa-chevron-right”,”text”:”<strong>Gain increased flexibility&lt;\/strong&gt; – arm and disarm your security system from anywhere at any time.”},{“component”:”repeater_item”,”id”:”4hyxY”,”icon”:”fa fa-chevron-right”,”text”:”<strong>Maintain peace of mind&lt;\/strong&gt; \u2013 check on the status of your security system from your mobile device.”},{“component”:”repeater_item”,”id”:”qT6yo”,”icon”:”fa fa-chevron-right”,”text”:”<strong>Stay connected&lt;\/strong&gt; \u2013 received email alerts when your security system is armed and disarmed or when it is in alarm.”},{“component”:”repeater_item”,”id”:”ZAubE”,”icon”:”fa fa-chevron-right”,”text”:”<strong>Real-time updates&lt;\/strong&gt; \u2013 use optional wireless cameras to view video from your secured areas.”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”MPFSH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_space”,”id”:”amFg5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_QPKob”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”udpMf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Fire Alarm Systems&lt;\/h3&gt;“},{“component”:”hc_space”,”id”:”7R7X1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”QLoiY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our advanced smoke and fire detection systems can help protect your property from damaging fires. And, the use of new broadband and wireless communication technologies have helped eliminate the need for separate telephone lines which can be expensive.\n\n\nDon\u2019t wait for a fire to interrupt the operations of your business!”},{“component”:”hc_space”,”id”:”I7X4u”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_space”,”id”:”AdMiD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]}]}],”section_settings”:””},”column_8ghI8″:{“id”:”column_8ghI8″,”main_content”:{“component”:”hc_text_block”,”id”:”Un3mk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Facility Access Control Systems&lt;\/h3&gt;“}},”column_2TWXB”:{“id”:”column_2TWXB”,”main_content”:{“component”:”hc_space”,”id”:”bI38o”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_idPIQ”:{“id”:”column_idPIQ”,”main_content”:{“component”:”hc_space”,”id”:”IRG64″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_QDNf6″:{“id”:”column_QDNf6″,”main_content”:{“component”:”hc_text_block”,”id”:”fKlf1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our cloud-based access control solution also integrates with camera systems and intrusion alarm systems to give you an easy-to-use unified interface for managing the security of your facility.\n\nWe also now have mobile credentials which allow you to use your smartphone instead of an access card to gain access to your facility. <a href="%5C%22https:%5C/%5C/verifiedsecurity.com%5C/mobile-credentials%5C/%5C%22">For more information on mobile credentials, click on this sentence to visit our mobile credential page&lt;\/a&gt;.”}},”column_UCSBX”:{“id”:”column_UCSBX”,”main_content”:{“component”:”hc_space”,”id”:”u9kM9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_Ne9DB”:{“id”:”column_Ne9DB”,”main_content”:{“component”:”hc_space”,”id”:”p1nqM”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}},”column_QzbEp”:{“id”:”column_QzbEp”,”main_content”:{“component”:”hc_space”,”id”:”FIp72″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”0j8JI”:{“id”:”0j8JI”,”main_content”:{“component”:”hc_text_block”,”id”:”SZSu2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Video Surveillance Systems&lt;\/h3&gt;“}},”X7Z8T”:{“id”:”X7Z8T”,”main_content”:{“component”:”hc_space”,”id”:”EMDYI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_3xinr”:{“id”:”column_3xinr”,”main_content”:{“component”:”hc_button”,”id”:”P2Ppn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”left”,”animation”:false,”text”:”Learn More About Video Surveillance Here”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/video-surveillance\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}},”RkrN4″:{“id”:”RkrN4″,”main_content”:{“component”:”hc_space”,”id”:”TPS42″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}},”column_ldUXV”:{“id”:”column_ldUXV”,”main_content”:{“component”:”hc_space”,”id”:”vS8Dl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”AABld”:{“id”:”AABld”,”main_content”:{“component”:”hc_text_block”,”id”:”xUjDp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Intrusion Detection&lt;\/h3&gt;“}},”kTXzI”:{“id”:”kTXzI”,”main_content”:{“component”:”hc_space”,”id”:”G2PLv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”qlg1O”:{“id”:”qlg1O”,”main_content”:{“component”:”hc_space”,”id”:”MPFSH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}},”column_oOErF”:{“id”:”column_oOErF”,”main_content”:{“component”:”hc_space”,”id”:”amFg5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”2eY0K”:{“id”:”2eY0K”,”main_content”:{“component”:”hc_text_block”,”id”:”udpMf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”
<h3>Fire Alarm Systems&lt;\/h3&gt;“}},”V5BkZ”:{“id”:”V5BkZ”,”main_content”:{“component”:”hc_space”,”id”:”I7X4u”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_Zmk3h”:{“id”:”column_Zmk3h”,”main_content”:{“component”:”hc_space”,”id”:”AdMiD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}
</h3></h3></h3></a></h3></h3></strong></strong></strong></strong></h3></h3></a></h3>]]></content>
		<content_plain>{“main-title”:{“component”:”hc_title”,”id”:”main-title”,”title”:””,”subtitle”:”Manage the security of your facility from anywhere at any time with our convenient and flexible cloud-based systems.”,”title_content”:{“component”:”hc_title_base”,”id”:”title-base”,”image”:””,”breadcrumbs”:false,”white”:false}},”section_5ZtkF”:{“component”:”hc_section”,”id”:”section_5ZtkF”,”section_width”:””,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”vertical_row”:””,”box_middle”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”section_content”:[{“component”:”hc_column”,”id”:”column_QK0tR”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”Un3mk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Facility Access Control Systems“},{“component”:”hc_space”,”id”:”UEEPF”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”74DUm”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our access control systems provide you with incredible flexibility to manage the security of your facilities. Whether you are responsible for a small strip mall, a church, a medium-sized office building, or a large manufacturing facility \u2013 controlling access to your buildings is a critical component of managing risk today.\n\nWith our flexible cloud-based systems, you can manage access to your facility from anywhere at any time. These are some of the key features and benefits:”},{“component”:”hc_space”,”id”:”bI38o”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”tO8i1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”07Heg”,”icon”:”fa fa-chevron-right”,”text”:”Lock and unlock doors over the web or with a mobile app.”},{“component”:”repeater_item”,”id”:”JmY1t”,”icon”:”fa fa-chevron-right”,”text”:”Add and delete users and cardholders from anywhere at any time.”},{“component”:”repeater_item”,”id”:”oEDqh”,”icon”:”fa fa-chevron-right”,”text”:”Utilize reporting tools to monitor the activity at your facility.”},{“component”:”repeater_item”,”id”:”upeny”,”icon”:”fa fa-chevron-right”,”text”:”Use the mobile app to manage your facility access from anywhere.”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”IRG64″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”fKlf1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our cloud-based access control solution also integrates with camera systems and intrusion alarm systems to give you an easy-to-use unified interface for managing the security of your facility.\n\nWe also now have mobile credentials which allow you to use your smartphone instead of an access card to gain access to your facility. For more information on mobile credentials, click on this sentence to visit our mobile credential page.”},{“component”:”hc_space”,”id”:”u9kM9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_button”,”id”:”REsWP”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”left”,”animation”:false,”text”:”Learn More About Access Control Here”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/access-control-systems\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”p1nqM”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_space”,”id”:”FIp72″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_08vR2″,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”SZSu2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Video Surveillance Systems“},{“component”:”hc_space”,”id”:”wQkT3″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”TpDFt”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Camera (also known as CCTV or Video Surveillance Systems) systems have become much more sophisticated in recent years. With the introduction of IP-based systems and megapixel images, newer security cameras can provide much more information and clarity than they could in the past. If you haven\u2019t seen the image from a megapixel surveillance camera, contact us for a free demonstration.\n\nOur latest Digital Video Systems provide much faster access to critical video recordings than older recording solutions. These digital recording units allow you to easily search for recorded video events and can be connected via the Internet to allow you to view the video from a remote computer or a mobile device like an iPhone, Android smartphone, or tablet. Also, these newer systems allow for cloud-based recording and management.”},{“component”:”hc_space”,”id”:”EMDYI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_button”,”id”:”P2Ppn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”left”,”animation”:false,”text”:”Learn More About Video Surveillance Here”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/video-surveillance\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false},{“component”:”hc_space”,”id”:”TPS42″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_space”,”id”:”vS8Dl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””},{“component”:”hc_column”,”id”:”column_qpBqk”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”xUjDp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Intrusion Detection“},{“component”:”hc_space”,”id”:”ERvty”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”SKZN1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Today\u2019s security systems are much more advanced. With remote accessibility via the Internet or through a mobile device like an iPhone or iPad, Android device, you can arm and disarm your system from anywhere and receive emails and text messages with updates on the status of your alarm system. By utilizing a wide range of detection devices, our intrusion detection systems can give you the advanced knowledge and control you need to effectively manage the security of your organization.\n\nThese are some of the great features and benefits that come with our security systems:”},{“component”:”hc_space”,”id”:”G2PLv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_icon_list_simple”,”id”:”dzciz”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”rows”:[{“component”:”repeater_item”,”id”:”PSndt”,”icon”:”fa fa-chevron-right”,”text”:”Gain increased flexibility – arm and disarm your security system from anywhere at any time.”},{“component”:”repeater_item”,”id”:”4hyxY”,”icon”:”fa fa-chevron-right”,”text”:”Maintain peace of mind \u2013 check on the status of your security system from your mobile device.”},{“component”:”repeater_item”,”id”:”qT6yo”,”icon”:”fa fa-chevron-right”,”text”:”Stay connected \u2013 received email alerts when your security system is armed and disarmed or when it is in alarm.”},{“component”:”repeater_item”,”id”:”ZAubE”,”icon”:”fa fa-chevron-right”,”text”:”Real-time updates \u2013 use optional wireless cameras to view video from your secured areas.”}],”alignment”:”text-left”,”icon_size”:””,”list_style”:””},{“component”:”hc_space”,”id”:”MPFSH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””},{“component”:”hc_space”,”id”:”amFg5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]},{“component”:”hc_column”,”id”:”column_QPKob”,”column_width”:”col-md-12″,”animation”:””,”animation_time”:””,”timeline_animation”:””,”timeline_delay”:””,”timeline_order”:””,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”main_content”:[{“component”:”hc_text_block”,”id”:”udpMf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Fire Alarm Systems“},{“component”:”hc_space”,”id”:”7R7X1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_text_block”,”id”:”QLoiY”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our advanced smoke and fire detection systems can help protect your property from damaging fires. And, the use of new broadband and wireless communication technologies have helped eliminate the need for separate telephone lines which can be expensive.\n\n\nDon\u2019t wait for a fire to interrupt the operations of your business!”},{“component”:”hc_space”,”id”:”I7X4u”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””},{“component”:”hc_space”,”id”:”AdMiD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}]}]}],”section_settings”:””},”column_8ghI8″:{“id”:”column_8ghI8″,”main_content”:{“component”:”hc_text_block”,”id”:”Un3mk”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Facility Access Control Systems“}},”column_2TWXB”:{“id”:”column_2TWXB”,”main_content”:{“component”:”hc_space”,”id”:”bI38o”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_idPIQ”:{“id”:”column_idPIQ”,”main_content”:{“component”:”hc_space”,”id”:”IRG64″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_QDNf6″:{“id”:”column_QDNf6″,”main_content”:{“component”:”hc_text_block”,”id”:”fKlf1″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:”Our cloud-based access control solution also integrates with camera systems and intrusion alarm systems to give you an easy-to-use unified interface for managing the security of your facility.\n\nWe also now have mobile credentials which allow you to use your smartphone instead of an access card to gain access to your facility. For more information on mobile credentials, click on this sentence to visit our mobile credential page.”}},”column_UCSBX”:{“id”:”column_UCSBX”,”main_content”:{“component”:”hc_space”,”id”:”u9kM9″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_Ne9DB”:{“id”:”column_Ne9DB”,”main_content”:{“component”:”hc_space”,”id”:”p1nqM”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}},”column_QzbEp”:{“id”:”column_QzbEp”,”main_content”:{“component”:”hc_space”,”id”:”FIp72″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”0j8JI”:{“id”:”0j8JI”,”main_content”:{“component”:”hc_text_block”,”id”:”SZSu2″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Video Surveillance Systems“}},”X7Z8T”:{“id”:”X7Z8T”,”main_content”:{“component”:”hc_space”,”id”:”EMDYI”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_3xinr”:{“id”:”column_3xinr”,”main_content”:{“component”:”hc_button”,”id”:”P2Ppn”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”icon”:””,”style”:”circle”,”size”:””,”position”:”left”,”animation”:false,”text”:”Learn More About Video Surveillance Here”,”link_type”:”classic”,”lightbox_animation”:””,”caption”:””,”inner_caption”:false,”new_window”:false,”link”:”https:\/\/verifiedsecurity.com\/video-surveillance\/”,”link_content”:[],”lightbox_size”:””,”scrollbox”:false}},”RkrN4″:{“id”:”RkrN4″,”main_content”:{“component”:”hc_space”,”id”:”TPS42″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}},”column_ldUXV”:{“id”:”column_ldUXV”,”main_content”:{“component”:”hc_space”,”id”:”vS8Dl”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”AABld”:{“id”:”AABld”,”main_content”:{“component”:”hc_text_block”,”id”:”xUjDp”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Intrusion Detection“}},”kTXzI”:{“id”:”kTXzI”,”main_content”:{“component”:”hc_space”,”id”:”G2PLv”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”qlg1O”:{“id”:”qlg1O”,”main_content”:{“component”:”hc_space”,”id”:”MPFSH”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”l”,”height”:””}},”column_oOErF”:{“id”:”column_oOErF”,”main_content”:{“component”:”hc_space”,”id”:”amFg5″,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”2eY0K”:{“id”:”2eY0K”,”main_content”:{“component”:”hc_text_block”,”id”:”udpMf”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”content”:” Fire Alarm Systems“}},”V5BkZ”:{“id”:”V5BkZ”,”main_content”:{“component”:”hc_space”,”id”:”I7X4u”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”s”,”height”:””}},”column_Zmk3h”:{“id”:”column_Zmk3h”,”main_content”:{“component”:”hc_space”,”id”:”AdMiD”,”css_classes”:””,”custom_css_classes”:””,”custom_css_styles”:””,”size”:”m”,”height”:””}},”scripts”:[],”css”:[],”css_page”:””,”template_setting”:{“settings”:{“id”:”settings”}},”template_setting_top”:[],”page_setting”:{“settings”:[“lock-mode-off”]}}</content_plain>
		<image></image>
		<modified>2021-05-18T15:14:01-04:00</modified>
	</item>
	<item>
		<id>242</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/time-to-clear-it-up/</url>
		<title>Clear Up That Grainy Video</title>
		<h1>Clear Up That Grainy Video</h1>
		<summary>Another day in Atlanta…another story of a smash and grab burglary.  These types of burglaries are very hard to stop because the burglars wait until a business is closed (usually a retail business is the target) and then smash the front window and grab everything they can in a very short period of time. So, […]</summary>
		<content><![CDATA[<p>Another day in Atlanta…<a title="AJC News Story about Smash and Grab Burglary" href="http://www.ajc.com/news/atlanta/smash-and-grab-burglars-990444.html" target="_blank" rel="noopener noreferrer">another story of a smash and grab burglary</a>.  These types of burglaries are very hard to stop because the burglars wait until a business is closed (usually a retail business is the target) and then smash the front window and grab everything they can in a very short period of time.</p>
<p>So, the best thing a business owner can do to combat this type of crime is to help the police identify the perpetrators so they can get them off of the streets.  And, a good video surveillance system is the best tool to use.</p>
<p>Unfortunately, it is all too often the case that businesses are using inferior video surveillance systems (also called CCTV systems) to protect their premises.  You have all seen the results–murky, grainy video that can’t be used to identify the bad guys.  Take a look at this video from a recent smash and grab burglary in Atlanta for an example of video that could be improved:</p>
<p><a title="Smash and Grab Video" href="http://bcove.me/693pe6bg" target="_blank" rel="noopener noreferrer">Smash and grab video</a></p>
<p>The good news is that video surveillance technology continues to improve and there are better and better alternatives available as time goes by.  You do not have to be stuck with inferior, low-quality surveillance video cameras!</p>
<p>Just as megapixel technology has transformed the still camera market, it is beginning to transform the video surveillance market.  Megalpixel IP surveillance cameras will eventually take over the entire video surveillance market and will replace traditional analog video surveillance cameras.</p>
<a href="/wp-content/uploads/2011/06/Honeywell-HCX3W-Megapixel-Camera.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-84" title="Honeywell 3 Megapixel Camera" src="/wp-content/uploads/2011/06/Honeywell-HCX3W-Megapixel-Camera-300x141.jpg" alt="Honeywell 3 Megapixel Camera" width="270" height="127"></a><p id="caption-attachment-84">Honeywell 3 Megapixel Camera</p>
<p>The difference is that megapixel IP cameras can generate much better video pictures than traditional analog surveillance cameras.</p>
<p>A traditional VGA-quality analog surveillance camera can generate a picture with approximately 300,000 pixels (pixels are picture elements).  A one megapixel IP surveillance camera can generate 1,000,000 pixels which is an increase of over 230%!</p>
<p>In the past, the challenges with IP surveillance cameras have been cost, bandwidth requirements, and storage requirements.  One by one, these challenges have been overcome.  While megapixel IP surveillance cameras are a bit more expensive than analog cameras, the cost of megapixel cameras has come down dramatically and they are much more affordable now.  Since the megapixel cameras use Internet Protocol (IP) transmission, the cost of cabling for these cameras is also lower.  And, with the availability of more sophisticated encoding methods (like H.264), the bandwidth and storage requirements have been reduced significantly.</p>
<p>So, we believe that now is the time to explore the possibilities of megapixel IP cameras.  The good news is that it is not necessary to completely convert an existing system to all megapixel IP cameras.  There are hardware options available that allow us to mix and match analog and IP cameras and standard resolution cameras with megapixel resolution surveillance cameras.</p>
<p>One example is the RapidEye Hybrid Video Recording system from Honeywell (see picture below).</p>
<a href="/wp-content/uploads/2011/06/Honeywell-REMM-DSP-v8.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-83" title="Honeywell RapidEye DVR" src="/wp-content/uploads/2011/06/Honeywell-REMM-DSP-v8-300x119.jpg" alt="Honeywell RapidEye DVR" width="300" height="119"></a><p id="caption-attachment-83">Honeywell RapidEye DVR</p>
<p>This is an easy-to-use system that we can install that can record and manage traditional analog surveillance cameras alongside newer IP surveillance cameras.  Honeywell has a line of megapixel IP cameras that are fully compatible with the RapidEye recording system.</p>
<p>So, there are options that can help you dramatically improve the quality of your video surveillance systems.  And, the best part is that all of these systems can be viewed remotely over the Internet so you can keep tabs on what is happening real-time.</p>
<p>We are here to help – let us know if you have questions or want to see a product demonstration.</p>
<p>It is time to clear up that grainy video!</p>
<p>-Scott Hightower, <a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>Another day in Atlanta…another story of a smash and grab burglary.  These types of burglaries are very hard to stop because the burglars wait until a business is closed (usually a retail business is the target) and then smash the front window and grab everything they can in a very short period of time. So, the best thing a business owner can do to combat this type of crime is to help the police identify the perpetrators so they can get them off of the streets.  And, a good video surveillance system is the best tool to use. Unfortunately, it is all too often the case that businesses are using inferior video surveillance systems (also called CCTV systems) to protect their premises.  You have all seen the results–murky, grainy video that can’t be used to identify the bad guys.  Take a look at this video from a recent smash and grab burglary in Atlanta for an example of video that could be improved: Smash and grab video The good news is that video surveillance technology continues to improve and there are better and better alternatives available as time goes by.  You do not have to be stuck with inferior, low-quality surveillance video cameras! Just as megapixel technology has transformed the still camera market, it is beginning to transform the video surveillance market.  Megalpixel IP surveillance cameras will eventually take over the entire video surveillance market and will replace traditional analog video surveillance cameras. Honeywell 3 Megapixel Camera The difference is that megapixel IP cameras can generate much better video pictures than traditional analog surveillance cameras. A traditional VGA-quality analog surveillance camera can generate a picture with approximately 300,000 pixels (pixels are picture elements).  A one megapixel IP surveillance camera can generate 1,000,000 pixels which is an increase of over 230%! In the past, the challenges with IP surveillance cameras have been cost, bandwidth requirements, and storage requirements.  One by one, these challenges have been overcome.  While megapixel IP surveillance cameras are a bit more expensive than analog cameras, the cost of megapixel cameras has come down dramatically and they are much more affordable now.  Since the megapixel cameras use Internet Protocol (IP) transmission, the cost of cabling for these cameras is also lower.  And, with the availability of more sophisticated encoding methods (like H.264), the bandwidth and storage requirements have been reduced significantly. So, we believe that now is the time to explore the possibilities of megapixel IP cameras.  The good news is that it is not necessary to completely convert an existing system to all megapixel IP cameras.  There are hardware options available that allow us to mix and match analog and IP cameras and standard resolution cameras with megapixel resolution surveillance cameras. One example is the RapidEye Hybrid Video Recording system from Honeywell (see picture below). Honeywell RapidEye DVR This is an easy-to-use system that we can install that can record and manage traditional analog surveillance cameras alongside newer IP surveillance cameras.  Honeywell has a line of megapixel IP cameras that are fully compatible with the RapidEye recording system. So, there are options that can help you dramatically improve the quality of your video surveillance systems.  And, the best part is that all of these systems can be viewed remotely over the Internet so you can keep tabs on what is happening real-time. We are here to help – let us know if you have questions or want to see a product demonstration. It is time to clear up that grainy video! -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2021-04-06T16:10:22-04:00</modified>
	</item>
	<item>
		<id>241</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/more-arrests-in-metro-atlanta-for-copper-theft/</url>
		<title>More Arrests in Metro Atlanta for Copper Theft</title>
		<h1>More Arrests in Metro Atlanta for Copper Theft</h1>
		<summary>The bad guys are at it again.  In a recent post, I talked about the increase in copper theft incidents in metro Atlanta.  There is another article today in the Atlanta Journal-Constitution about the problem in the metro area.  This is one part of the article that caught my eye: “City of Atlanta police officers […]</summary>
		<content><![CDATA[<p>The bad guys are at it again.  In a <a title="Copper Theft on the Rise Again" href="/blog/?p=66" target="_blank" rel="noopener noreferrer">recent post</a>, I talked about the increase in copper theft incidents in metro Atlanta.  There is another <a title="AJC Article about Copper Theft" href="http://www.ajc.com/news/a-c-copper-thefts-983615.html" target="_blank" rel="noopener noreferrer">article</a> today in the Atlanta Journal-Constitution about the problem in the metro area.  This is one part of the article that caught my eye:</p>
<p>“City of Atlanta police officers have responded to 150 incidents involving copper thefts just in the month of June, according to crime statistics obtained by the AJC. The crimes have prompted the police department to reach out to church leaders to discuss ways of preventing further thefts, Carlos Campos, spokesman for Atlanta police, said.</p>
<p>‘Churches, particularly the smaller ones, make for opportunistic targets because they are generally occupied only on Sundays and Wednesday evenings,’ Campos said.”</p>
<p>The problem is that not only do you want to be left without air conditioning this summer but it can cost at least $3,000 to repair the damage from copper theft.  It is much better to try to prevent copper theft than deal with the aftermath.</p>
<p>There is a <a title="Metro Atlanta Copper Theft Task Force" href="http://taskforce.controlbynet.com/" target="_blank" rel="noopener noreferrer">task force</a> in metro Atlanta that is working on copper theft prevention.  The challenge is that copper tubing and copper wire theft are hard to combat because there are typically no markings on the copper tube and on copper wire.</p>
<p>As I discussed in my <a title="Copper Theft on the Rise Again" href="/blog/?p=66" target="_blank" rel="noopener noreferrer">earlier post</a>, there are actions you can take to prevent copper theft.  They range from building metal cages to protect air conditioners to a variety of electronic security technologies that can be used.</p>
<p>Now is the time to talk to your security company about copper theft prevention before you become a victim.</p>
<p>-Scott Hightower, <a href="https://verifiedsecurity.com/" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
]]></content>
		<content_plain>The bad guys are at it again.  In a recent post, I talked about the increase in copper theft incidents in metro Atlanta.  There is another article today in the Atlanta Journal-Constitution about the problem in the metro area.  This is one part of the article that caught my eye: “City of Atlanta police officers have responded to 150 incidents involving copper thefts just in the month of June, according to crime statistics obtained by the AJC. The crimes have prompted the police department to reach out to church leaders to discuss ways of preventing further thefts, Carlos Campos, spokesman for Atlanta police, said. ‘Churches, particularly the smaller ones, make for opportunistic targets because they are generally occupied only on Sundays and Wednesday evenings,’ Campos said.” The problem is that not only do you want to be left without air conditioning this summer but it can cost at least $3,000 to repair the damage from copper theft.  It is much better to try to prevent copper theft than deal with the aftermath. There is a task force in metro Atlanta that is working on copper theft prevention.  The challenge is that copper tubing and copper wire theft are hard to combat because there are typically no markings on the copper tube and on copper wire. As I discussed in my earlier post, there are actions you can take to prevent copper theft.  They range from building metal cages to protect air conditioners to a variety of electronic security technologies that can be used. Now is the time to talk to your security company about copper theft prevention before you become a victim. -Scott Hightower, Verified Security</content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>240</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/copper-theft-on-the-rise-again/</url>
		<title>Copper Theft on the Rise Again</title>
		<h1>Copper Theft on the Rise Again</h1>
		<summary>With copper prices at a level approximately thirty percent higher than they were a year ago, thieves are continuing to target this metal for theft.  Scrap copper, copper wiring, and air conditioning units have all been stolen in recent months throughout metro Atlanta. As you can read about in this recent article from the Atlanta […]</summary>
		<content><![CDATA[<p>With copper prices at a level approximately thirty percent higher than they were a year ago, thieves are continuing to target this metal for theft.  Scrap copper, copper wiring, and air conditioning units have all been stolen in recent months throughout metro Atlanta.</p>
<p>As you can read about in this <a title="AJC Article about Copper Theft" href="http://www.ajc.com/news/north-fulton/arrest-made-in-church-971026.html?cxtype=rss_news_128746" target="_blank" rel="noopener noreferrer">recent article from the Atlanta Journal-Constitution (AJC) newspaper</a>, air conditioning units were stolen from Roswell Street Baptist Church.  How would like to show up at your church, business, or home and find out you have no air conditioning or heating?</p>
<p>So, what can you do?</p>
<p>There are a number of ways to secure air conditioning units and to prevent copper theft.  One option would be to use verified video systems like Videofied which we profiled in an earlier blog post.  Another solution is to use <a title="Honeywell Outdoor Motion Detectors" href="http://www.security.honeywell.com/hsc/products/wireless/mo/258579.html" target="_blank" rel="noopener noreferrer">outdoor motion detectors from security system manufacturers like Honeywell</a>.  A third solution would be to use <a title="Honeywell Sensor" href="http://www.security.honeywell.com/hsc/products/wireless/ap/261772.html" target="_blank" rel="noopener noreferrer">specialized sensors</a> that can be connected to air conditioning units and linked back to your security system.  These sensors would activate the security system when triggered.</p>
<a href="/wp-content/uploads/2011/06/5800PIR-OD-Motion-Detector-Image.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-69" title="5800PIR-OD Motion Detector Image" src="/wp-content/uploads/2011/06/5800PIR-OD-Motion-Detector-Image-202x300.jpg" alt="Honeywell Motion Detector" width="202" height="300"></a><p id="caption-attachment-69">Honeywell Outdoor Motion Detector</p>
<p>Any of these solutions can be used individually or together to prevent copper theft.  If you have unprotected air conditioning units, you should talk to your security systems company today to find out more about the options.</p>
<p>-Scott Hightower, <a title="Verified Security" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">Verified Security</a></p>
<p> </p>
]]></content>
		<content_plain>With copper prices at a level approximately thirty percent higher than they were a year ago, thieves are continuing to target this metal for theft.  Scrap copper, copper wiring, and air conditioning units have all been stolen in recent months throughout metro Atlanta. As you can read about in this recent article from the Atlanta Journal-Constitution (AJC) newspaper, air conditioning units were stolen from Roswell Street Baptist Church.  How would like to show up at your church, business, or home and find out you have no air conditioning or heating? So, what can you do? There are a number of ways to secure air conditioning units and to prevent copper theft.  One option would be to use verified video systems like Videofied which we profiled in an earlier blog post.  Another solution is to use outdoor motion detectors from security system manufacturers like Honeywell.  A third solution would be to use specialized sensors that can be connected to air conditioning units and linked back to your security system.  These sensors would activate the security system when triggered. Honeywell Outdoor Motion Detector Any of these solutions can be used individually or together to prevent copper theft.  If you have unprotected air conditioning units, you should talk to your security systems company today to find out more about the options. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>239</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/man-living-on-roof-of-waffle-house/</url>
		<title>Man Living on Roof of Waffle House</title>
		<h1>Man Living on Roof of Waffle House</h1>
		<summary>Did you see the recent news about the man that was found living on top of a Waffle House in Augusta, Georgia?  If you didn’t see any of the original news articles, here is a link to one of them: http://blogs.ajc.com/news-to-me/2011/05/11/man-found-living-atop-georgia-waffle-house/ So, this raises several questions.  First, why would someone choose to live on top […]</summary>
		<content><![CDATA[<p>Did you see the recent news about the man that was found living on top of a Waffle House in Augusta, Georgia?  If you didn’t see any of the original news articles, here is a link to one of them:</p>
<p><a title="Man Living on Waffle House Roof" href="http://blogs.ajc.com/news-to-me/2011/05/11/man-found-living-atop-georgia-waffle-house/" target="_blank" rel="noopener noreferrer">http://blogs.ajc.com/news-to-me/2011/05/11/man-found-living-atop-georgia-waffle-house/</a></p>
<p>So, this raises several questions.  First, why would someone choose to live on top of a Waffle House in the heat we have been experiencing in Georgia lately?</p>
<p>The second question is about safety.  Is it really safe for someone to live on the roof of a Waffle House?  Probably not.</p>
<p>The next question in my mind is about security.  What sort of security system did the Waffle House have and was their roof protected?  In our experience, many business owners and managers do not think about securing their roofs when they have a security system installed.  But, the roof can be an area of great vulnerability if it is not protected.</p>
<p>In the past, many burglaries have begun with the crooks entering through the roof.  They know that the roof and ceilings are often unprotected by the security system.  But, all is not lost.  It is possible to protect your roof and/or your ceiling.  There are <a title="Honeywell Outdoor Motion Detector" href="http://www.security.honeywell.com/hsc/products/wireless/mo/258579.html" target="_blank" rel="noopener noreferrer">outdoor motion detectors from Honeywell</a> as well as outdoor MotionViewers from Videofied (<a title="Blog Post on Videofied" href="/blog/?p=11" target="_blank" rel="noopener noreferrer">see my earlier blog post to learn more about Videofied</a>).</p>
<p>So, there are solutions that can be used to protect your roof.  You just have to know what to ask for!</p>
<p>-Scott Hightower, Verified Security</p>
<p><a title="Verified Security Website" href="https://verifiedsecurity.com" target="_blank" rel="noopener noreferrer">https://verifiedsecurity.com</a></p>
<p> </p>
]]></content>
		<content_plain>Did you see the recent news about the man that was found living on top of a Waffle House in Augusta, Georgia?  If you didn’t see any of the original news articles, here is a link to one of them: http://blogs.ajc.com/news-to-me/2011/05/11/man-found-living-atop-georgia-waffle-house/ So, this raises several questions.  First, why would someone choose to live on top of a Waffle House in the heat we have been experiencing in Georgia lately? The second question is about safety.  Is it really safe for someone to live on the roof of a Waffle House?  Probably not. The next question in my mind is about security.  What sort of security system did the Waffle House have and was their roof protected?  In our experience, many business owners and managers do not think about securing their roofs when they have a security system installed.  But, the roof can be an area of great vulnerability if it is not protected. In the past, many burglaries have begun with the crooks entering through the roof.  They know that the roof and ceilings are often unprotected by the security system.  But, all is not lost.  It is possible to protect your roof and/or your ceiling.  There are outdoor motion detectors from Honeywell as well as outdoor MotionViewers from Videofied (see my earlier blog post to learn more about Videofied). So, there are solutions that can be used to protect your roof.  You just have to know what to ask for! -Scott Hightower, Verified Security https://verifiedsecurity.com  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>238</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/how-loud-is-your-smoke-detector/</url>
		<title>How Loud is Your Smoke Detector?</title>
		<h1>How Loud is Your Smoke Detector?</h1>
		<summary>How loud is your smoke detector?  You might be wondering why it matters.  I often talk to business owners and homeowners who think they have enough coverage with battery-powered smoke detectors that are not monitored.  By saying “monitored,” I mean smoke detectors that are tied into an alarm system that will report any alarm signals […]</summary>
		<content><![CDATA[<p>How loud is your smoke detector?  You might be wondering why it matters.  I often talk to business owners and homeowners who think they have enough coverage with battery-powered smoke detectors that are not monitored.  By saying “monitored,” I mean smoke detectors that are tied into an alarm system that will report any alarm signals (like smoke and fire alarms) to a monitoring center so that the appropriate authorities can be notified.</p>
<a href="/wp-content/uploads/2011/06/Firelite-AD-355-Smoke-Detector.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-52" title="Firelite Smoke Detector" src="/wp-content/uploads/2011/06/Firelite-AD-355-Smoke-Detector-300x185.jpg" alt="Smoke Detector Image" width="300" height="185"></a><p id="caption-attachment-52">Smoke Detector</p>
<p>I ask them: “Have you considered adding monitored smoke detectors to your alarm system?”  They say: “I don’t need those–I have battery-powered smoke detectors so I will know when there is a fire.”  I then say: “I hope your smoke detectors are very loud.”  At this point, I usually get a quizzical look.</p>
<p>I go on to say that battery-powered smoke detectors are incredibly important safety devices.  But, they won’t do anything to save your home or business if a fire breaks out <span style="text-decoration: underline;">when you are not at home or inside your business</span>.</p>
<p>There is a recent example from the metro Atlanta news that illustrates why it is important to have monitored smoke detectors as part of a fire alarm system.  The article from the Atlanta Journal-Constitution newspaper describes the sad story of a Romanian church located in Dacula that experienced a recent fire.  This is the link to the article:</p>
<p><a href="http://www.ajc.com/news/gwinnett/fire-ruins-dream-for-936097.html" target="_blank" rel="noopener noreferrer">http://www.ajc.com/news/gwinnett/fire-ruins-dream-for-936097.html</a></p>
<p>The article provides many details but this is what caught my eye:</p>
<p>“Gwinnett fire Capt. Tommy Rutledge said a passerby reported a fire at the church in the 2800 block of Winder Highway about 8:30 a.m.”</p>
<p>Did you read it carefully?  <span style="text-decoration: underline;">A passerby reported the fire.</span> If the church had installed smoke detectors that were part of a monitored fire alarm system, it is likely the fire would have been detected sooner and that the fire department would have been dispatched more quickly.</p>
<p>I feel terrible for the leaders of the church.  All of their hard work went up in smoke.  Let’s make sure this doesn’t happen to you.  Even if you have insurance for your home and business,  you need to think about the significant disruption that is caused by a fire.’</p>
<p>In a <a title="NFPA Report" href="http://www.nfpa.org/assets/files//OS.StructureFiresOccupancy.pdf" target="_blank" rel="noopener noreferrer">recent report</a>, the National Fire Protection Association (<a title="National Fire Protection Association" href="http://www.nfpa.org" target="_blank" rel="noopener noreferrer">www.nfpa.org</a>) reported that there was an average of 512,200 structure fires per year (based on data from 2005-2009).  That is a lot of fires!</p>
<p>So, don’t be surprised by fire.  Have your trusted security or fire protection company install monitored smoke detection in your home or business.  It adds a little extra expense but greatly increases your peace of mind!</p>
<p>-Scott Hightower, Verified Security</p>
<p><a href="https://verifiedsecurity.com/" target="_blank" rel="noopener noreferrer">https://verifiedsecurity.com</a></p>
<p> </p>
]]></content>
		<content_plain>How loud is your smoke detector?  You might be wondering why it matters.  I often talk to business owners and homeowners who think they have enough coverage with battery-powered smoke detectors that are not monitored.  By saying “monitored,” I mean smoke detectors that are tied into an alarm system that will report any alarm signals (like smoke and fire alarms) to a monitoring center so that the appropriate authorities can be notified. Smoke Detector I ask them: “Have you considered adding monitored smoke detectors to your alarm system?”  They say: “I don’t need those–I have battery-powered smoke detectors so I will know when there is a fire.”  I then say: “I hope your smoke detectors are very loud.”  At this point, I usually get a quizzical look. I go on to say that battery-powered smoke detectors are incredibly important safety devices.  But, they won’t do anything to save your home or business if a fire breaks out when you are not at home or inside your business. There is a recent example from the metro Atlanta news that illustrates why it is important to have monitored smoke detectors as part of a fire alarm system.  The article from the Atlanta Journal-Constitution newspaper describes the sad story of a Romanian church located in Dacula that experienced a recent fire.  This is the link to the article: http://www.ajc.com/news/gwinnett/fire-ruins-dream-for-936097.html The article provides many details but this is what caught my eye: “Gwinnett fire Capt. Tommy Rutledge said a passerby reported a fire at the church in the 2800 block of Winder Highway about 8:30 a.m.” Did you read it carefully?  A passerby reported the fire. If the church had installed smoke detectors that were part of a monitored fire alarm system, it is likely the fire would have been detected sooner and that the fire department would have been dispatched more quickly. I feel terrible for the leaders of the church.  All of their hard work went up in smoke.  Let’s make sure this doesn’t happen to you.  Even if you have insurance for your home and business,  you need to think about the significant disruption that is caused by a fire.’ In a recent report, the National Fire Protection Association (www.nfpa.org) reported that there was an average of 512,200 structure fires per year (based on data from 2005-2009).  That is a lot of fires! So, don’t be surprised by fire.  Have your trusted security or fire protection company install monitored smoke detection in your home or business.  It adds a little extra expense but greatly increases your peace of mind! -Scott Hightower, Verified Security https://verifiedsecurity.com  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>237</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/protect-your-roof-from-burglars/</url>
		<title>Protect Your Roof From Burglars</title>
		<h1>Protect Your Roof From Burglars</h1>
		<summary>Well, the criminals are at it again!  In recent metro Atlanta crime news, I saw an article about a business burglary at the Ambush Boarding Company (interesting name in light of the news).  There are burglaries at businesses every day in Atlanta.  But, what makes this one somewhat unique is that the burglars climbed onto […]</summary>
		<content><![CDATA[<p>Well, the criminals are at it again!  In recent metro Atlanta crime news, I saw an article about a business burglary at the Ambush Boarding Company (interesting name in light of the news).  There are burglaries at businesses every day in Atlanta.  But, what makes this one somewhat unique is that the burglars climbed onto the roof and entered the business through the ceiling.  For more details about the burglary, you can view the article online at the Marietta Daily Journal:</p>
<p><a title="Crime Article from Marietta Daily Journal" href="http://mdjonline.com/bookmark/13132030" target="_blank" rel="noopener noreferrer">http://mdjonline.com/bookmark/13132030</a></p>
<p>Unfortunately, it is not that uncommon for burglars to enter a business from the roof or to steal objects (such as air conditioners) from your roof.  Is your roof protected?  There are a number of tools that can be used to protect a roof and ceiling from unlawful entry.  Videofied is one product that can be used.  You can see our <a title="Videofied Blog Post" href="/blog/?p=11" target="_blank" rel="noopener noreferrer">previous blog entry</a> to learn how Videofied works in more detail.  Essentially, the system uses MotionViewers that record short video clips when motion is detected and transmits them to our monitoring center so that an alarm monitoring center agent can review the video to determine if there is a crime in progress.  It is a very effective video verification system.  You can see some actual Videofied video clips on our <a title="Verified Security YouTube Site" href="http://www.youtube.com/remoteprotectionsys" target="_blank" rel="noopener noreferrer">YouTube page</a>.</p>
<p>Another tool that can be used to protect a business is conventional motion detection as part of a commercial alarm system.  Outdoor motion detectors can be installed on the roof to identify movement before a crook can enter the business.  And, indoor motion detectors can be installed inside a suspended ceiling to catch those who make it through the roof.</p>
<p>To protect air conditioning systems on the roofs of buildings from theft, we have a great tool from Honeywell security called a Wireless Asset Protection sensor.  This is a wireless, battery-powered security sensor that can be attached to anything that you wish to protect and which will report an alarm if that object is moved.</p>
<p>So, while the unfortunate owners at Ambush Boarding Company didn’t have a security system at their business, there are tools that can help them protect their assets in the future.  The shame of it is the Ambush Boarding Company had a burglary about eight weeks prior to this one and chose not to install a commercial security system.  Maybe now they will put some of these great security tools to work.</p>
<p>-Scott Hightower</p>
<p> </p>
]]></content>
		<content_plain>Well, the criminals are at it again!  In recent metro Atlanta crime news, I saw an article about a business burglary at the Ambush Boarding Company (interesting name in light of the news).  There are burglaries at businesses every day in Atlanta.  But, what makes this one somewhat unique is that the burglars climbed onto the roof and entered the business through the ceiling.  For more details about the burglary, you can view the article online at the Marietta Daily Journal: http://mdjonline.com/bookmark/13132030 Unfortunately, it is not that uncommon for burglars to enter a business from the roof or to steal objects (such as air conditioners) from your roof.  Is your roof protected?  There are a number of tools that can be used to protect a roof and ceiling from unlawful entry.  Videofied is one product that can be used.  You can see our previous blog entry to learn how Videofied works in more detail.  Essentially, the system uses MotionViewers that record short video clips when motion is detected and transmits them to our monitoring center so that an alarm monitoring center agent can review the video to determine if there is a crime in progress.  It is a very effective video verification system.  You can see some actual Videofied video clips on our YouTube page. Another tool that can be used to protect a business is conventional motion detection as part of a commercial alarm system.  Outdoor motion detectors can be installed on the roof to identify movement before a crook can enter the business.  And, indoor motion detectors can be installed inside a suspended ceiling to catch those who make it through the roof. To protect air conditioning systems on the roofs of buildings from theft, we have a great tool from Honeywell security called a Wireless Asset Protection sensor.  This is a wireless, battery-powered security sensor that can be attached to anything that you wish to protect and which will report an alarm if that object is moved. So, while the unfortunate owners at Ambush Boarding Company didn’t have a security system at their business, there are tools that can help them protect their assets in the future.  The shame of it is the Ambush Boarding Company had a burglary about eight weeks prior to this one and chose not to install a commercial security system.  Maybe now they will put some of these great security tools to work. -Scott Hightower  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>236</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/even-the-police-need-security/</url>
		<title>Even the Police Need Security</title>
		<h1>Even the Police Need Security</h1>
		<summary>If you ever question the need to regularly evaluate your security systems and level of protection, take a look at this recent story from the metro Atlanta crime reports: http://www.ajc.com/news/dekalb/thieves-break-into-36-935479.html The DeKalb County Police Department experienced a burglary at their maintenance facility that housed thirty-six police cars.  I don’t know about you but I don’t […]</summary>
		<content><![CDATA[<p>If you ever question the need to regularly evaluate your security systems and level of protection, take a look at this recent story from the metro Atlanta crime reports:</p>
<p><a href="http://www.ajc.com/news/dekalb/thieves-break-into-36-935479.html" target="_blank" rel="noopener noreferrer">http://www.ajc.com/news/dekalb/thieves-break-into-36-935479.html</a></p>
<p>The DeKalb County Police Department experienced a burglary at their maintenance facility that housed thirty-six police cars.  I don’t know about you but I don’t think I would have chosen a police department facility as my primary target for a burglary.  Of course, I am not a burglar.  What does this say about the state of mind of the criminals in Atlanta?</p>
<p>This example shows us why a security guard walking a beat is not always an effective way to prevent crime.  The good news is that there are better and better security products and tools available that can be used to secure your home and business against theft and burglary.</p>
<a href="/wp-content/uploads/2011/05/MotionViewer-on-Pole1.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-36" title="Videofied MotionViewer on Pole" src="/wp-content/uploads/2011/05/MotionViewer-on-Pole1-300x235.jpg" alt="Image of Videofied MotionViewer" width="300" height="235"></a><p id="caption-attachment-36">Videofied MotionViewer</p>
<p>One example of an innovative product that could be used to protect an outdoor vehicle yard or similar type facility is <a title="Videofied Home Page" href="http://www.videofied.com/" target="_blank" rel="noopener noreferrer">Videofied</a>.  Videofied is a system that uses MotionViewers to detect motion and to record video clips at the same time.  If motion is detected when the system is armed, a ten to twenty second video clip is recorded by the MotionViewer and then transmitted to our alarm monitoring center.  Our highly-trained representatives can then view the clip to determine if the motion was caused by a stray dog or if it was a burglar breaking into police cars parked in a maintenance yard.  Our experience has been that the police tend to respond faster to verified crimes in progress than to non-verified alarm system signals.</p>
<p>Videofied is a highly-effective system that can prevent false police dispatches and can help to catch criminals in the act of committing crimes.  Videofied is the only security system endorsed by the <a href="http://www.sheriffs.org/" target="_blank" rel="noopener noreferrer">National Sheriffs’ Association</a>.</p>
<p>If you would like to see some video clips of Videofied in action,  you can visit our YouTube page at <a href="http://www.youtube.com/user/RemoteProtectionSys" target="_blank" rel="noopener noreferrer">http://www.youtube.com/user/RemoteProtectionSys</a>.</p>
<p>This is a great solution that is making security more effective while also preventing false dispatches of police officers to homes and businesses that are secure.  Let us know if you would like a free Videofied system demonstration.</p>
<p>As always, please give us feedback on these posts.  If there are topics you want us to cover, let us know that too.</p>
<p>-Scott Hightower, Verified Security</p>
<p> </p>
]]></content>
		<content_plain>If you ever question the need to regularly evaluate your security systems and level of protection, take a look at this recent story from the metro Atlanta crime reports: http://www.ajc.com/news/dekalb/thieves-break-into-36-935479.html The DeKalb County Police Department experienced a burglary at their maintenance facility that housed thirty-six police cars.  I don’t know about you but I don’t think I would have chosen a police department facility as my primary target for a burglary.  Of course, I am not a burglar.  What does this say about the state of mind of the criminals in Atlanta? This example shows us why a security guard walking a beat is not always an effective way to prevent crime.  The good news is that there are better and better security products and tools available that can be used to secure your home and business against theft and burglary. Videofied MotionViewer One example of an innovative product that could be used to protect an outdoor vehicle yard or similar type facility is Videofied.  Videofied is a system that uses MotionViewers to detect motion and to record video clips at the same time.  If motion is detected when the system is armed, a ten to twenty second video clip is recorded by the MotionViewer and then transmitted to our alarm monitoring center.  Our highly-trained representatives can then view the clip to determine if the motion was caused by a stray dog or if it was a burglar breaking into police cars parked in a maintenance yard.  Our experience has been that the police tend to respond faster to verified crimes in progress than to non-verified alarm system signals. Videofied is a highly-effective system that can prevent false police dispatches and can help to catch criminals in the act of committing crimes.  Videofied is the only security system endorsed by the National Sheriffs’ Association. If you would like to see some video clips of Videofied in action,  you can visit our YouTube page at http://www.youtube.com/user/RemoteProtectionSys. This is a great solution that is making security more effective while also preventing false dispatches of police officers to homes and businesses that are secure.  Let us know if you would like a free Videofied system demonstration. As always, please give us feedback on these posts.  If there are topics you want us to cover, let us know that too. -Scott Hightower, Verified Security  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>235</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/fight-crime-with-facebook/</url>
		<title>Fight Crime with Facebook</title>
		<h1>Fight Crime with Facebook</h1>
		<summary>We were sent a link to an interesting story from ABC News this past week.  The story was about how homeowners are using video surveillance cameras to capture video of burglaries and other crimes at their homes and then posting the video clips on Facebook to try to identify the bad guys.  Here is the […]</summary>
		<content><![CDATA[<p>We were sent a link to an interesting story from ABC News this past week.  The story was about how homeowners are using video surveillance cameras to capture video of burglaries and other crimes at their homes and then posting the video clips on Facebook to try to identify the bad guys.  Here is the link to the story:</p>
<p><a href="http://abcnews.go.com/GMA/video/facebook-fight-crime-13398253">http://abcnews.go.com/GMA/video/facebook-fight-crime-13398253</a></p>
<p>We believe that this really is an interesting use of social media that benefits the greater good.  It is a high-tech version of neighborhood watch!  The criminals need to know that breaking into someone’s home is not okay and they will be tracked down.</p>
<p>In Atlanta where we are located, there was another story in the local news in 2009 about a break-in that was caught on camera.  The homeowners posted the video on YouTube and the criminals were caught.  Score one for the good guys.  This is the link to that story:</p>
<p><a href="http://www.ajc.com/news/atlanta/homeowners-cops-battle-burglars-128223.html">http://www.ajc.com/news/atlanta/homeowners-cops-battle-burglars-128223.html</a></p>
<p>The combination of online tools such as YouTube and Facebook along with video from good video surveillance systems can be effective tools for identifying criminals.  Video surveillance systems don’t have to be expensive.  You can start with as little as one camera and then expand your system over time.  It is another weapon in the crime-fighting arsenal!</p>
<p> </p>
]]></content>
		<content_plain>We were sent a link to an interesting story from ABC News this past week.  The story was about how homeowners are using video surveillance cameras to capture video of burglaries and other crimes at their homes and then posting the video clips on Facebook to try to identify the bad guys.  Here is the link to the story: http://abcnews.go.com/GMA/video/facebook-fight-crime-13398253 We believe that this really is an interesting use of social media that benefits the greater good.  It is a high-tech version of neighborhood watch!  The criminals need to know that breaking into someone’s home is not okay and they will be tracked down. In Atlanta where we are located, there was another story in the local news in 2009 about a break-in that was caught on camera.  The homeowners posted the video on YouTube and the criminals were caught.  Score one for the good guys.  This is the link to that story: http://www.ajc.com/news/atlanta/homeowners-cops-battle-burglars-128223.html The combination of online tools such as YouTube and Facebook along with video from good video surveillance systems can be effective tools for identifying criminals.  Video surveillance systems don’t have to be expensive.  You can start with as little as one camera and then expand your system over time.  It is another weapon in the crime-fighting arsenal!  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>234</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/portable-electronics-are-easy-targets-for-theft/</url>
		<title>Portable Electronics Are Easy Targets for Theft</title>
		<h1>Portable Electronics Are Easy Targets for Theft</h1>
		<summary>We all know that electronics are getting smaller all of the time.  Televisions are flatter and lighter.  Projectors and smaller and brighter.  This makes them more portable and easier to steal.  We regularly hear from our customers about thefts of expensive electronic devices.  It is frustrating! But, there are ways to help prevent the theft […]</summary>
		<content><![CDATA[<p>We all know that electronics are getting smaller all of the time.  Televisions are flatter and lighter.  Projectors and smaller and brighter.  This makes them more portable and easier to steal.  We regularly hear from our customers about thefts of expensive electronic devices.  It is frustrating!</p>
<p>But, there are ways to help prevent the theft of your electronic devices.  First, try not to leave them in unattended areas.  The presence of people in an area is a great deterrent to crime.</p>
<p>Second, there are physical means you can use to protect your equipment.  The most basic is some sort of lock with a cable.  These are available for laptops, televisions, projectors, and other devices that are fairly easy to carry.</p>
<p>Third, there are electronic means to protect your electronics.  In the past, a monitored security system could protect an area where electronic hardware is stored.  That would work well if all of the equipment was stored all of the time.  But, it usually isn’t!  Often, the equipment is in an office, classroom, or other space that the public may be able to access.</p>
<p>There are new options available.  On such option is to use a wireless sensor to protect your electronics.  As an example, Honeywell Security makes a sensor they call the Wireless Asset Protection Sensor.  This is a battery-powered sensor that can be attached to anything and can be programmed to sound an alarm if the protected device is moved.  It is a great option because it can be used to prevent equipment from “walking away” during regular business hours.  It is a great option to protect  your valuable electronics.  A picture of the device is below.</p>
<p> <a href="/wp-content/uploads/2011/04/5870API_WH_1_hi4.jpg"><img loading="lazy" decoding="async" title="Wireless Asset Protection Sensor" src="/wp-content/uploads/2011/04/5870API_WH_1_hi4-300x279.jpg" alt="Wireless Asset Protection Sensor" width="300" height="279"></a></p>
]]></content>
		<content_plain>We all know that electronics are getting smaller all of the time.  Televisions are flatter and lighter.  Projectors and smaller and brighter.  This makes them more portable and easier to steal.  We regularly hear from our customers about thefts of expensive electronic devices.  It is frustrating! But, there are ways to help prevent the theft of your electronic devices.  First, try not to leave them in unattended areas.  The presence of people in an area is a great deterrent to crime. Second, there are physical means you can use to protect your equipment.  The most basic is some sort of lock with a cable.  These are available for laptops, televisions, projectors, and other devices that are fairly easy to carry. Third, there are electronic means to protect your electronics.  In the past, a monitored security system could protect an area where electronic hardware is stored.  That would work well if all of the equipment was stored all of the time.  But, it usually isn’t!  Often, the equipment is in an office, classroom, or other space that the public may be able to access. There are new options available.  On such option is to use a wireless sensor to protect your electronics.  As an example, Honeywell Security makes a sensor they call the Wireless Asset Protection Sensor.  This is a battery-powered sensor that can be attached to anything and can be programmed to sound an alarm if the protected device is moved.  It is a great option because it can be used to prevent equipment from “walking away” during regular business hours.  It is a great option to protect  your valuable electronics.  A picture of the device is below.  </content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
	<item>
		<id>233</id>
		<type>post</type>
		<url>https://verifiedsecurity.com/blog/video-verification-moves-to-the-mainstream/</url>
		<title>Video Verification Moves to the Mainstream</title>
		<h1>Video Verification Moves to the Mainstream</h1>
		<summary>Have you heard of video verification for security systems? If you haven’t, I predict that you will hear more about it in the future.  Essentially, video verification is the process of verifying that an alarm system signal was caused by an actual intrusion or crime in progress.  The concept has been around for quite some […]</summary>
		<content><![CDATA[<p>Have you heard of video verification for security systems?</p>
<p>If you haven’t, I predict that you will hear more about it in the future.  Essentially, video verification is the process of verifying that an alarm system signal was caused by an actual intrusion or crime in progress.  The concept has been around for quite some time but newer technologies are making it easier to implement.</p>
<p>The way it works is that an operator at an alarm monitoring center can log into a video system over the Internet to look at live video that was triggered by an alarm event (door opening, motion detection, glass breakage detection, etc.).  The operator can use the live video surveillance feed to determine if there is an actual crime in progress or if it is a false alarm (cat, mouse, cat chasing mouse, etc.).</p>
<p>Why is this important?  Most importantly, this approach to security reduces false alarm dispatches to the police department and lets the police focus on those alarm calls where there is a verified crime in progress.  A call to the police has a higher priority when a crime in progress has been verified!</p>
<p>Traditionally, the alarm system owner has had to give access to its video surveillance or CCTV cameras to the monitoring company that monitors his or her security system.  This is still an option available for video verification.  But, there are newer technologies that make this process easier.</p>
<p>One of the newer technologies is called <a title="Videofied home page" href="http://videofied.com">Videofied</a> and is sold through security companies like ours.  A Videofied system uses wireless MotionViewers to capture clips of alarm events when motion is detected and send them to the monitoring center so the operator can see what triggered the motion.</p>
<p>If the operator sees paper blowing in the wind, there is no dispatch to the police.  If the operator sees a crime in progress, the police get the call.</p>
<p>To see some actual Videofied clips of crimes in progress, visit our <a href="http://www.youtube.com/RemoteProtectionSys">YouTube channel</a>.  To learn more about this technology and to get a free demonstration, please <a href="mailto:info@verifiedsecurity.com">contact us</a>.</p>
]]></content>
		<content_plain>Have you heard of video verification for security systems? If you haven’t, I predict that you will hear more about it in the future.  Essentially, video verification is the process of verifying that an alarm system signal was caused by an actual intrusion or crime in progress.  The concept has been around for quite some time but newer technologies are making it easier to implement. The way it works is that an operator at an alarm monitoring center can log into a video system over the Internet to look at live video that was triggered by an alarm event (door opening, motion detection, glass breakage detection, etc.).  The operator can use the live video surveillance feed to determine if there is an actual crime in progress or if it is a false alarm (cat, mouse, cat chasing mouse, etc.). Why is this important?  Most importantly, this approach to security reduces false alarm dispatches to the police department and lets the police focus on those alarm calls where there is a verified crime in progress.  A call to the police has a higher priority when a crime in progress has been verified! Traditionally, the alarm system owner has had to give access to its video surveillance or CCTV cameras to the monitoring company that monitors his or her security system.  This is still an option available for video verification.  But, there are newer technologies that make this process easier. One of the newer technologies is called Videofied and is sold through security companies like ours.  A Videofied system uses wireless MotionViewers to capture clips of alarm events when motion is detected and send them to the monitoring center so the operator can see what triggered the motion. If the operator sees paper blowing in the wind, there is no dispatch to the police.  If the operator sees a crime in progress, the police get the call. To see some actual Videofied clips of crimes in progress, visit our YouTube channel.  To learn more about this technology and to get a free demonstration, please contact us.</content_plain>
		<image></image>
		<modified>2019-04-27T13:23:00-04:00</modified>
	</item>
</aeoFeed>
		