<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>PPSS Blog</title>
    <link>https://www.protectionplussecurity.com</link>
    <description>We provide you the information you need to keep you and your business safe 24 hours a day.</description>
    <atom:link href="https://www.protectionplussecurity.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Cloud vs. On-Premises Physical Security: Which Model Is Right for Your Business?</title>
      <link>https://www.protectionplussecurity.com/cloud-vs-on-premises-physical-security-which-model-is-right-for-your-business</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Cloud+vs.+On-Premise+Blog+Graphic.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Compare cloud vs. on-premises physical security systems and learn which model best fits your business based on control, scalability, IT requirements, and long-term growth.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           When businesses invest in a physical security platform, the decision is not just about technology. It is about choosing a system that fits operational needs, internal resources, and long-term growth. For most organizations, the choice comes down to cloud-based or on-premises physical security. Both models can support video surveillance, access control, and centralized system management, but they differ in how they are deployed, maintained, and scaled.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud-based systems are often chosen for flexibility, easier management, and faster expansion across multiple sites. On-premises systems are typically selected for local control, internal ownership, and independence from vendor-hosted infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For businesses evaluating the two, the most important considerations are straightforward: ease of management, IT requirements, scalability, uptime, and control over data and infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What Cloud Means in Physical Security
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In physical security, a cloud-based system means the management software and related services are hosted by the provider rather than fully maintained on local customer servers. Cameras, readers, and controllers still operate on site, but the system is accessed through a hosted platform for administration, monitoring, reporting, and remote visibility.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           From a business standpoint, the biggest advantage of cloud is efficiency. Cloud-based platforms typically reduce the amount of local infrastructure required and make it easier to manage multiple sites from a single interface. That can lower the operational burden on IT teams and simplify day-to-day system administration.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud also supports faster growth. For organizations opening new locations, managing distributed teams, or standardizing security across facilities, cloud-based systems are usually easier to expand than fully on-premises environments. This can shorten deployment timelines and reduce the complexity of scaling a security program as the business grows.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud is also effective because it can integrate more easily with a wide range of business and security software. That can include video management tools, access control platforms, visitor management, identity management, reporting systems, and other operational technologies. For organizations looking to connect systems and improve visibility across their environment, that flexibility can be a major advantage. For many businesses, cloud is appealing because it helps shift physical security from a site-by-site infrastructure challenge to a more centralized, manageable business system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What On-Premises Means in Physical Security
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           An on-premises physical security system is hosted and managed locally by the organization. This usually includes local servers, local storage, site-based software, and internal responsibility for upgrades, maintenance, and cybersecurity patching. The primary value of on-premises is control. The organization decides how the system is configured, where data is stored, and when software updates or infrastructure changes take place. For businesses with strict internal requirements or strong preferences around ownership of their systems, that can be a major advantage.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On-premises can also be a good fit for organizations that already have dedicated IT resources and existing infrastructure investments. In those cases, keeping the system local may align better with current operations and internal support models. On-premises is often less about resisting change and more about matching the solution to the environment. Some businesses simply need a system that remains closely tied to local infrastructure and internal oversight.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Where Each Model Performs Best
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud and on-premises both have clear strengths, and the best choice usually depends on the customer’s business model and operational priorities. Cloud-based physical security is often the better fit for organizations that want centralized management, simpler expansion, and less infrastructure overhead. It is especially attractive to multi-site businesses, growing enterprises, and teams looking to reduce the day-to-day support burden on internal IT.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On-premises is often the better fit for organizations that want direct control over the environment and have the internal resources to manage it effectively. It can be a strong option for businesses with established infrastructure, strict internal standards, or a preference for locally hosted systems. For most businesses, this is not a question of which model is more advanced. It is a question of which model is better aligned with the way the business operates.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The Tradeoffs: What Buyers Should Evaluate
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud and on-premises both have clear strengths, and the best choice usually depends on the customer’s business model and operational priorities. Cloud-based physical security is often the better fit for organizations that want centralized management, simpler expansion, and less infrastructure overhead. It is especially attractive to multi-site businesses, growing enterprises, and teams looking to reduce the day-to-day support burden on internal IT or businesses looking for a system that can integrate with their business and security software.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            On-premises systems, by contrast, offer the greatest level of direct control over infrastructure, storage, and system lifecycle decisions. That can be a major advantage for organizations that want to manage their environment internally or maintain tighter oversight of how the system is configured and supported. The tradeoff is that on-premises requires more internal effort, from maintenance and updates to hardware planning and ongoing administration. It can also demand more resources as the system grows. In terms of continuity, on-premises environments often support strong local operation because core functions remain tied to local infrastructure.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Final Thoughts
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The cloud vs. on-premises decision is ultimately a business decision. It affects how the system will be managed, how easily it can scale, how much internal support it will require, and how much control the organization wants to retain.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cloud is often the right fit for businesses that want flexibility, simpler management, and easier expansion. On-premises is often the right fit for businesses that want local control, internal ownership, and a more self-managed environment. The best solution is the one that aligns with the customer’s operations, resources, and growth strategy. Protection Plus Security Services can help you assess your environment and choose the security system that best aligns with your business goals.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Cloud+vs.+On-Premise+Blog+Graphic.png" length="3518583" type="image/png" />
      <pubDate>Mon, 27 Apr 2026 18:27:50 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/cloud-vs-on-premises-physical-security-which-model-is-right-for-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Cloud+vs.+On-Premise+Blog+Graphic.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Cloud+vs.+On-Premise+Blog+Graphic.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>911 Public Safety Camera Sharing for Businesses: How Real-Time Video Improves Emergency Response</title>
      <link>https://www.protectionplussecurity.com/911-public-safety-camera-sharing-for-businesses-how-real-time-video-improves-emergency-response</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/EE+-+911+Sharing+-+Photo.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Learn how Eagle Eye 911 Public Safety Camera Sharing gives emergency communication centers real-time access to selected cameras during a 911 call, helping businesses improve safety, response speed, and situational awareness.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When an emergency happens, every second matters. Calling 911 is the first step, but phone calls alone do not always give emergency telecommunicators the full picture. In a fast-moving situation, details can be unclear, incomplete, or changing by the second. That is where Eagle Eye 911 Public Safety Camera Sharing can make a major difference.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This solution gives emergency communication centers temporary access to designated security cameras during a 911-triggered emergency. Instead of relying only on what a caller can describe, telecommunicators can view live video from nearby cameras and pass more accurate, real-time information to first responders. For businesses, schools, and public-facing facilities, that added visibility can support faster decisions, better coordination, and a more informed response when it matters most.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What Is Eagle Eye 911 Public Safety Camera Sharing
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eagle Eye 911 Public Safety Camera Sharing is a video-sharing capability designed to support 911 emergency response. It allows selected surveillance cameras to be shared with an Emergency Communication Center during a qualifying 911 emergency near the camera location. The goal is to give telecommunicators immediate visual awareness so they can better understand what is happening and relay useful updates to police, fire, or EMS teams.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           How 911 Public Safety Camera Sharing Works
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A business or organization selects which cameras should be available for sharing in an emergency. These cameras are then associated with their location so the system can determine whether they are near the source of a 911 call.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When a 911 call is placed from the customer’s location or from close proximity to the designated cameras, the caller location and camera location are matched using GPS-based data. If the event qualifies, telecommunicators at the Emergency Communication Center can access the shared live video streams from those selected cameras.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Key Components Needed to Set Up Eagle Eye’s 911 Public Safety Camera Sharing
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The exact setup depends on whether you are already using the Eagle Eye Cloud VMS or coming from another video system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For Eagle Eye Cloud VMS customers, the setup is relatively simple. The business designates which surveillance cameras should be enabled for emergency sharing. Those cameras are tied to the site location so the system can recognize when a nearby 911 call should trigger access for the Emergency Communication Center. From there, the Eagle Eye Cloud VMS handles the secure sharing of live video during an active event.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For non-Eagle Eye users, the setup typically includes the Eagle Eye 911 Public Safety Camera Sharing Complete solution, which connects your existing camera system to an on-premise Eagle Eye Cloud Managed Video Recorder, often referred to as a CMVR. This device acts as the bridge between your local surveillance environment and the Eagle Eye cloud platform. Once connected, designated cameras can be shared with telecommunicators during a 911 emergency.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Privacy and Security Considerations
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For any business considering 911 camera sharing, privacy and cybersecurity are important parts of the conversation. Eagle Eye built this solution with those concerns in mind. Video is accessible only during a 911 emergency. The solution also removes the need to share individual IP addresses, DVR logins, NVR credentials, or camera passwords with the Emergency Communication Center. Video is transmitted through the Eagle Eye cloud-based platform using secure, encrypted data transfer. In addition, any video accessed by telecommunicators can be tracked in the Eagle Eye VMS Audit Log. These controls help businesses support emergency response while maintaining stronger oversight of how their video system is used.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eagle Eye 911 Public Safety Camera Sharing gives businesses a smarter way to support emergency response. By allowing selected cameras to be shared with 911 emergency communication centers during a live incident, it helps improve situational awareness, strengthen communication, and support faster, more accurate decisions in critical moments.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           You do not need to replace your current cameras to take advantage of this capability. Whether you already use the Eagle Eye Cloud VMS or need a complete solution for an existing third-party camera system, there is a path to add this feature and improve your emergency readiness.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Technology is only part of the solution. Successful deployment depends on choosing the right cameras, configuring it correctly, and making sure it fits the customer’s environment. That is where Protection Plus Security Services brings value.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protection Plus Security Services can help you determine the best way to deploy Eagle Eye 911 Public Safety Camera Sharing for your property, your operations, and your safety goals. If you are ready to make your camera system more valuable during emergencies, now is the time to start the conversation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/EE+-+911+Sharing+-+Photo.png" length="3804305" type="image/png" />
      <pubDate>Fri, 17 Apr 2026 20:17:29 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/911-public-safety-camera-sharing-for-businesses-how-real-time-video-improves-emergency-response</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/EE+-+911+Sharing+-+Photo.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/EE+-+911+Sharing+-+Photo.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Eagle Eye Complete Program: A Smarter Cloud Video Surveillance System for Predictable Growth</title>
      <link>https://www.protectionplussecurity.com/eagle-eye-complete-program-a-smarter-cloud-video-surveillance-system-for-predictable-growth</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Eagle+Eye+Complete+-+Photo-457e7973.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Learn how Eagle Eye Complete Program gives businesses a cloud video surveillance system with predictable monthly pricing, lower upfront costs, and lifetime repair and replace support.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/h4&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Video surveillance has changed. Businesses no longer want a system that simply records video and then becomes expensive to maintain over time. They want a solution that is easy to budget, easy to grow, and ready for the modern features that matter today, including cloud access and flexible retention options. That is where Eagle Eye’s Complete Program stands out.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For many organizations, the biggest challenge with video surveillance is not deciding whether they need it. The challenge is figuring out how to get a professional-grade system without making a large upfront hardware purchase. The Eagle Eye Complete Program solves that problem by shifting the investment from a large capital expense to a more manageable operating expense. Instead of buying required hardware outright, businesses can use a subscription model with a low monthly cost and a minimal setup fee. This approach gives customers access to full-featured video surveillance, predictable expenses, and lifetime repair and replacement coverage for the Eagle Eye Complete hardware.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What It Is
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eagle Eye Complete Program is a subscription-based way to deploy Eagle Eye cloud video surveillance. In simple terms, it allows businesses to get the cameras, bridges, CMVRs, switches, cabinet systems, and certain other Eagle Eye hardware they need through an OpEx pricing model instead of a large one-time purchase.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The program is designed for organizations that want a professional surveillance platform but also want budget predictability. It helps remove one of the biggest pain points in security projects, which is the heavy upfront cost of required equipment. It also gives customers access to advanced Eagle Eye capabilities while reducing the risk of unexpected hardware replacement costs outside the warranty period.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           How it works
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A major part of how the program works is the pricing advantage unlocked when a Bridge or CMVR is purchased as Complete. A Complete Bridge or CMVR unlocks simplified and significantly reduced pricing for camera subscriptions, with one price point for any resolution and retention need up to 4MP and 60 days of cloud retention, (HD4-D60).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Why is this Effective
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eagle Eye Complete Program is effective because it addresses both the technical and financial challenges that often slow down surveillance projects. From a technical standpoint, it gives businesses access to a cloud video surveillance system that can support modern capabilities, remote management, and flexible retention planning. From a financial standpoint, it lowers the barrier to entry by reducing capital expenditures and replacing them with predictable monthly costs. It becomes a practical way to deploy a modern security platform with less risk, better flexibility, and stronger long-term planning.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Why Work with Protection Plus Security Services
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Protection Plus Security Services can help customers evaluate options and build a system that fits into how their business operates today while leaving room for growth tomorrow. Instead of sorting through hardware and subscription options alone, businesses can work with Protection Plus Security Services to help them choose a practical, scalable solution.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are exploring Eagle Eye cameras or looking for a better way to budget for cloud video surveillance, Protection Plus Security Services can help. Contact our team to talk through your site requirements, compare Complete options, and find the right path for your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Eagle+Eye+Complete+-+Photo-457e7973.png" length="2317278" type="image/png" />
      <pubDate>Thu, 09 Apr 2026 23:36:01 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/eagle-eye-complete-program-a-smarter-cloud-video-surveillance-system-for-predictable-growth</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Eagle+Eye+Complete+-+Photo-457e7973.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Eagle+Eye+Complete+-+Photo-457e7973.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Brivo Access Control System: A Flexible Cloud-Based Solution for Modern Businesses</title>
      <link>https://www.protectionplussecurity.com/brivo-access-control-system-a-flexible-cloud-based-solution-for-modern-businesses</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Brivo+Access+Control+Blog+-+Photo-2dfcf40a.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Learn how the Brivo access control system uses cloud management, scalable controllers, and mobile credentials to secure modern facilities.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Access control is no longer just about locking a door. Businesses want to know who entered, when they entered, how quickly permissions can be changed, and whether the system can keep up as the organization grows. That is where the Brivo access control system stands out. Brivo Access is designed as a cloud-based access control solution that gives organizations remote management, event visibility, mobile credentials, built-in analytics, and integrations that expand alongside the rest of the security ecosystem. For businesses looking for a system that is easier to manage and ready to scale, Brivo offers a modern way to protect people, property, and day-to-day operations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What Is Brivo Access?
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brivo Access is a cloud-based platform that helps businesses control and monitor entry points across one site or many. Through the platform, administrators can manage users, credentials, groups, schedules, doors, alerts, and reports from anywhere instead of depending only on on-site changes. Brivo also supports features such as role-based permissions, emergency lockdown, and mobile management. Some capabilities vary by edition, but the overall design is built around flexibility, visibility, and control.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Mobile Passes vs Wallet Passes
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            One of the most useful parts of the Brivo access control system is the flexibility around credentials. A Brivo Mobile Pass is an app-based credential delivered through the Brivo Mobile Pass app. Inside the app, users can search for doors by name, favorite commonly used doors, view available doors, and use the Magic Button to open the nearest door. Brivo’s materials also highlight a faster, more intuitive experience for both iOS and Android users. For administrators, mobile passes are easy to issue or revoke through Brivo Access, which helps simplify onboarding, offboarding, and day-to-day changes.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A wallet pass is slightly different. In Brivo’s Apple Wallet materials, the employee badge is stored directly in Apple Wallet on an iPhone or Apple Watch. That gives users a native tap-to-enter experience at compatible doors, elevators, turnstiles, and more. It also adds conveniences such as Express Mode, which means users do not need to wake or unlock the device first, and Power Reserve, which can keep the badge working for up to five hours after the iPhone needs a charge. Brivo also positions Apple Wallet badges as simple to distribute remotely, which can reduce reliance on printed physical badges.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Integrations and Platform Capabilities
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            A major reason businesses consider Brivo is that the platform is not limited to basic door control. Brivo Access has hundreds of API integrations. It also supports identity management integrations, video integration and remote mobile management from any device.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of its most valuable integrations is with Eagle Eye Networks, a cloud video surveillance platform. This native integration allows businesses to see live or recorded video alongside access and alarm events in one place instead of switching between separate systems. By linking Eagle Eye cameras to Brivo doors and operations, security teams can investigate incidents faster, monitor activity across multiple sites, and even unlock doors remotely while viewing real-time video from a desktop or mobile device.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Use Cases
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            In small offices and small commercial spaces, Brivo can deliver a clean, manageable solution. An ACS300 paired with Brivo Smart Readers and mobile credentials can give a business secure front-door access, simple user management, and remote control from the cloud.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For a business with many access-controlled doors, future expansion plans, or more advanced door and I/O requirements, the ACS6100 offers far more room to grow. It can scale to up to 14 readers per control panel and is designed for higher-capacity deployments. That makes it a better fit for larger commercial buildings, multi-door facilities, and growing organizations that want one platform to support additional doors, readers, and related devices over time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Why Work with Protection Plus Security
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Choosing a cloud-based access control platform is only part of the decision. Businesses also need help matching the right controller to the right site, selecting the best reader style, selecting the proper electronic door hardware, deciding whether cards, mobile passes, or wallet passes make the most sense, and planning for future growth. That is where Protection Plus Security can help guide the conversation. Protection Plus Security can help organizations evaluate fit, simplify decision-making, and build a Brivo access control system that makes sense for how the facility operates today and how it may grow tomorrow.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you are exploring Brivo for your business, contact Protection Plus Security to compare controller options, credential strategies, and deployment approaches so you can choose a solution that fits your people, your property, and your long-term security goals.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Brivo+Access+Control+Blog+-+Photo.png" length="2112584" type="image/png" />
      <pubDate>Wed, 01 Apr 2026 19:53:45 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/brivo-access-control-system-a-flexible-cloud-based-solution-for-modern-businesses</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Brivo+Access+Control+Blog+-+Photo.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Brivo+Access+Control+Blog+-+Photo.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Eagle Eye Remote Video Monitoring Services: A Better Way to Protect Your Business</title>
      <link>https://www.protectionplussecurity.com/eagle-eye-remote-video-monitoring-services-a-better-way-to-protect-your-business</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/ChatGPT+Image+Mar+24-+2026-+03_23_31+PM.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Discover how remote video monitoring services from Eagle Eye provide proactive security using AI, real-time monitoring, and trusted partners to protect your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h5&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Security is no longer just about recording incidents after they happen. Today, businesses need proactive, real-time protection that can stop threats before damage occurs. That is where remote video monitoring services come in.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eagle Eye Networks offers a powerful solution that combines AI-powered video analytics with trained human monitoring professionals to deliver smarter, faster, and more effective security. Instead of relying solely on traditional alarms or on-site guards, businesses can now benefit from a system that actively detects, evaluates, and responds to threats in real time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this blog, we will break down what is Eagle Eye remote video monitoring and how Eagle Eye remote video monitoring works.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What Is Eagle Eye Remote Video Monitoring Services
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Eagle Eye remote video monitoring services use a combination of cloud-based video surveillance, artificial intelligence, and live monitoring agents to watch over your property from a remote location.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unlike traditional security systems that simply trigger alarms, this solution actively detects suspicious activity, verifies threats using AI, enables human intervention in real time and initiates immediate response actions. Eagle Eye enhances this approach by adding a critical human layer to AI surveillance, ensuring that every alert is properly evaluated before action is taken.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           How Eagle Eye Remote Video Monitoring Works
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Understanding how Eagle Eye remote video monitoring services function helps illustrate why they are so effective. The process is designed to filter noise, reduce false alarms, and deliver actionable intelligence.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Step 1:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Event Detection.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Security cameras and sensors continuously monitor your property. When motion or unusual activity is detected, the system flags the event.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Step 2:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           AI Verification.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Eagle Eye’s AI analyzes the event to determine whether it is relevant. This step filters out non-threatening activity such as weather movement or routine operations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Step 3:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Human Evaluation
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Once verified, the event is sent to a professional monitoring center where trained personnel assess the situation in real time.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Step 4:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Immediate Response
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . If a threat is confirmed, monitoring agents can: issue live audio warnings, activate alarms or lights, dispatch law enforcement with verified video evidence. These actions are customizable, allowing you to choose what best fits your application.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Step 5:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Reporting and Alerts
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . Customers receive alerts and detailed summaries of the incident, allowing for full visibility and accountability. This layered approach ensures that only meaningful threats are addressed, significantly improving response times and reducing unnecessary disruptions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Why Remote Video Monitoring Is an Effective Solution
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Eagle Eye remote video monitoring is an effective security solution because it shifts the focus from reacting to incidents to preventing them in real time. Instead of waiting for damage to occur, trained monitoring professionals can intervene immediately using live audio warnings or other deterrents, often stopping suspicious activity before it escalates. This proactive approach not only helps reduce crime but also lowers overall security costs, as businesses can supplement or even replace expensive on-site guards with a more efficient and scalable solution.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In addition, when an incident does occur, video verification provides law enforcement with clear evidence of a crime in progress, which often results in faster response times and higher priority dispatch. At the same time, advanced AI filtering ensures that only real threats are escalated, eliminating false alarms and allowing teams to focus on what truly matters.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remote video monitoring services are transforming the way businesses approach security. By combining AI analytics, cloud technology, and human expertise, Eagle Eye delivers a solution that is proactive, scalable, and cost-effective.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whether you are looking to enhance your existing system or replace traditional guard services, Eagle Eye’s remote video monitoring provides the tools and partnerships needed to protect your business with confidence.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Ready to upgrade your security strategy? Contact Protection Plus Security Services today to learn how remote video monitoring services can help protect your business, reduce costs, and deliver real-time peace of mind.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/ChatGPT+Image+Mar+24-+2026-+03_23_31+PM.png" length="1961249" type="image/png" />
      <pubDate>Tue, 24 Mar 2026 22:35:50 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/eagle-eye-remote-video-monitoring-services-a-better-way-to-protect-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/ChatGPT+Image+Mar+24-+2026-+03_23_31+PM.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/ChatGPT+Image+Mar+24-+2026-+03_23_31+PM.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>End of Life: Brivo Legacy Panels</title>
      <link>https://www.protectionplussecurity.com/end-of-life-brivo-legacy-panels</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brivo has recently announced they are no longer supporting several of their legacy control panels. These panels will need to be replaced before February 28, 2026.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Affected Legacy Panels
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The following Panels have reached the End-of-Life and requires replacement
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Brivo ACS5000
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brivo IPDC
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brivo Edge (HID-Edge)
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Replacement Options
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brivo ACS6100
            &#xD;
        &lt;br/&gt;&#xD;
        
             Replacement for the Brivo5000 legacy panel
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Brivo ACS300
            &#xD;
        &lt;br/&gt;&#xD;
        
             Replacement for both Brivo EDGE and Brivo IPDC legacy panels
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Issues If Not Replaced
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Brivo's legacy hardware does not support many of Brivo's current and planned features. Also, the legacy hardware exposes companies to potential security risks and supportability issues as the legacy panels cannot comply with modern security standards.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           We are Here to Help
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When upgrading your legacy hardware with PPSS, we will take every step to ensure that there are minimal disruption to your operations. Our experienced technicians will coordinate a seamless transition with low downtime, maintaining the security integrity of your property throughout the upgrade process.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For more information or to schedule your system upgrade, please contact our office today.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Tue, 03 Feb 2026 19:04:33 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/end-of-life-brivo-legacy-panels</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Verkada’s Tailgate Detection Solution Reviewed</title>
      <link>https://www.protectionplussecurity.com/verkadas-tailgate-detection-solution-reviewed</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Verkada+Tailgate+Images.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Does Verkada’s Access Control Tailgate Detection solution work you?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tailgating:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            is when an unauthorized individual follows an authorized person through an access controlled door; gaining entry into the space without presenting a valid credential. It is a common risk for all access control systems. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Verkada offers a native solution utilizing their cameras and access control system.  Through their software analytics they can detect and alert personnel of this violation.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Setup
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The recommended configuration is an access controlled door equipped with a reader, door contact, request to exit device, and locking hardware. Configure this door to work normally on the Verkada system. Have one interior camera viewing the door. This door / reader will be paired with the interior camera to track for tailgating. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The analytics of the Verkada Command software allows for the monitoring of tailgating events through an access controlled door utilizing the Verkada camera and access control system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Results
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Tailgate Detection works as long as only one valid credential is presented per door opening, which is the scenario laid out by Verkada.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
              If an authorized user opens the door, walks through the door, and closes the door then no violation was noted.  However, if an unauthorized person tailgated an authorized user then a violation occurred. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If two authorized users passed through the door on one opening, both presenting a valid credential to the reader, then a tailgating event occurred. No violation occurred upon exiting, one or multiple people, as expected.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We noted that the time from which the violation occurred to which the event notification was received at the Command software varied from 2-5 minutes. This notification is not instantaneous. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Possible Issues
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            If two or more authorized people approach the door together then each person will need to enter separately, otherwise they will trigger a tailgating event. One door opening and two or more valid credentials triggered the tailgating event. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As we demonstrated this to our end user it was sticking point for their purposes. It was viewed as not being practical, especially at their lobby entry doors where multiple authorized people routinely enter and exit together. The other sticking point was how do you handle visitors? The initial thinking was the authorized person could present their credential multiple times for the number of people passing through. This will not work as only one valid credential is allowed per opening, so each guest would need a credential and would need to enter independently.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It is important to understand how the Tailgating Detection works and really think about the application. If you have a heavily trafficked door this probably won’t work well for you. If you have a door with lots of guests this won’t work for you. The application seems best for a low traffic doors without guests such as a lab, data center, IT room, etc. and not ideal for your front lobby doors.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Verkada-Tailgate-Images.jpg" length="207260" type="image/jpeg" />
      <pubDate>Mon, 30 Sep 2024 23:54:50 GMT</pubDate>
      <author>patrick@protectionplussecurity.com</author>
      <guid>https://www.protectionplussecurity.com/verkadas-tailgate-detection-solution-reviewed</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Exterior+Office+Door.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/Verkada-Tailgate-Images.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Openpath Cloud Based Access Control</title>
      <link>https://www.protectionplussecurity.com/openpath-cloud-based-access-control</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/OpenPath-logo-orange-gray-1.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Openpath is a secure cloud based access control system offering some very impressive and unique features not found in other access control systems. The Openpath access control system primarily utilizes mobile credentials allowing users to use their phones for access into the building.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Openpath Readers Allow for Hands Free Entry
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of their unique features is the hands free entry.  The Openpath readers can be configured to allow the wave of your hand to unlock the door. Allowing you to keep your phone in your pocket, backpack, or purse and not having to present it to the reader. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Openpath readers work with the mobile credentials as well as the Openpath cards and tags.  They will even work with legacy HID Proximity credentials that many companies still utilize.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Video Reader Pro
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Openpath has just introduce the Video Reader Pro. This reader contains both the Openpath reader technology and a 5MP super high definition camera in one compact unit. It is designed to automatically associate the video clip with the access control event, allowing you the ability to see the activity at your door. 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Triple Unlock Technology
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Openpath’s patented triple unlock technology makes the use of the mobile credential very easy and reliable. This technology works with Bluetooth, WiFi, and LTE cellular data for fast authentication. Bluetooth is utilized directly by the reader and local Smart Hub. The WiFi allows for both local Smart Hub or cloud authentication. The cellular data is authenticated in the cloud. These three technologies combine to make for a quick verification and authorization.  Allowing authorized users to pass quickly through secured entry points.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Guest Pass
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If authorized your mobile users can provide Guest Passes for visitors allowing them entry into the building. These passes are provided via text or email and allow visitors entry at a specific reader or group of readers and are valid for a user specified time.   
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Integrations
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Openpath has a number of integrations with various third party software and services allowing you to link your access control system to these other systems. The integrations include identity providers: Google G Suite, Microsoft Azure Active Directory, Okta, and OneLogin. They also integrate with a number of video systems: Camio, Rhombus, Milestone, and Cisco Meraki. The Openpath system will integrate with the Envoy visitor management system, as well as other integrations with Slack (business communications), Allegion (wireless locks), Zapier (business automation), Cove (tenant experience), and ButterflyMX (intercom system). 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/OpenPath-logo-orange-gray-1-89f21229-7e78708f.png" length="12495" type="image/png" />
      <pubDate>Fri, 16 Jul 2021 22:01:33 GMT</pubDate>
      <author>patrick@protectionplussecurity.com</author>
      <guid>https://www.protectionplussecurity.com/openpath-cloud-based-access-control</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/OpenPath-logo-orange-gray-1-89f21229-7e78708f.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/50d3c14e/dms3rep/multi/OpenPath-logo-orange-gray-1-89f21229-7e78708f.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Verkada Cloud Based Video Surveillance System</title>
      <link>https://www.protectionplussecurity.com/verkada-cloud-based-video-system</link>
      <description>Verkada Video Surveillance System is a commercial grade enterprise cloud based video surveillance system. The Verkada video surveillance solution is an advance featured cloud based system that is powerful, easy to use, and easy to share.  It requires no onsite video recording equipment.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Verkada's powerful cloud based video surveillance system
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Verkada Video Surveillance System is a commercial grade, enterprise level, cloud based video surveillance system. This advanced featured system is powerful, easy to use, and easy to share. It requires no onsite video recording equipment; just a PoE network connection and internet connectivity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Verkada Cameras
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Regardless of the form factor - dome or bullet style camera, or the camera resolution (2MP, 3MP, 5MP, 4K), or the onboard storage capability (30, 60, 90, 120, 365 days of archive), the only onsite component is the camera. No recorder, no monitor, no other devices required. Camera, PoE connection, and internet connectivity. Simple and powerful.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Verkada Command Software
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Verkada Command software is an impressive, ever evolving, cloud base software that allows you to view and playback any of your Verkada cameras from any internet connected device – PC, smartphone, or tablet. This feature rich software allows for the usual viewing and playback of the cameras from anywhere. However, what really sets this product apart is everything else it does.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Unlimited number of users
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Advanced sharing of both live video and archived video
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Archiving to the cloud and unlimited retention in the cloud.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Text &amp;amp; email alerts of camera failures, tamper detection, and blocked images.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Heat Map Sensing – see where the activity is in your business.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Advance Search Features
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Search for a video of a person by uploading a picture of the individual.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Search by the color of their clothing – red shirt, blue pants, etc.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Search by everyone wearing a hat
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Search by vehicle color and manufacturer – Red Honda, Blue SUV, etc.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Embed a Verkada camera in your website for continuous viewing of the camera from your website.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            After-hours motion notification. Get notified when someone enters your building, lab, or IDF room off-hours.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Single Sign On Integration; Active Directory, Bamboo HR, etc.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            End to End Encryption
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Verkada+Bullet+Camera.jpeg" length="3430" type="image/jpeg" />
      <pubDate>Tue, 09 Mar 2021 20:06:12 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/verkada-cloud-based-video-system</guid>
      <g-custom:tags type="string">Cloud Based Video Surveillance,Security Cameras,Video Surveillance System,Verkada</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Verkada+Bullet+Camera.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Verkada+Bullet+Camera.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Have you Outgrown your Alarm System?</title>
      <link>https://www.protectionplussecurity.com/have-you-outgrown-your-alarm-system</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Growing+Business.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
                  
  Oh, We Don't Use Our Alarm System.....

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:DoNotShowRevisions&gt;&lt;/w:DoNotShowRevisions&gt;
  &lt;w:DoNotPrintRevisions&gt;&lt;/w:DoNotPrintRevisions&gt;
  &lt;w:DoNotShowComments&gt;&lt;/w:DoNotShowComments&gt;
  &lt;w:DoNotShowInsertionsAndDeletions&gt;&lt;/w:DoNotShowInsertionsAndDeletions&gt;
  &lt;w:DoNotShowPropertyChanges&gt;&lt;/w:DoNotShowPropertyChanges&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;    &lt;!--StartFragment--&gt;  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    You are responsible for overseeing your company’s alarm
system.  Among your many other duties….
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    As your company has grown the way the alarm system functions
has not changed to meet the changing dynamics of your organization.  You are finding more times than not the alarm
system is not being activated at night and on the weekends when it should
be.   When it is armed employees are
triggering it accidently because they forgot their alarm codes or they are a
new hire that has not been assigned a code. 

  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    This is very typical of a growing organization.  The alarm system that worked when you had 30
employees no longer works for 100+ employees.  
The panel does not allow for enough alarm codes, the way the system
functions no longer meets your needs, you have personnel working all hours of
the day and night trying to get the latest projects out and meet the deadlines
of a growing successful company.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    As the company has grown so have your security
requirements.   As a 30 person company
you only needed a burglar alarm system; now as a 100+ company you have the
burglar system as well as the card entry system and the video surveillance
system.  You have all these systems
because management required them, your customers required them, your insurance
company wanted them, and they are providing for a better controlled and more
secured environment for your employees and the critical assets of the company.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    So how do you make sure the burglar alarm system is being
activated?   That is a good question and
one that has different answers depending on your circumstances.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;i&gt;&#xD;
        
                        
                        
        Arm &amp;amp; Disarm on a Schedule
      
                      
                      &#xD;
      &lt;/i&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    In some instances simply programming the alarm panel to arm
and disarm based on a schedule works well.  
If you maintain set hours of operations then this can resolve the issue
of the alarm system not being activated at night or on the weekends.  This may require a panel upgrade to allow for
the scheduling functions. 
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;i&gt;&#xD;
        
                        
                        
        Supervised Closings &amp;amp; Smart Application
      
                      
                      &#xD;
      &lt;/i&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Likewise you may want to have the alarm system
supervised.   By supervising the alarm
system from the monitoring station if the alarm system has not been activated
by a specified time then you will receive a phone call or text message alerting
you that the alarm system did not arm.   The appropriate action can be taken to
activate the system.  If equipped with a
smart application it may be as simple as activating the alarm system from your smart
phone.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;i&gt;&#xD;
        
                        
                        
        Integrate the Alarm and Access Control Systems
      
                      
                      &#xD;
      &lt;/i&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Sometimes integrating the alarm system with the access
control system is the best solution.  
Configuring the alarm system such that the first person in automatically
disarms the system.  The system can be
programmed to arm at a specific time or the last person out can manually arm
the system.  You can even arm the alarm
system without an alarm code utilizing the quick arm function.  On the Honeywell Ademco system the quick arm
function is the # key plus either the 2 key to arm away or the 3 key to arm
stay.  No user code required.  This functionality must be enabled in the
system programming.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;i&gt;&#xD;
        
                        
                        
        Arm / Disarm Readers
      
                      
                      &#xD;
      &lt;/i&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Sometimes the best solution is installing an Arm Disarm
reader at each of the alarm keypad locations.  
This reader is designed to toggle the alarm system based on a valid
credential.   When the system is armed
and a valid credential is presented the alarm system disarms.  When the system is disarmed and a valid
credential is presented the system arms.  
This eliminates the need to issue alarm codes to all of the employees
they can simply use their access control credential.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;i&gt;&#xD;
        
                        
                        
        Perimeter Alarm Integrated with Access Control System
      
                      
                      &#xD;
      &lt;/i&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    In other instances the detectors on the alarm system have to
be changed out to best accommodate the changes in the way the organization now
functions.  For those organizations that
may have personnel working all hours of the day and night it may be best to
have a perimeter alarm system that is integrated with the access control
system.   A perimeter alarm system
consists of door contacts, glassbreak detectors, and local door alarms at the
perimeter card entry doors.  With this
type of system we are strictly monitoring the perimeter of the building.  There are no interior detectors.  By integrating the alarm with the access
control system you allow authorized employees to enter through a card reader
door without having to deactivate the alarm system.   Likewise, those employees can exit through
the card reader door without triggering the alarm system after-hours.  The alarm system is programmed to arm and
disarm on a schedule and is supervised so if there is a failure you are
notified.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    We at Protection Plus Security Services are experts at
protecting your small to medium sized business.   We have the experience and know how to
provide the right solution.  Please
contact us for a free security review.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;!--EndFragment--&gt;  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Growing+Business.jpg" length="319238" type="image/jpeg" />
      <pubDate>Mon, 22 Oct 2018 23:41:55 GMT</pubDate>
      <author>patrick@protectionplussecurity.com</author>
      <guid>https://www.protectionplussecurity.com/have-you-outgrown-your-alarm-system</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Growing+Business.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The Building has Security….</title>
      <link>https://www.protectionplussecurity.com/the-building-has-security</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Office+Building.jpg" alt="Office Building" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
                  
  Does your business operate out of an office suite in a multi-story,
multi-tenant building?  Do you feel
secure because the building has a card entry system, video surveillance system,
or lobby security officer?  

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:DoNotShowRevisions&gt;&lt;/w:DoNotShowRevisions&gt;
  &lt;w:DoNotPrintRevisions&gt;&lt;/w:DoNotPrintRevisions&gt;
  &lt;w:DoNotShowComments&gt;&lt;/w:DoNotShowComments&gt;
  &lt;w:DoNotShowInsertionsAndDeletions&gt;&lt;/w:DoNotShowInsertionsAndDeletions&gt;
  &lt;w:DoNotShowPropertyChanges&gt;&lt;/w:DoNotShowPropertyChanges&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="375"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;    &lt;!--StartFragment--&gt;  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Too many times when speaking to business owners or their
representatives about an upcoming move I hear “We don’t need security the
building has it.”   This false sense of security creates huge
opportunities for the bad guys.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    I have seen many instances of the bad guys getting into the
building, lying in wait until the building locks down at night, then having
their way with every office in the building all because the tenants thought the
building security was enough.  Don’t be
the next victim!  Don’t be the one that
shows up for work to find out your office has been broken into and critical
business data or materials are missing.   
    
                    
                    &#xD;
    &lt;i&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    At a minimum you should have a simple intrusion alarm system
in place; monitor the suite entry doors and install some interior motion detectors
to detect the presence of an intruder in the office.   This simple system can detect and deter an
intruder.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Additionally, you should have a video surveillance system, this
system does not need to be sophisticated, it just needs to view and record the doors
into the suite and any other key areas of your business.  Many times the bad guys will case out the building
and businesses in advance; eliminating the businesses with alarms and video
systems from their list.  Having a
visible camera in the reception area can be a great deterrent.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Finally, you may want to consider a card entry system.  Control who can enter the suite and where
they can go.  If the suite design allows
then restrict non authorized users from getting beyond the reception area.  Control access into the suite; the main
reception door, interior reception door, and any hallway doors.  Control access into sensitive areas; the
server room, any labs, etc.  Make it hard
to get to your sensitive data and materials.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The more layers of security the harder it is for the bad
guys the more likely they will move on and select a less complicated
target.   
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    We at Protection Plus Security Services are experts in
business security systems.  Contact us
for a free security evaluation. Call 800-498-9297 or visit our website at 
    
                    
                    &#xD;
    &lt;a href="http://www.protectionplussecuirty.com"&gt;&#xD;
      
                      
                      
      www.protectionplussecuirty.com
    
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
    
to schedule an appointment.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;!--EndFragment--&gt;  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/5c2a155a-c771-4e9a-84b2-ecee52b8e85b.jpg" length="145963" type="image/jpeg" />
      <pubDate>Wed, 25 Jul 2018 23:45:51 GMT</pubDate>
      <author>patrick@protectionplussecurity.com</author>
      <guid>https://www.protectionplussecurity.com/the-building-has-security</guid>
      <g-custom:tags type="string">Security,Alarm,Cameras</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/5c2a155a-c771-4e9a-84b2-ecee52b8e85b.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Funny Video of the Month: May 2018</title>
      <link>https://www.protectionplussecurity.com/funny-video-of-the-month-may-2018</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://youtu.be/VK7xH_TnEIA"&gt;&#xD;
      
                      
    This is a funny video of how people act with public view video surveillance systems.
    
                      &#xD;
      &lt;br/&gt;&#xD;
      
                      
    The video surveillance system shown was not installed by Protection Plus Security
  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg" length="8196" type="image/jpeg" />
      <pubDate>Mon, 07 May 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/funny-video-of-the-month-may-2018</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>GET OUT!</title>
      <link>https://www.protectionplussecurity.com/get-out</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Is it your responsibility to conduct your company’s evacuation drills? 

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Bldg+Evac.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    You just completed the drill and things did not go so well…again!  You are having a hard time accounting for everyone.  Things are chaotic and these drills seem to take forever to complete.    There has got to be a better way of doing things….   Many companies experience this same frustration.
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Evac+Plan.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    At Protection Plus Security Services, Inc. we are experts at access control and fire alarm systems.  We have been deploying the S2 Security access control system since 2005.  This browser based security platform has many unique features not found in other access control products.   One of these unique features is the Evacuation Management tool contained within the Mobile Security Professional (MSP) smart application.
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/S2+-+MSO.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    S2 Security’s Mobile Security Professional Evacuation Management tool allows your employees to check-in at any of the mustering locations.   The mustering officer, equipped with the mobile app, acknowledges their arrival; removing that individual from the unaccounted-for list.  The app is synchronized between the various mustering stations; continuously updating the list of unaccounted-for personnel. 
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    From the MSP app the mustering officer can email the list of unaccounted-for personnel directly.  Likewise, they can view the individuals last access record to see if they badged into the facility recently.  Providing you real time status of all your personnel and allowing you to efficiently and effectively conduct your evacuation drill.
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    For more information about the S2 Security access control system contact us a 
    
                    
                    &#xD;
    &lt;a href="http://www.protectionplussecurity.com/"&gt;&#xD;
      
                      
                      
      www.protectionplussecurity.com
    
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
     or call 510-770-9900. 
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Bldg+Evac.jpg" length="10819" type="image/jpeg" />
      <pubDate>Sun, 06 May 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/get-out</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Bldg+Evac.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>WHY VIDEOFIED?</title>
      <link>https://www.protectionplussecurity.com/why-videofied</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
   CRIME IN PROGRESS CLIPS GET SWIFT RESPONSE

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/april-2018-post.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Whether used to enhance an existing alarm system or as a primary video surveillance option, there are some good reasons to consider Videofied. Videofied integrates cameras, illumination and motion sensors in a single device. When it detects motion, it sends a 10-second video clip of the incident over the cell network for immediate response—and arrests!
    
                    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Real Time Video Means Real Results
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The best security and video surveillance systems employ many different methods to achieve the highest levels of security. Most systems include video surveillance cameras which records events. Videofied adds an additional layer of protection delivering an immediate transmission of a video clip to the monitoring operator, providing a view of a crime in progress. The video confirms the alarm is an actual crime in progress, and not a costly false alarm. This information is relayed to law enforcement who are dispatched on a Priority Response, able to act quickly on real-time and reliable information
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
       Indoor and Outdoor Durability
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Whether you need to deter theft, vandalism or break-ins, Videofied, an innovative video alarm security system, can be installed right where you need it. Here are a few of the advantages:
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Self-powered, no AC power needed
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Completely wireless
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      All weather from temperatures ranging from -20F to 140F
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Operates for years on a single set of batteries
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      The Benefits of Modern Security
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Videofied offers modern security with flexibility and mobile convenience. Every time one of the built-in motion sensors is tripped, it both notifies you and provides a clip of the incident, whereas a traditional alarm system can only tell you that an alarm was tripped, not who or what caused the incident. The system offers additional unique benefits, as well:  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      It can be used to upgrade and enhance existing systems
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Fast and easy install
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Cost effective
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      No wires for intruders to cut
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Military grade radio transmission for incredible range and immunity to interference
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Interactive app makes it easy to arm and disarm
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Money saving solution to reduce false alarms
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Wireless passive infrared motion detection cameras
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Learn more about how Videofied can enhance the security at your operations! Call us today! 800-498-9297
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/c93c12c9-fc16-4195-a64f-3f1f0d1822d0.jpg" length="5122" type="image/jpeg" />
      <pubDate>Sun, 01 Apr 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/why-videofied</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/c93c12c9-fc16-4195-a64f-3f1f0d1822d0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>COMMERCIAL FIRE PROTECTION</title>
      <link>https://www.protectionplussecurity.com/commercial-fire-protection</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  GETTING BEYOND PROPERTY PROTECTION ONLY

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/PPS-March-Website-2.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    It is far more common than most people realize, and far more dangerous. Over and over, employers are having problems getting employees out of the building when the alarm sounds. Owners may foresee this problem and have difficulties overcoming this obstacle.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Designed for Property Protection, not Life Protection
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    In many instances, especially for B Occupancies or business occupancies, the fire alarm system is designed for property protection only. This means that the fire alarm system is designed to detect the activation of the building sprinkler system so the fire department can be dispatched.  This is a known as a sprinkler monitoring system.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      The requirements for the sprinkler monitoring system in California are:
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Utilizing a CSFM (California State Fire Marshal) approved Fire Alarm Panel
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Monitoring of the water flow detectors and any shut-off valves on the sprinkler system
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Having one smoke detector above the fire alarm panel
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • One manual activated pull station, usually located in the main lobby
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • One fire alarm annunciator (fire alarm keypad to identify alarm and trouble zones). This too is usually located in the front lobby.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • One horn strobe unit (sounder and light) located in the front lobby.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • HVAC Unit shutdown
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      How This Can Create the Perfect Storm
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    In a system designed purely for property protection, it does exactly what it is designed to do– protect property. If the sprinkler system should activate due to a fire the occupants, employees, are not aware of this activation unless they are in the front lobby of the building because this is where the horn strobe unit is located. This could be a huge liability for a company and ultimately result in injury or death to their employees.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Most companies conduct regular evacuation drills so as to be able to get their employees out of the building and account for the employees in the event of an emergency. These drills are often unsuccessful because they do not have the right system in place. Some companies use the phone paging system to alert employees to evacuate, others use bull horns – running throughout the building, others have a designated ERT (emergency response team) who’s responsibility, among others, is to get employees out of the building and proactively handle the issue.  
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      There are several problems with this approach, including:
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    •  It depends on the ERT to be present in order to fulfill duties
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    •  It delays response, using critical time
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    •  Locating and informing everyone in enough time is likely not a realistic expectation
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      The Solution
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    For those companies whose buildings are equipped with the minimal fire protection and want a sure proof method of getting employees out of the building, Fire Code does allow for the addition of the evacuation components to alert all personnel of an issue and have them evacuate the building. This involves installing horn/strobe  and strobe units throughout the building in conformance with fire alarm codes and for installing manual pull stations at the exit locations so the alarm can be manually activated. This allows for activation when there is a need to evacuate for reasons other than fire such as an earthquake, chemical release, and others.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    With the horn/strobe and strobe units in place, upon activation, the horns sound and alarm and the strobes flash in a synchronized manner to alert personnel. Adding the evacuation components to a B Occupancy is strictly a voluntary action. However, because it is a modification to the fire alarm system it must be done in accordance with Fire Code and has to be approved by the AHJ (Authority Having Jurisdiction) typically the local fire department. Code is very specific about the placement and spacing of the horn strobes and strobes throughout a building.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protection Plus Security Services is a full-service electronic security system integrator serving the greater San Francisco Bay Area and expert in meeting your fire and security needs. For more information about adding the evacuation component to a B Occupancy building, contact us at 800-498-9297 today!
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/a0677873-f399-4ea5-9f0f-28e28ffaae4a.jpg" length="11431" type="image/jpeg" />
      <pubDate>Fri, 02 Mar 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/commercial-fire-protection</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/a0677873-f399-4ea5-9f0f-28e28ffaae4a.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>COMMERCIAL SECURITY DIY OR HIRE A PROFESSIONAL?</title>
      <link>https://www.protectionplussecurity.com/commercial-security-diy-or-hire-a-professional</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  As a business owner, security is one of your top concerns.

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/PPS-Feb-NSL.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    In an age where there is an online tutorial for just about everything, is it really necessary to hire a professional? While tutorials are great for learning a lot of things, most people who try find out quickly that taking a DIY approach to security does not provide the advantage they had hoped. In fact, it very well may set in motion a ripple effect of problems that are not soon overcome.
    
                    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Here are some important reasons why you should trust your commercial security to a professional rather than YouTube.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;b&gt;&#xD;
    &lt;p&gt;&#xD;
      
                      
                      
      It’s More Complicated Than It Looks
    
                    
                    &#xD;
    &lt;/p&gt;&#xD;
  &lt;/b&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    There are aspects of security that seem pretty straightforward. But as soon as you go to implement them, you find out that the technologies or the proper ways to implement them effectively are not as simple as they seem. Even the best system will not be effective if not installed and implemented correctly.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      It is Easy to Spend Too Much
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    A security professional comes with extensive industry knowledge and knows the most cost-effective approach to getting the job done well. One moderately priced security camera of the right type may eliminate the need for several others, for example. Without that knowledge, it is easy to end up having to pour money into a security system project that never seems to end.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Better Integration
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    We all go in loving the features and the possibilities of all that we can do with an integrated system. The possibilities are real, but integration is no small task. Not all systems work well together, or at all, and all it takes is one that doesn’t to throw a huge wrench in the works. A security systems dealer will know the best system and technology choices to accomplish your commercial security goals and make sure your intrusion, access control, and video surveillance systems all work from one platform.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Build With Tomorrow in Mind
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Another lesser realized advantage is that a security professional can build a security system that will serve you today but one that does not limit what you can do tomorrow. It is far too easy to invest heavily in components that will not serve you should your business grow but once the money is spent, you’re committed.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      You Get Support
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Unless you’re someone that enjoys going through textbook size manuals in order to get the most out of their commercial security system, having one professionally installed is a good idea. A professional can give valuable instruction at the time of installation and provide ongoing support so that you’ll get the most use and value from your system.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Every business faces serious security concerns, from theft and vandalism to fraud, violence, and even terrorism. Protection Plus Security helps businesses meet those challenges with a wide range of services that include intrusion, access control, video surveillance, and more.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Call 800-498-9297 today for more information!
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/85ae03d9-50a1-4252-828c-f03d1102e953.jpg" length="14934" type="image/jpeg" />
      <pubDate>Thu, 15 Feb 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/commercial-security-diy-or-hire-a-professional</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/85ae03d9-50a1-4252-828c-f03d1102e953.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>SILLY BURGLAR OF THE MONTH: FEBRUARY 2018</title>
      <link>https://www.protectionplussecurity.com/silly-burglar-of-the-month-february-2018</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This video is an example of not-so-savvy alleged burglars for your entertainment.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  The video surveillance system shown was not installed by Protection Plus Security
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg" length="8196" type="image/jpeg" />
      <pubDate>Wed, 14 Feb 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/silly-burglar-of-the-month-february-2018</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>IMPORTANT CONSIDERATIONS IN EVALUATING VIDEO MANAGEMENT SYSTEMS</title>
      <link>https://www.protectionplussecurity.com/important-considerations-in-evaluating-video-management-systems</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/ppsblogdec-2.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Video has long been one of the driving forces in security, and that has never been truer than today. But it’s widespread use comes with a challenge– video management. Enterprises invest large amounts of time and money into this important security component, and wisely so, but storing data and then finding it later can become a logistical nightmare. This is why having one effective management system is so important.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    A video management system is a combination of cameras, video software, and server hardware that enables the user to store video from various cameras on one platform to be reviewed in the future. Most video systems simply store recordings based on time, date, and motion activity; making retrieval of the pertinent video events time consuming.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    With an integrated security platform such as the S2 Security system it allows for the linking of video events to other critical security events such a card reads, valid and invalid reads, doors openings, and alarm events. These linked events can be quickly and easily reviewed without searching through hours of video recordings.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    We at Protection Plus Security recommend S2 Security system because of its comprehensive options and advanced flexibility. It offers tight integration of video with access control and event monitoring. Incorporating IP video server, NVR, and video forensics, the system allows for a wide range of applications. The browser-based desktop is fully customizable to display multiple cameras and real-time events. With its advanced video forensics, locating and saving your video is faster and easier than ever.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protecting your organization from a major security breach takes being proactive on every front. Protection Plus Security helps you do that with precisely the right solutions.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/143781bf-8916-47ba-836d-5142318d09d8.jpg" length="26211" type="image/jpeg" />
      <pubDate>Mon, 01 Jan 2018 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/important-considerations-in-evaluating-video-management-systems</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/143781bf-8916-47ba-836d-5142318d09d8.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>A BETTER WAY OF MANAGING ACCESS CONTROL? YES, PLEASE!</title>
      <link>https://www.protectionplussecurity.com/a-better-way-of-managing-access-control-yes-please</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pps-nws-nov.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Access control is one of the single best ways to protect an organization and its assets but in today’s fast-paced world, managing access is no small task. Every employee needs enough access to do their job, yet increased access could mean increased risk. Then, roles change and so must access. When you factor in multiple sites and systems, managing access is a beast of a job.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      But it doesn’t have to stay that way.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The Protection Plus Security solution tightly integrates the S2 enterprise-class, feature-rich access control management system making access control management easy in any facility, from small to larger, distributed, or multi-site facilities.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The 100% web-based IP networked system integrates credential-based access control, intrusion detection, and video security applications for a unified management and administration experience.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Here are just some of the many benefits:
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Seamless Integration: Integrates credential-based access control, intrusion detection and video security applications
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Web Interface: Delivers browser-based, unified management and administration
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Expandable System: Allows for simple addition of S2 Network Nodes, S2 NetVR video management capabilities, and S2 Global for larger, distributed installations
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Customizable Monitoring Displays: Provides customization of real-time security event monitoring displays
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Automated System Management: Automatically handles software updates and system backup
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Events and Reporting: Displays access control events and store them for customized reporting
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Data Management: Automatically backs up and maintains SQL-compliant database of credential holders
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Temperature Monitoring: Initiates events when analog temperature monitoring points exceed preset high or low values
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Identity Management: Provides identity management solution for ID photo capture and badge generation
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    • Legacy System Upgrade: Works with existing Mercury, Casi-Rusco and Honeywell hardware
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protecting your organization from a major security breach takes being proactive on every front. Protection Plus Security helps you do that with precisely the right solutions. Next month, we’ll discuss video management so stay tuned for more helpful information!
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/dd336565-f5db-493f-be24-e377026e00a7.jpg" length="19578" type="image/jpeg" />
      <pubDate>Wed, 22 Nov 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/a-better-way-of-managing-access-control-yes-please</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/dd336565-f5db-493f-be24-e377026e00a7.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Silly Burglar of the Month: October 2017</title>
      <link>https://www.protectionplussecurity.com/silly-burglar-of-the-month-october-2017</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  This is a subtitle for your new post

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This video is an example of not-so-savvy alleged burglars for your entertainment.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  The video surveillance system shown was not installed by Protection Plus Security
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg" length="8196" type="image/jpeg" />
      <pubDate>Tue, 10 Oct 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/silly-burglar-of-the-month-october-2017</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>IS THERE A MORE EFFECTIVE WAY TO MANAGE MULTI-FACETED SECURITY ELEMENTS?</title>
      <link>https://www.protectionplussecurity.com/is-there-a-more-effective-way-to-manage-multi-faceted-security-elements</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/blog-october-2017.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        Yes. Protection Plus Security Has the Solution.
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Business owners and executives realize that successful management always requires an effective, efficient, and flexible management system that incorporates every aspect of business operations. The same is true for managing security.
    
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
    One of the chief problems in managing security elements such as access control and video in any facility, from small to larger, distributed, or multi-site facilities is that it is nearly impossible to do so without an effective and well-integrated security management system. That is what makes the Protection Plus Security solution so exceptional. It tightly integrates S2 Security’s enterprise-class security management system software with the S2 Security video management system, incorporating access control, an IP video server, NVR, and advanced video forensics. Flexible and expandable, converged systems are ideal for a range of applications from small, independent organizations to field offices of large enterprises.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    This browser-based solution allows you to use a web browser to monitor events at multiple sites, view the access control logs, link video clips to access control events, and view the video surveillance in real time or conduct a forensic search to locate and save video with a single click. With the addition of S2’s Mobile Security Office management products, field security officers and other authorized users can operate and manage their S2 system from anywhere, dramatically improving their productivity, decision making, and response time.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    While the Protection Plus Security solution integrates systems to simplify tasks, it also expands capabilities. With security operations centralized, businesses can reduce the high-order tasks of security to one so they can focus on areas of highest need. Business owners, facility managers, or other authorized users can get a full, real-time view of every building in one report. It also allows you to use the systems to their fullest capacity, unhindered by processes, your access control and video management systems are better able to be utilized.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protecting your organization from a major security breach takes being proactive on every front. Protection Plus Security helps you do exactly that. Over the following months, we will dive deeper into S2 and discuss the different facets, including access control and video management individually, so be sure to tune in for more helpful information!
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/3169f0a3-22e6-4b2a-88bf-f4465976ab40.jpg" length="20254" type="image/jpeg" />
      <pubDate>Mon, 09 Oct 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/is-there-a-more-effective-way-to-manage-multi-faceted-security-elements</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/3169f0a3-22e6-4b2a-88bf-f4465976ab40.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Video Surveillance: Your New Business Partner</title>
      <link>https://www.protectionplussecurity.com/video-surveillance-your-new-business-partner</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Now you can leverage cameras for more than security

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/PPSblog8-2.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Video surveillance continues its rapid mainstream march—with internet Protocol (IP) network cameras accounting for 53 percent of all CCTV shipped in 2015 and one billion active camera streams forecast by 2020. Intelligent analytics are producing more data from cameras, and that information can be leveraged for additional functionality beyond security prevention, detection and identification.
    
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
    Analog cameras, while not having the same embedded processes that yield more detailed analytics, may still be leveraged to gain more intelligence from the devices when networked. This is accomplished easily with the addition of hardware such as encoders that take the signal and digitize it for network communications. 
    
                    
                    &#xD;
    &lt;a href="http://protectionplussecurity.com/"&gt;&#xD;
      
                      
                      
      Protection Plus Security Services
    
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
     is your surveillance expert, and can provide a free consultation to help you migrate to newer technology, at your pace, thanks to some of these and other ‘bridge’ hardware products available.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Business process intelligence from video
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The case for networked video surveillance cameras with analytics is particularly compelling, with the ability to add accountability and business process improvement across many different vertical markets. For example, heat mapping, a common analytic, can be used in retail or hospitality applications to show the paths of customers, where they lingered longest (dwell times) or even alert management when cashier checkout lines have risen so additional staff can be called upon to ensure a positive customer experience. License plate recognition (LPR), another form of analytic, can be deployed by drive-through or retail locations with pick up operations so orders are ready and waiting when the customer’s license plate is detected entering an area. In warehousing, analytics continually evaluate and assess stocking operations, when more products or other goods must be ordered, or even alert when a distribution line process has failed or gone awry.
    
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
    Video surveillance also tracks products and supplies as they enter and leave a facility during order fulfillment to prevent theft and shrink. High-resolution cameras may be deployed to address proper compliance with rules and regulations, especially critical in hospitality, food service or pharmaceutical production. High-resolution video also yields positive identification throughout a wide expanse of an area to quickly identify any problems or exceptions, in real time, which may be occurring on the manufacturing or distribution floor, in the example of work-related slip and falls or liability claims.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    For businesses without a receptionist, video cameras provide extra eyes and alert occupants when a visitor approaches or enters the area. Coupled with motion detectors, they sound an alert or chime and indicate on a computer, smartphone or other connected device that someone is waiting at the entrance.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    These applications and others yield new intelligence that can be parlayed into better management and operations for your business or facility. Protection Plus Security Services can help assess your needs and devise a plan to optimize video surveillance. Contact Protection Plus Security Services today to learn how easy it is to extend video to benefit the bottom line.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/967ecfa9-8d86-40d2-bdc7-d73aeb53474c.jpg" length="15635" type="image/jpeg" />
      <pubDate>Thu, 31 Aug 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/video-surveillance-your-new-business-partner</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/967ecfa9-8d86-40d2-bdc7-d73aeb53474c.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Does the future of your business NEED Integrated Solutions?</title>
      <link>https://www.protectionplussecurity.com/does-the-future-of-your-business-need-integrated-solutions</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Boost your security quotient with connected technologies

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/ppsblog6-17.png" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Security has evolved with the arrival of increasingly smart, connected technologies that bolster safety and security through integrated intrusion, video, access control and fire solutions. Could this be the start of the next generation robot that stands guard over your business while you sleep?
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      The IoT…?
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The IoT or ‘Internet of Things’ as described by many futurists connects every electronic item in your business to the internet for feedback to other devices. As detection and protection technology continues to move to the network, this provides your business the ability to integrate a vast array of devices to make you safer and more secure.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Integrated solutions take many forms and provide additional information about the protected premises. In the future it may look like a warrior with an Iron Man façade but today for example, not only can you deploy sensors to detect motion and trigger an alert or alarm, but integrate these devices with video surveillance cameras. An immediate view of what or who may have caused the alarm can be sent as a video clip to a computer or smartphone or trigger email notification.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Video cameras are used in unmanned areas where a receptionist may not be present, so occupants can be alerted when a visitor arrives.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Integrated technologies for energy savings, occupant safety and control
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Fire alarm solutions are integrated with elevator controls to prevent employees from using these methods of transport in the event of a life-threatening safety emergency. When a fire is detected, circuitry prevents elevators from operating so employees are not in danger of entering and being trapped.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Access control is increasingly integrated with video surveillance and leveraged for human resources functions and accountability. For example, when the card or other credential is presented, it subsequently triggers video for a visual record of who the person is, when they are coming in and also, how long they stayed at the business. This may also assist when incidents of theft or liability arise, so you can view archived video records for pertinent information. Detailed reports and other documentation can be gleaned from this activity as well.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    At 
    
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Protection Plus Security
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     every solution is custom-designed and specified as a customer fit to surmount the challenges and issues you may be facing. We conduct a thorough on-site consultation and walk-through of the premises before deciding on equipment, taking into consideration the 6 Simple Steps to Boost Your Security Quotient Technology coupled with common sense techniques bolster protection.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Security technology is a magnificent machine. It’s progressed to the point where you can use your smartphone for all kinds of functions, including access control and viewing premises video. But to really boost your security quotient consider some common sense techniques and tactics that will do wonders to enhance what you already have in place. In many cases, the eyes and ears of your employees are critical in overall security protection. Employees need to know what’s important and what your security philosophy is, so they can in turn feel engaged and entrenched in a successful outcome.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Here are six simple steps to get the most out of security:
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      1.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     See Something, Say Something—Let employees know they have a stake in making the premises safer and more secure. Make sure they have a sounding board or person to turn to when they see something unusual, or find an unsafe situation or accident waiting to happen. Bring everyone on board with your security plans and goals.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      2.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     Plan and Practice—Create an emergency evacuation and crisis plan with specific steps to take and practice it. The reality of the situation is that even active shooter scenarios have to be considered and everyone needs to know what they should do and the areas where they can find refuge. Consider lockdown technologies, many of which are possible with access control solutions on the market.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      3.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     Got Surveillance? Let Everyone Know—Video surveillance is a critical part of security and there’s nothing wrong with letting employees and visitors know they are being watched or recorded. In fact, studies suggest that the mere presence of cameras and signs announcing their use can be an effective deterrent in preventing criminal activity and internal theft.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      4.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     Keep Work Areas Safe—When you have a warehouse or other distribution or processing center, safety is critical. It may be a matter of making sure floors are clean and dry to avoid slip and falls, or even using access control on critical pieces of machinery that should only be used by certified or trained individuals. Liability claims can often be avoided by appointing a person to monitor the business or facility for potential vulnerabilities.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      5.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     Consider Integrated Technologies—With most products network-based, it’s easier than ever to integrate technologies for greater security and safety. For example, you can use access control integrated with video to trigger camera surveillance recording and also leverage the technology for human resources accountability similar to a time clock.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      6.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     Regularly Access Security—Security technology is changing rapidly and 
    
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Protection Plus Security
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     is your personal security consultant. We can do a walk-through of your facility and suggest simple strategies or add-ons that may bolster safety and security. If your facility has grown or changed its floor plan you may also need to add security or even evaluate where intrusion detection and video has been placed. CONTACT 
    
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Protection Plus Security
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     today for a no-obligation reassessment of the facility.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/acd9c156-4a5a-4a52-a423-aaafb3dcaf0d.png" length="101399" type="image/png" />
      <pubDate>Thu, 15 Jun 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/does-the-future-of-your-business-need-integrated-solutions</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/acd9c156-4a5a-4a52-a423-aaafb3dcaf0d.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>BEYOND SECURITY</title>
      <link>https://www.protectionplussecurity.com/beyond-security</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Leverage cameras for business intelligence

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/april-2017-blog-images.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Do you have video cameras or are you contemplating a surveillance installation? The good news is that not only is video great for physical security, but you can leverage it for other important applications at your place of business.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protection Plus Security stays ahead of the curve so we can continue to provide the best service and targeted systems solutions to solve your business security needs. Video surveillance technology is just one sector of the industry that has changed dramatically over the last several years, and the results are network-based and high-definition (HD) cameras that can now accomplish so much more than simply physical security.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    High-resolution cameras, referred to as IP or Internet Protocol cameras because they operate over the network, or the emerging suite of HD cameras on the market give you a world of possibilities in every vertical market and a host of different types of businesses. HD cameras offer another advantage: they use existing coaxial cabling so you can make use of your current infrastructure.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    With the new suite of advanced technologies in cameras, such as analytics, you can gather a wealth of information, data and business intelligence to assist with your operations.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Here are some of the ways to leverage cameras beyond security
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
    :
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      How hard are your employees working? Now you can deploy cameras as productivity checks. With smartphone apps, you can look in on employees and check their status on the job.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      In safety applications to protect against slip and falls reports, on-the-job injuries or other potential liability claims – cameras provide visual evidence and a dose of deterrence.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Keep track of warehouse operations – and goods – to yield a measure of security and safeguard against internal theft or a production process gone awry.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Use video integrated with access control in human resources functions to ascertain when employees come to work; or when they visit the premises after hours or during holidays.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Video cameras can also be used for businesses which may not have a receptionist, so occupants are alerted when a visit arrives. Used with motion detectors, they can sound an alert or other indicator to smartphone, desktop or initiate an email or text message when a visitor has arrived.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Cameras with on board video analytics, well-suited for retail, are smart devices that may include heat mapping, a common analytic, to show the routes patrons covered in a store and dwell times at displays. They can also alert management when checkout lines have lengthened, so additional staff can assist – boosting a positive customer experience.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Technology has advanced and we can help you make the most of your current video system or decide on a path to greater security and improved business operations with new surveillance. Every system Protection Plus Security installs is custom-specified to address your needs and challenges. 
    
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      CONTACT us today for a free consultation or current assessment.
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/c9852c35-b269-4bfd-bac5-9a34a9dae4fb.jpg" length="15473" type="image/jpeg" />
      <pubDate>Sat, 01 Apr 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/beyond-security</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/c9852c35-b269-4bfd-bac5-9a34a9dae4fb.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Silly Burglar of the Month - March 2017</title>
      <link>https://www.protectionplussecurity.com/silly-burglar-of-the-month-march-2017</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This video is an example of not-so-savvy alleged burglars for your entertainment. The video surveillance system shown was not installed by Protection Plus Security Services
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg" length="8196" type="image/jpeg" />
      <pubDate>Tue, 28 Mar 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/silly-burglar-of-the-month-march-2017</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>6 SIMPLE STEPS TO BOOST YOUR SECURITY QUOTIENT</title>
      <link>https://www.protectionplussecurity.com/6-simple-steps-to-boost-your-security-quotient</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Technology coupled with common sense techniques bolster protection

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/march-2017-main-images.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Security technology is a magnificent machine. It’s progressed to the point where you can use your smartphone for all kinds of functions, including access control and viewing premises video. But to really boost your security quotient consider some common sense techniques and tactics that will do wonders to enhance what you already have in place. In many cases, the eyes and ears of your employees are critical in overall security protection. Employees need to know what’s important and what your security philosophy is, so they can in turn feel engaged and entrenched in a successful outcome.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      Here are six simple steps to get the most out of security:
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        See Something, Say Something
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
                      
      —Let employees know they have a stake in making the premises safer and more secure. Make sure they have a sounding board or person to turn to when they see something unusual, or find an unsafe situation or accident waiting to happen. Bring everyone on board with your security plans and goals.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        Plan and Practice
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
                      
      —Create an emergency evacuation and crisis plan with specific steps to take and practice it. The reality of the situation is that even active shooter scenarios have to be considered and everyone needs to know what they should do and the areas where they can find refuge. Consider lockdown technologies, many of which are possible with access control solutions on the market.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        Got Surveillance? Let Everyone Know
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
                      
      —Video surveillance is a critical part of security and there’s nothing wrong with letting employees and visitors know they are being watched or recorded. In fact, studies suggest that the mere presence of cameras and signs announcing their use can be an effective deterrent in preventing criminal activity and internal theft.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        Keep Work Areas Safe
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
                      
      —When you have a warehouse or other distribution or processing center, safety is critical. It may be a matter of making sure floors are clean and dry to avoid slip and falls, or even using access control on critical pieces of machinery that should only be used by certified or trained individuals. Liability claims can often be avoided by appointing a person to monitor the business or facility for potential vulnerabilities.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        Consider Integrated Technologies
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
                      
      —With most products network-based, it’s easier than ever to integrate technologies for greater security and safety. For example, you can use access control integrated with video to trigger camera surveillance recording and also leverage the technology for human resources accountability similar to a time clock.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
                        
        Regularly Access Security
      
                      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
                      
      —Security technology is changing rapidly and Protection Plus Security is your personal security consultant. We can do a walk-through of your facility and suggest simple strategies or add-ons that may bolster safety and security. If your facility has grown or changed its floor plan you may also need to add security or even evaluate where intrusion detection and video has been placed. 
      
                      
                      &#xD;
      &lt;a href="http://protectionplussecurity.com/get-connected.html"&gt;&#xD;
        
                        
                        
        Contact
      
                      
                      &#xD;
      &lt;/a&gt;&#xD;
      
                      
                      
      Protection Plus Security today for a no-obligation reassessment of the facility.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/7ccda8b4-917b-4bc1-a3b2-8d2d4f20f455.jpg" length="13667" type="image/jpeg" />
      <pubDate>Wed, 15 Mar 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/6-simple-steps-to-boost-your-security-quotient</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/7ccda8b4-917b-4bc1-a3b2-8d2d4f20f455.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>WANT MOBILITY &amp; CONVENIENCE?</title>
      <link>https://www.protectionplussecurity.com/want-mobility-convenience</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Think security

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/blog-images-feature-feb-2017.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Intrusion detection is still one of the most critical core functions of security. Maybe you haven’t heard, but it’s become quite mobile, easy to program and simple to use. Security continues to change dramatically, now leveraging the cloud and other real-time location technologies to get all the information you need delivered to you quickly and seamlessly.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protection Plus Security exists to provide customers the best experience possible from all their systems solutions and integrated technologies. We keep up to date on the latest trending and proven technologies that can keep your facility better protected. Now, security and intrusion detection has morphed into a true convenience application that gives new connectivity, insights and data. Protection Plus Security provides smart, intuitive security that can be customized to fit your needs.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      There’s an app for that!
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    You can control everything from your smartphone, or, if you prefer, devices such as your Apple or other connected watch, tablet or desktop. Have it your way and start using some of the functionality available for security – such as remote connectivity for system permission scheduling and changes; arming and disarming; receiving video clips; as well as email and text message alerts of system exceptions or other activity. This fingertip control is available 24/7 so you can keep your business safe and secure and provide access when you are away during weekends or holidays.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Here are more cool things that come from security today:
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Find out the immediate status of your system and which sensors, detectors and locations, such as windows and doors, are armed or disarmed. One click, and your system is online; or off line in an instant.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Get detailed history reports piped straight to your preferred device and find out who entered and when, as well as when the system was accessed remotely and the exact moment systems were set or disarmed.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      See real-time video clips of employees coming into the offices, especially helpful during off hours.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    We know you have choices, but there 
    
                    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
                      
      IS
    
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
                    
     a big difference in security providers. Others can install equipment, but will they be there for you every step of the way as your needs change or you need someone you can contact directly? We base our business on providing an exceptional customer experience and complete satisfaction. 
    
                    
                    &#xD;
    &lt;a href="mailto:info@protectionplussecurity.com"&gt;&#xD;
      
                      
                      
      Contact us
    
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
     today to learn how we can do to make your security more convenient and comprehensive.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/28721f21-d5b9-44cd-8248-14d966603cf7.jpg" length="29232" type="image/jpeg" />
      <pubDate>Tue, 21 Feb 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/want-mobility-convenience</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/28721f21-d5b9-44cd-8248-14d966603cf7.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Silly Burglar of the Month - February  2017</title>
      <link>https://www.protectionplussecurity.com/silly-burglar-of-the-month-february-2017</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This video is an example of not-so-savvy alleged burglars for your entertainment. The video surveillance system shown was not installed by Protection Plus Security Services
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg" length="8196" type="image/jpeg" />
      <pubDate>Wed, 01 Feb 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/silly-burglar-of-the-month-february-2017</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>THE CHANGING FACE OF VIDEO SURVEILLANCE</title>
      <link>https://www.protectionplussecurity.com/the-changing-face-of-video-surveillance</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Now you can leverage cameras for more than security

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/vid-cams-jan-2017.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The use of video surveillance for physical security continues to grow. According to recent research by 
    
                    
                    &#xD;
    &lt;a href="http://www.ihs.com/"&gt;&#xD;
      
                      
                      
      IHS
    
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
    , a leading security industry research firm, there were 245 million professionally-installed video surveillance cameras active and operational globally in 2014.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Those numbers will continue to increase and now, Internet Protocol (IP) networked cameras are becoming increasingly specified, as their prices continue to drop while their capabilities mount. Networked cameras bring additional value to physical security at commercial premises because they can be leveraged for more than physical security – adding data and business intelligence to the equation.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    The counterparts to networked cameras are analog devices. They don’t have the inherent ‘smarts’ of IP cameras but can still be leveraged to produce enhanced information. This is accomplished easily with the addition of hardware such as encoders that take the signal and digitize it for the network. So for those customers with legacy or older analog units, there are still ways to use current cameras effectively to get every ounce of security out of the devices. When you are ready, Protection Plus Security can help you migrate to newer technology, at your pace, thanks to some of these and other ‘bridge’ hardware products now on the market.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Video cameras are also perfectly suited for businesses which may not have a receptionist, so occupants can be alerted when a visitor approaches. Coupled with motion detectors, they sound an alert or chime or indicate on a computer or other connected device that someone is waiting at the entrance.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Cameras also increasingly include on-board video analytics. These smart cameras include software that can be programed to look for certain types of behavior or changes in the scene. For example, heat mapping- a common analytic, provides users with graphics that indicate the route patrons took during a store visit, or dwell time, which is how long a customer stops at a retail store display. Another analytic can alert management when checkout lines have surged, so more cashiers can be brought to the front of the store. These applications yield new intelligence that can be parlayed into better management and operations. Analytics are applicable to more than just retail. In warehousing, analytics can be used to assess stocking operations and when more hardware or other goods must be ordered, or even when a distribution line process has failed or gone awry.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    
    Protection Plus Security always custom-tailors the solution for your business. We assess what you want to accomplish and only then suggest appropriate technology. Video surveillance is great for safety, security and overall to address identification and even liability claims. But when you want to enhance your specification and add deeper intelligence, networked IP cameras and those with software analytics may be in order. Contact 
    
                    
                    &#xD;
    &lt;a href="http://protectionplussecurity.com/get-connected.html"&gt;&#xD;
      
                      
                      
      Protection Plus Security
    
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
     today to learn how you can extend video beyond physical security.
  
                  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/66ffe25d-b975-4750-b3e8-f66d137efa99.jpg" length="9494" type="image/jpeg" />
      <pubDate>Sun, 15 Jan 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/the-changing-face-of-video-surveillance</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/66ffe25d-b975-4750-b3e8-f66d137efa99.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Silly Burglar of the Month - January  2017</title>
      <link>https://www.protectionplussecurity.com/silly-burglar-of-the-month-january-2017</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This video is an example of not-so-savvy alleged burglars for your entertainment. The video surveillance system shown was not installed by Protection Plus Security Services
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg" length="8196" type="image/jpeg" />
      <pubDate>Sun, 01 Jan 2017 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/silly-burglar-of-the-month-january-2017</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/pplus-youtube-icon.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>High Defitnition Video System for Small Business or Residential</title>
      <link>https://www.protectionplussecurity.com/high-defitnition-video-system-for-small-business-or-residential</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Not every system is the same. Get the one that's right for you.

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/cameras.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    So my wife has been asking for years to install a video surveillance system at our house.  Although we live in a very good neighborhood in San Jose, California we still get silly and not so silly things happening on our street.  Mostly someone checking car doors to see if they are open then rummaging through the vehicle looking for things of value.  Although the other day my daughter reported that shortly after our mailman delivered our mail a woman dressed similar to our mailman approached the house and went through our mailbox.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  I decided to installed an analog video system at the house; mainly because we had the recorder and cameras here in the shop.   I should have known better.  The 480 TV lines of resolution produced by this system were just not enough.  It was like looking through a fish bowl and trying to make things out.  Having installed many high definition video systems and seen the quality of images available with these systems I was not satisfied with the analog system.  About a month later I decided to install a high definition 1080p system at the house.  
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;a href="https://1.bp.blogspot.com/-M33ol0SSjBI/VC2pONhwLMI/AAAAAAAAAHs/Fi3SAehc0s4/s1600/LTS%2BBullet%2BCamera%2B-%2B1080p.jpg"&gt;&#xD;
    &lt;/a&gt;&#xD;
    
                    
                    
  Having recently discovered a cost effective coaxial based high definition system produced by LTS I decided to remove the analog system and replace it with this HD system.  What a difference!   The images are crystal clear.  There is no doubt about the activities around my home.  The night time view is equally as impressive -  providing a crystal clear black &amp;amp; white image.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;a href="https://1.bp.blogspot.com/-yHnBt5llRT8/VC2pSrpB4cI/AAAAAAAAAH0/hblshxh1_IY/s1600/LTS%2BTurrent%2BCamera%2B1080p.png"&gt;&#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
     We are now making this system available to our commercial and residential customers.  
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      4 Camera, 1080p, Complete Video Surveillance System installed starting at $2,500.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      8 Camera, 1080p, complete video surveillance system installed starting at $4,500.
    
                    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      16 Camera, 1080p, complete video surveillance system installed starting at $8,100.  
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  If you are in the greater San Francisco Bay Area and would like to receive a firm estimate for your application please contact me at 510-770-9900 or 
  
                  
                  &#xD;
  &lt;a href="mailto:patrick@protectionplussecurity.com"&gt;&#xD;
    
                    
                    
    patrick@protectionplussecurity.com
  
                  
                  &#xD;
  &lt;/a&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/LTS+Turrent+Camera+1080p.png" length="27637" type="image/png" />
      <pubDate>Thu, 02 Oct 2014 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/high-defitnition-video-system-for-small-business-or-residential</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/LTS+Turrent+Camera+1080p.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>License Plate Recognition</title>
      <link>https://www.protectionplussecurity.com/license-plate-recognition</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Cadillac+in+Parking+Lot+-+Parking+Lot.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    I get asked about license plate recognition all the time.  With the newer high definition megapixel network cameras it has become easier to achieve.  It is all about pixels per foot.  The more pixels on the object the more likely you are to capture a license plate. 
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  
                  
                  
  A minimum of 45 pixels per foot are required to be able to capture a license plate.  This is measured in the horizontal field of view. Meaning the correct camera and lens combination is required to capture a license plate.
                  
                  &#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Cadillac+License+Plate.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    These pictures are captured with an Arecont 5 megapixel day night camera which is recorded to an exacqVision network video recorder. 
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
                    
    We at Protection Plus Security Services are experts in video surveillance systems and have installed numerous high definition video surveillance systems for our customers. 
  
                  
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Cadillac+License+Plate.jpg" length="35809" type="image/jpeg" />
      <pubDate>Fri, 15 Aug 2014 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/license-plate-recognition</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/dms3rep/multi/Cadillac+License+Plate.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Community Policing to the Next Level</title>
      <link>https://www.protectionplussecurity.com/2010/11/community-policing-to-next-levelhtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The City of San Jose has been recognized for years as being one of the safest cities in the nation yet with that stated in 2009 it reported over 3,400 violent crimes and nearly 28,000 property crimes. All would agree that anything we can do to help reduce these numbers will further help our community.CrimeReports.com an online crime reporting website provides information on police activity, calls for service from both citizens and police officers, as well as the location of registered sex offenders. The San Jose Police Department is one of more than a dozen police departments nationwide that provides Computer Aided Dispatch information directly to CrimeReports.com for mapping and analysis. SJPD has been working with CrimeReports.com since 2007. The CrimeReports.com website allows the citizens of San Jose to view police activity in their neighborhood; everything from traffic violations, assaults, homicides, domestic abuse, to the identification and location of the nearest registered sexual offender. This year CrimeReports.com released its Neighborhood Central application. Neighborhood Central incorporates social networking into its website with tight integration with Facebook and Twitter. Allowing Facebook users the ability to share, link, and discuss criminal activities in their neighborhood. Neighborhood Central helps creates a virtual neighborhood watch group. One of the interesting features available with CrimeReports.com Neighborhood Central software is the ability for individuals to identify any public facing video surveillance cameras they may have deployed at their homes or businesses. This information could be of real value to SJPD when investigating crimes or suspicious activities. Video surveillance systems are an integral part of most business security measures and have become more and more common place for residential applications. Since these system are not public systems they are typically not known to the police department; providing this information could make for a powerful tool.For more information check out the following websites:http://www.crimereports.com/http://www.sjpd.org/
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.crimereports.com/"&gt;&#xD;
      
                      
    
  
    http://www.crimereports.com/
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.sjpd.org/"&gt;&#xD;
      
                      
    
  
    http://www.sjpd.org/
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Sat, 13 Nov 2010 15:58:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/11/community-policing-to-next-levelhtml</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Dummy Cameras – To Use or Not</title>
      <link>https://www.protectionplussecurity.com/2010/07/dummy-cameras-to-use-or-nothtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Recently one of my customers invited me to look at adding cameras to their existing video surveillance system, a system that we installed about a year ago. The surveillance system monitors key areas of a newly constructed building on their campus. This particular customer has been experiencing problems with thieves breaking into vehicles in their parking lot. After reviewing the cost to add an additional camera to their system my customer asked if we provided dummy cameras. A dummy camera is a fake camera that looks like a real camera but does not contain any of the electronics and is not connected to the video surveillance system. My response was this is something we don’t install and I sent the customer a link to an article about dummy cameras. This article highlighted the advantages of such cameras; cost and the deterrent effect of having these units in place. It also revealed the disadvantage; false sense of security and no video images that can be used as evidence.I echoed the reasoning in the article and advised they consult their attorney before deploying such a system. To my surprise my customer responded that it was the local police department that recommended the deployment of the dummy cameras. This got me to thinking what is the real issue here? If the police department is recommending the use of these units, perhaps the deterrent value outweighs the possibility of a lawsuit.I spent several hours researching this topic looking for articles in which lawsuits related to a false sense of security due to a camera (real or fake) being installed. I could not find anything. I reviewed a number of forums asking the same question; site the cases where this has been an issue? I reviewed the website of a well known attorney specializing in the security systems industry, Ken Kirschenbaum. I could not find an article or case that directly relates to this issue. Almost every article I read says the same thing; don’t install them for fear of the liability associated with this “false sense of security”. Yet if this fear is so prevalent why are there so many companies selling these cameras? A quick Google search reveals numerous companies willing to sell you a dummy security camera. These devices are really inexpensive. If there were so many suits taking place one would think there wouldn’t be any demand for these types of devices.My conclusions: Dummy cameras may be an effective tool for deterring an unsophisticated thief. Most professionals can easily identify a real camera from a fake one. The blinking LED is a sure give away. Don’t post signage that states for your security, or for your safety, or some other phrasing that may give people the belief the cameras (real or fake) are being constantly monitored.Consult your attorney for their opinion.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="http://4.bp.blogspot.com/_u3t_3SHSmbY/TDEKeOeA__I/AAAAAAAAACY/lNHhkIUwE4Q/s1600/Dummy+Camera+1.jpg" target="_top"&gt;&#xD;
    &lt;img src="http://4.bp.blogspot.com/_u3t_3SHSmbY/TDEKeOeA__I/AAAAAAAAACY/lNHhkIUwE4Q/s1600/Dummy+Camera+1.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="http://4.bp.blogspot.com/_u3t_3SHSmbY/TDEKeOeA__I/AAAAAAAAACY/lNHhkIUwE4Q/s1600/Dummy+Camera+1.jpg" length="3867" type="image/jpeg" />
      <pubDate>Sun, 04 Jul 2010 22:34:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/07/dummy-cameras-to-use-or-nothtml</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="http://4.bp.blogspot.com/_u3t_3SHSmbY/TDEKeOeA__I/AAAAAAAAACY/lNHhkIUwE4Q/s1600/Dummy+Camera+1.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Integrating Your Access Control System with Your Intrusion Alarm System</title>
      <link>https://www.protectionplussecurity.com/2010/06/integrating-your-access-control-systemhtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    I often get asked to integrate the alarm system with the access control system such that employees don’t have to arm and disarm the alarm system. They want this to be automated and they want their employees to be able enter and exit the facility as needed with their access control card.This request can be driven by a number of factors. Sometimes it is the shear size and layout of the facility. If the facility is large or the layout is complex they find their employees unwilling to walk the facility prior to arming the alarm system, thus the employees either don’t activate the alarm system or they activate the alarm system with employees still in the facility. Sometimes this is driven by the number of employees. The more employees the less likely the alarm system will be activated, unless you task this to a specific group of employees. If your policy is the last one out arm the alarm system; then the larger the organization the less likely this will get done. If your policy is the facilities (security, custodial, etc.) department to arm the alarm system then it is more likely to be accomplished. The integration of these two systems starts with the system design. Depending on the products we are using we can accomplish this in two different ways.Perimeter Alarm with Local Door AlarmsThis method will work with any access control system. It requires an intrusion alarm system that can be programmed to automatically arm and disarm.The alarm system is designed with perimeter protection only. All the perimeter doors are contacted and all the perimeter glass is monitored. The system is programmed to automatically arm and disarm based on a provided schedule.At each of the perimeter access controlled doors we install a local door alarm. This local door alarm ties into the access control system and the intrusion alarm system. This unit allows employees to enter and to exit without triggering the alarm system. After-hours when the alarm system is active your employees can enter with their access control card and freely exit the building even when the alarm system is active.The local door alarm serves a secondary purpose as well. It alerts employees of door prop open conditions prior to alarm activation. If the access control door is left in an open position the local door alarm will sound a pre-alarm warning. If the door is shut during this pre-alarm then no alarm is generated. However, if the door remains open for an extended period of time then an alarm will be generated at the local door alarm and if the building intrusion alarm system is active this same alarm will be transmitted to the monitoring station.This is a great solution for companies that may have personnel working all hours of the day or night. We find this solution works well with our high tech customers that may have engineers or software development personnel that tend to work long hours or off hours.The downside to this type of system is that it is providing only building perimeter protection. If an intruder can get inside your facility without forcing a door open or breaking the glass then they will be undetected. S2 Security Access Control + Intrusion Alarm SystemS2 Security has an innovative interface for integrating the intrusion alarm system with their access control system. With the S2 Security system the access control system monitors the status of the intrusion alarm system and based on a schedule and the alarm system in a normal condition will activate the alarm system. This allows for an intrusion alarm system that includes not only door contacts and glassbreak detectors but also interior motion detectors. Providing a greater level of security to the facility; the motion detectors are designed to detect the interior presence of an intruder.This system does not require the local door alarms, because it is never active when employees are inside the facility, unlike the perimeter alarm system. Based on a schedule and when there a no faults on the alarm system the S2 Security system will arm the intrusion alarm system. Once armed the first authorized employee to present their access control card will disarm the system prior to gaining entry into the facility.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 03 Jun 2010 14:55:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/06/integrating-your-access-control-systemhtml</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>exacqVision Network Video Recorders</title>
      <link>https://www.protectionplussecurity.com/2010/05/exacqvision-network-video-recordershtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Protection Plus Security Services, Inc. is proud to offer the exacq Technologies exacqVision Network Video Recording systems. exacqVision offers a versatile lineup of IP based recording software and servers. The exacqVision system integrates with a number of access control systems to include PCSC and S2 Security.The product matrix consists of the VMS (video management software), the exacqVision EL entry level hybrid network video recorder, the exacqVision Hybrid NVR servers, and the exacqVision IP Camera servers. VMS SoftwareThe exacqVision video management software (VMS) allows for viewing and recording of the network based IP cameras on the system. This software is designed to run on a Windows or Linux server with the clients running on Windows, Linux, or Mac. Multiple exacqVision servers can be managed and viewed from the VMS platform.This system supports up to 255 network based IP cameras. It supports standard CIF, 2CIF, 4CIF recordings as well as megapixel recordings and it supports MJPEG, MPEG-4, and H.264 compression formats. The software is easy to use and easy to configure. User permissions and privileges can be configured allowing the administrator to restrict individual user rights.The VMS software is licensed by camera at a cost of $150 per camera.exacqVision ELThe exacqVision EL is exacq Technologies entry level hybrid network video recorder. This system allows for up to 16 analog cameras and up to 24 IP cameras to be connected to the server. It is available with storage capacities ranging from 160GB to 2TB and recording speeds of 120 images per second (IPS) or 480 IPS. The system runs on a Linux operating system. It is equipped with a DVD/CR-RW and USB for archiving images. This system is designed to be exacqVision’s entry level network video recorder and is ideal for customers with an existing 16 camera analog recording system (DVR or VCR) that want to transition into the higher quality megapixel cameras.The exacqVision EL cost ranges from $3,890-$6,500 with each IP camera license costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.exacqVision Hybrid NVR ServersThe exacqVision Hybrid NVR server comes in three different models; the desktop, the 2U Rackmount, and the 4U Rackmount. This system allows for connection of 4 to 64 analog cameras (model dependant) and up to 64 IP cameras.DesktopThe desktop model allows for either 4 or 16 analog camera inputs and includes 8 IP camera licenses (expandable to 64 IP cameras). It is available with storage capacities ranging from 160GB to 2TB with system recording speeds of 120 IPS or 480 IPS. The Desktop Hybrid NVR server cost ranges from $3,700-$7,505 with each IP camera, beyond the first eight, costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.2U RackmountThe 2U Rackmount model allows for either 16 or 32 analog camera inputs and includes 8 IP camera licenses (expandable to 64 IP cameras). It is available with storage capacities ranging from 320GB to 6TB with system recording speeds of 120, 240, 480, or 960 IPS. The 2U Rackmount Hybrid NVR server cost ranges from $5,770 -$15,265 with each IP camera, beyond the first eight, costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.4U RackmountThe 4U Rackmount model allows for 16, 32, 48, or 64 analog camera inputs and includes 8 IP camera licenses (expandable to 64 IP cameras). It is available with storage capacities ranging from 1.5TB to 16TB and with system recording speeds of 240, 480, 960, 1440, or 1920 IPS. This unit is also available in a Raid 5 configuration.The 4U Rackmount Hybrid NVR server cost ranges from $10,125-$34,800 with each IP camera, beyond the first eight, costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.exacqVision IP ServersThe exacqVision IP server comes in three different models; the desktop, the 2U Rackmount, and the 4U Rackmount. This system allows for connection of up to 64 IP cameras.DesktopThe desktop model is available with storage capacities ranging from 160GB to 2TB. The Desktop IP server cost ranges from $2,190- $4,030 with each IP camera license costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.2U RackmountThe 2U Rackmount model is available with storage capacities ranging from 320GB to 6TB. The 2U Rackmount IP server cost ranges from $2,660-$8,340 with each IP camera license costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.4U RackmountThe 4U Rackmount model is available with storage capacities ranging from 1.5TB to 16TB. This unit is also available in a Raid 5 configuration.The 4U Rackmount IP server cost ranges from $4,995-$19,995 with each IP camera costing an additional $150 per camera.This unit comes with a 3 year manufacturer warranty.Selecting the model that is right for youThere are several factors that will affect your selection of the correct network recording system; quantity of analog cameras, quantity of IP cameras, future expansion needs, archive time (30, 60, 90, 180 days), image recording rate, image recorded (CIF, 2CIF, 4CIF, D1, megapixel), and anticipated activity level in the field of the cameras to name a few variables. Calculations need to be done to make sure the NVR selected will meet your needs. We at Protection Plus Security Services are experts in video surveillance systems and would welcome the opportunity to specify the video system that is right for you.Please visit our website for product datasheets and links to the manufacturer’s website. www.protectionplussecurity.comThe pricing and model information are based on the latest information available at the time of this blog.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Tue, 04 May 2010 23:13:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/05/exacqvision-network-video-recordershtml</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>S2 Security Releases 4.0 Software</title>
      <link>https://www.protectionplussecurity.com/2010/04/s2-security-releases-40-softwarehtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    S2 Security recently released the 4.0 software. The 4.0 software offers some real nice enhancements to the existing platform. The major enhancements include Layouts, Partitions, and new Network Video Recording integration. With Layouts the user can now customize the look and feel of the software, allowing you to create a custom page for viewing the system events, cameras, and even other web pages.Partitions allow for the creation of a subsystem within the larger system. This subsystem has independent control of its readers and doors. Ideal for multi-tenant buildings or for organizations in which each department or division needs independent control. The exacqVision Network Video Recorders can now integrate with the S2 Security system. This integration allows for linking of video clips with card activities as well as viewing the cameras from the S2 software.For current Netbox system users S2 will not be making any further advances in the 3.x software. The Netbox system software will not be developed beyond the 3.3 version. S2 will continue to offer patches for known issues, however, no new features will be added to this software. Current users will need to upgrade their Netbox Controller to the Netbox Extreme, Enterprise, or Enterprise Ultra Controller in order to operate the 4.0 software. S2 offers a 50% credit for the existing Netbox software and Netbox Controller to be applied toward the purchase of the Netbox Extreme, Enterprise, or Enterprise Ultra Controller and 4.0 software.The Netbox Extreme allows for 64 Network Nodes and up to 256 Portals (Readers) with up to 10 concurrent users. The Extreme Controller is eight times faster than the Netbox controller. This system can process 10 Events per SecondThe Enterprise system allows for 64 Network Nodes and up to 896 Portals (Readers) with up to 25 concurrent users. This system can process 20 Events per Second.The Enterprise Ultra system allows for up to 256 Network Nodes and up to 3,584 Portals (Readers) with up to 35 concurrent users. This system can process 30 Events per Second.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Sat, 03 Apr 2010 13:59:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/04/s2-security-releases-40-softwarehtml</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Videofied Wireless Video Alarm System</title>
      <link>https://www.protectionplussecurity.com/2010/01/videofied-wireless-video-alarm-systemhtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Protection Plus Security Services, Inc. is proud to offer the Videofied wireless video alarm system. The Videofied wireless video alarm system is a wireless battery operated security system that communicates alarm and video clips over the cellular data network to the Central Monitoring Station. This system provides a 10 second video clip for the Central Station operator to review and verify the presence of an intruder. The system is completely battery operated utilizing AA and D cell lithium batteries. The battery life is rated for up to four years, dependant on alarm activity. Two years is more likely.  The system is supervised from the control panel to the device locations. Each device on the system is configured to check in every eight minutes. The devices connected to the system are supervised for state (armed / disarmed), tamper, and battery status. Each device transmits a unique secure identification code. Since no electrical power or phone lines are required for this system it is ideal for applications where this is an issue, such as construction sites, equipment storage yards, vacant buildings, or remote buildings. As long as you have cellular signals this system can be deployed. It is also ideal for deployments requiring alarm verification. With many of the police jurisdictions refusing to respond to unverified alarm signals this system allows the means of verifying the alarm. This system is very cost effective when compared to the costs of installing an alarm system plus a video surveillance system.The Videofied system consists of the control panel and one wireless keypad. This system allows for up to 24 additional wireless devices to be connected to the system. It allows for up to 19 user codes, each user code can be 4 to 6 digits long. Devices include a wireless indoor motion detector with built-in camera, a wireless outdoor rated motion detector with built-in camera, a wireless door or window contact, a wireless interior siren, a wireless outdoor siren and strobe, a wireless unsupervised keyfob for limited system activation and panic alarm, and a wireless badge reader for arming and disarming the system with a proximity card.The heart of the system is the wireless passive infrared motion detection cameras. Two models are available; an indoor rated unit and an outdoor rated unit.This indoor unit consists of a digital camera and passive infrared detector. The digital camera is a black and white camera equipped with a wide angle lens (85 degrees). This camera provides a 320 x 240 pixel resolution picture. The unit is equipped with two infrared LED’s providing night time illumination of up to 14 feet. The passive infrared motion detector is rated for 40 feet at a 90 degree pattern. This unit is equipped with a tamper switch, once mounted if it should be removed it will trigger an alarm on the system. This unit is ideal for mounting in the corner of a room or for viewing a hallway or stairwell. When activated by motion the unit will trigger the alarm panel as well as transmit a 10 second video clip to the Central Monitoring Station.The outdoor unit is very similar to the indoor unit except it is housed in an outdoor protective housing and the two infrared LED’s provide night time viewing with a range of up to 26 feet. This unit is ideal for monitoring an equipment yard, secured storage area, construction site, or fence perimeter.Visit our website for product datasheets, links to the manufacturer’s website, and sample video clips. www.protectionplussecurity.com
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Thu, 28 Jan 2010 02:26:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/01/videofied-wireless-video-alarm-systemhtml</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Megapixel Cameras</title>
      <link>https://www.protectionplussecurity.com/2010/01/megapixel-camerashtml</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Happy New Year! I hope everyone had an enjoyable Christmas and New Year’s. I am looking forward to a fantastic 2010.With the emergence of megapixel cameras and Network Video Recorders (NVR) capable of recording these cameras I get a lot of questions regarding the benefit and usefulness versus extra cost of deploying a megapixel camera system. The answer always seems to be: What level of detail do you require? If the areas you are monitoring are all close to the camera and do not require fine detail then you may not require a megapixel camera system at all. However, if you are trying to monitor a parking lot, vehicle traffic, a warehouse, a high value area, drug dispensing area, cash registers, or any area requiring detailed images then megapixel cameras are your solution.I compare megapixel video surveillance to your home theater system. When the home theater systems went from standard resolution to high definition it was a huge improvement to the picture quality. Particularly noticeable with sporting events you can now see the hockey puck – not just a blur. You can determine the brand of golf ball being played; see the blades of grass on the putting green. You can see the sweat dripping off the players. With high definition you can see details never noticeable before. You get the point.The same has happened in the video surveillance world. You can now see details never available before, or only available with specialized well positioned and well focused cameras. With megapixel cameras you can make out vehicle license plates. Now you can clearly see what is being loaded or unloaded on that truck. You can clearly and positively identify a person. You are no longer limited to the 480 TV lines of resolution (.4 Megapixel) available on your analog digital recording system. Cameras are available in 1, 2, 3, and 5 Megapixel versions. A 1.2 Megapixel camera will provide three times the resolution of your analog high resolution camera. The 2 Megapixel cameras will provide five times the resolution. With a 5 Megapixel camera providing twelve and a half times the resolution. As a further comparison, going back to our home theater example HDTV 720p is equivalent to .9 Megapixels and HDTV 1080p is equivalent to 2.1 Megapixel. With these high resolution cameras and the NVR software you can digitally zoom deep into the recorded picture for better identification. A well positioned megapixel camera can replace several analog cameras viewing the same area, helping to offset the additional costs of the system. A word of caution; these IP based network cameras transmit their video over your network or a separate video surveillance network, the larger the megapixel camera the more bandwidth required and the more storage required. We are no longer talking about gigabytes of storage; we are talking terabytes or more of storage needed for these network video recording systems. It can add up quickly. The proper specification and deployment of these systems is critical to maximizing your return on investment. We at Protection Plus Security Services, Inc. are experts in video surveillance systems, both the analog / DVR systems and the IP network cameras / NVR systems. Let us help design and implement a video surveillance system that is right for you application and your budget.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Wed, 06 Jan 2010 16:34:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/2010/01/megapixel-camerashtml</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Your Security System Holiday Checklist</title>
      <link>https://www.protectionplussecurity.com/your-security-system-holiday-checklist</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  With Christmas and New Year’s quickly approaching have you thought about your security system setup?

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1513980297158-ac7902b06406.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    This year both Christmas Day and New Year’s Day fall on a Friday. You will want to make sure these days plus any other company shut down days are designated as holidays in your security system programming, so as to avoid doors unlocking on your access control system or your intrusion alarm system disarming (for those systems programmed to automatically arm and disarm based on a schedule).
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    Access Control System: 
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  You can program your holiday schedules directly via the access control system software. If you have any questions regarding this contact our office. 
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    Intrusion Alarm System:
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  For our scheduled alarm system customers please provide our office with an updated holiday list if this has changed from the dates provided earlier this year. We will update the holiday schedule in your alarm panel at no charge as part of our service. 
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    Alarm System Notification: 
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  Will your responsible party (call list) personnel be in town to respond to alarm calls or are they travelling for the holidays?
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  You may want to check with your responsible party personnel as to their holiday plans and if necessary update your Responsible Party list. 
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    Protection Plus Security Services, Inc. customers:
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  You can download the alarm system update forms from our website. Here is the link for the Control Center update form and the Alarm Panel update form: 
  
                    
                    &#xD;
    &lt;a href="http://www.protectionplussecurity.com/support/PPSS_support.htm"&gt;&#xD;
      
                      
                      
    http://www.protectionplussecurity.com/support/PPSS_support.htm
  
                    
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  Have a Merry Christmas and Happy New Year!
                  
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1513980297158-ac7902b06406.jpg" length="154557" type="image/jpeg" />
      <pubDate>Mon, 14 Dec 2009 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/your-security-system-holiday-checklist</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1513980297158-ac7902b06406.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Access Control Systems</title>
      <link>https://www.protectionplussecurity.com/access-control-systems</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
                  
  Access Control – Card Entry Systems

                
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp-cdn.multiscreensite.com/50d3c14e/import/clib/protectionplussecurity_com/dms3rep/multi/proximity-card-602x305.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
                    Access control systems are used to restrict and track users, these systems are used to protect key areas and limit users based on door, time, and days.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  In some instances these systems are nothing more then a replacement to the hard key eliminating the need to constantly re-key a building after an employee or tenant leaves. In other cases they are one part of a comprehensive security program.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    History
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  Access control systems emerged in the 1980’s as a means of electronically controlling and tracking entry into a building. These Host based systems, VAX or Unix type systems used video terminals that were very expensive and cumbersome to use. They were limited in the controls and reporting capabilities. These systems were typically employed by the government and larger companies.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  Starting in the 1990’s Windows based PCs, client server environment, allowed these systems to evolve and be more user friendly, at the same time the costs came down substantially. These systems grew in popularity with large and small companies, property managers, buildings owners, and government entities employing them.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
                    
  Today the PC based systems continue to be very popular as well as browser based systems have emerged. The browser based systems allow more flexibility than the PC based systems and are more easily deployed throughout an entire organization.
  
                    
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
                      
    Typical Components:
  
                    
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      PC or Web Browser Software
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Access Control Panel(s)
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Power Supplies (access control panel &amp;amp; door hardware)
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Card Readers and Cards
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Electronic Door Hardware
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
                      
      Cabling
      
                      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Software:
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  Each access control manufacturer develops their own software, some run on Windows, some are Linux based, with very few being Mac compatible. It is wise to review the software of the system you are considering to deploy to make sure it is user friendly and has the features you would like as well as the capabilities to expand.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Access Control Panels:
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  Depending on the system being deployed the control panels can typically handle anywhere from 1-14 readers. Our cost effective system can control 1-2 readers per panel. Our mid grade PC based system can control 2, 4, 6, 8, 10, or 12 readers from one control panel. Our browser based system can control 2, 4, 6, 8, 10, 12, or 14 readers from one control panel. All our systems can be expanded to control hundreds to thousands of doors and readers.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Proximity Technology:
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  This is the most popular reader technology. With proximity technology a proximity card is presented within a 2”-4” read range of the card reader. The reader will be beep and the LED on the reader will change colors to indicate the card has been read. If the card is authorized the door will unlock.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Costs:
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  Typical per door cost is $2,500 - $3,000. This includes all the necessary components and labor to install. This average cost is based on a system with a minimum of four or more doors with no special electronic door hardware needs.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    Electronic Door Hardware – The Real Cost Variable
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  The overall system costs will be greatly impacted by the type of door hardware required to control the doors. The cost estimates given above are for electric locksets, electric mortise lock bodies, electric strikes, and electrifying of Von Duprin 33 or 99 series crash bars.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  Specialty electronic hardware or complete replacement of existing vertical rod crash bars will drive these costs much higher. I have seen instances where equipping doors with the correct electronic hardware have run $5,000 - $10,000 for just the hardware.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
                    
    System Integration
  
                  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  One of the real powers of the browser based system (S2 Security) is the ability to seamlessly integrate with video surveillance (digital video recorders, network video recorders, and network cameras), photo identification management, and intrusion alarm systems. The S2 Security system provides features and functionalities that were previously only available to large system users at an affordable level.
  
                  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
                  
  For more information on the products offered by Protection Plus Security Services see our website 
  
                  
                  &#xD;
  &lt;a href="http://www.protectionplussecurity.com/"&gt;&#xD;
    
                    
                    
    www.protectionplussecurity.com
  
                  
                  &#xD;
  &lt;/a&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/50d3c14e/import/clib/protectionplussecurity_com/dms3rep/multi/proximity-card-602x305.jpg" length="23984" type="image/jpeg" />
      <pubDate>Mon, 30 Nov 2009 00:00:00 GMT</pubDate>
      <guid>https://www.protectionplussecurity.com/access-control-systems</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/50d3c14e/import/clib/protectionplussecurity_com/dms3rep/multi/proximity-card-602x305.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
  </channel>
</rss>
