Protecting Your Home & Business with Trusted Security Solutions.” 

 

 

 Keeping you safe & protected

We offer a diverse selection of top-tier security and home automation products and services tailored for both residential and commercial settings.

 

At CWC Security, we are dedicated to upholding the utmost standards in design, installation, and project management for security and communication systems. Our commitment includes comprehensive training programs for our staff to ensure they execute their tasks with safety and proficiency. Explore our extensive array of commercial and residential security solutions.

 

 

 

 

We will achieve continued business expansion by growing our client base and diversifying the services we offer. As our clients’ operations are positively impacted by our services, our business will prosper. Every aspect of CWC Security is designed to add value and deliver an urgent response to your changing needs with the right technology, custom-configured solutions, innovative extranet tools, technical expertise, specialized services and ongoing support.

 

 

 

Ensuring the safety and security of your premises is crucial in today's world. At CWC Security, we understand the importance of peace of mind when it comes to protecting what matters most to you.

 

 

 

As a leader in the alarm and security industry, we are committed to providing cutting-edge solutions tailored to your specific needs. With 30 years of expertise, our team specializes in designing, installing, and monitoring state-of-the-art security systems that offer comprehensive protection for residential and commercial spaces.

 

 

 

 

 

Legacy Payment -  Client Portal 


View work orders and quickly and securely pay your billing statements.

 

TApply for  Customer Financing 

 

 

 

Log into My Customer Portal

All New Portal !!!

See service history, technician notes and more in your account.

 

FAQs

FAQ - CWC Security Alarm & Camera

Frequently Asked Questions

What services does CWC Security provide?

We offer alarm systems, camera surveillance, home automation, and audio-video integration for both residential and commercial properties.

Do you offer 24/7 monitoring?

Yes, we provide 24/7 professional alarm monitoring to ensure your property stays protected around the clock.

How much does installation cost?

Installation costs vary depending on the system and property size. Contact us for a free quote or on-site assessment.

Can I control my system remotely?

Absolutely. Our systems come with mobile app access, so you can monitor and control your system from anywhere.

What areas do you service?

We proudly serve customers across New York, Long Island, and surrounding areas. Reach out to see if we cover your location.

How do I arm my alarm system?

Input your 4-digit code on the keypad, then:

  • Press 2 for Away Mode
  • Press 3 for Stay Mode
How do I disarm my alarm system?

Input your 4-digit code on your keypad, then press 1.

How do I turn the chime on or off?

Input your 4-digit master code, then press 9.

How do I bypass a zone?

  1. Input your 4-digit code
  2. Press 6 for bypass
  3. Input the two-digit zone number (e.g., 01, 02, 03)
  4. Repeat this for each zone you'd like to bypass

How do I replace the battery in a Honeywell wireless sensor?
  1. Determine the battery type: Most use CR2032, CR123A, AAA, or AA batteries. Check your sensor manual if unsure.
  2. Remove the back cover: Use a flathead screwdriver to gently press the release tab and remove the cover.
  3. Replace the battery: Take out the old battery and insert the new one, matching the + and - directions.
  4. Reattach the cover: Snap the cover back in place securely.
  5. Clear the panel: At the keypad, enter your user code followed by 1 (Off) twice to reset the panel sensor.

Network Components Terminology

 

 

Firewall

 

Wikipedia: "In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and an untrusted external network, such as the Internet. Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more networks and run on network hardware. Host-based firewalls run on host computers and control network traffic in and out of those machines."  

 

Router

 

Wikipedia: "A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using the information in its routing table or routing policy, it directs the packet to the next network on its journey."  

 

Switch

 

Wikipedia: "A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device. A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the data link layer (layer 2) of the OSI model. Some switches can also process data at the network layer (layer 3) by additionally incorporating routing functionality. Such switches are commonly known as layer-3 switches or multilayer switches."  

 

Desktop Phone

 

Wikipedia: "A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone calls over an IP network, such as the Internet, instead of the traditional public switched telephone network (PSTN). Digital IP-based telephone service uses control protocols such as the Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP), or various other proprietary protocols."  

 

SoftPhone

 

Wikipedia: "A softphone is a software program for making telephone calls over the Internet using a general-purpose computer rather than dedicated hardware. The softphone can be installed on a piece of equipment such as a desktop, mobile device, or other computer and allows the user to place and receive calls without requiring an actual telephone set. Often, a softphone is designed to behave like a traditional telephone, sometimes appearing as an image of a handset, with a display panel and buttons with which the user can interact. A softphone is usually used with a headset connected to the sound card of the PC or with a USB phone."