Network cameras - Expert commentary
What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department. In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system...
In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organisations will suffer...
Gaps in video from dropped video frames are a common problem. A web search on the phrase “dropped video frames” turns up links oriented towards gamers, YouTube videographers and even the world of video surveillance, discussing why frame drops happen and providing advice for coping with them. On Windows computers, video frame drops are a fact of life. Much of the advice can help reduce the number of frame drops, though never completely eliminate them. If you are an amateur filmmaker...
Video storage is the foundation for new video surveillance infrastructures. Depending on your platform, storage can enhance your surveillance system’s capabilities, or it can limit them. But one thing is certain: your storage decision can no longer be an afterthought. Tremendous growth in data storage Digital technology is transforming the surveillance industry. In fact, it’s estimated that 66 million network cameras and 28 million high-definition CCTV cameras will sh...
Drastic increase in cybersecurity discussions is one thing that many of us in the security industry didn’t predict for 2016. Cybersecurity has obviously always been an important issue in general, but the discussion has gained a lot of momentum in the past year. As I said, this wasn’t predicted by most of us in the industry. The intensity of the focus on and discussion around cybersecurity in 2016 was a response to some of the high-profile denial of service (DoS)...
Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...
Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognising this reality, most organisations test their own networks for security weaknesses, whether to meet compli...
If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...
IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analogue systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analogue systems required separate...
When a manufacturer states a specific PoE power for a camera, always count on the maximum class power source Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and Electronics Engineers (IEEE) standards are the last word. However, when it comes to PoE, there is a wide range of both voltages and wattages that can qualify as being within an individual IEEE power class. This applies to both...
The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...
48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...
CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...
Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...
One obvious benefit of an NVR appliance compared to software VMS system is ease of configuration and installation A quality networked video recorder (NVR) and software-based video management system (VMS) both do an excellent job of safeguarding valuable video data. But there are a number of pros and cons for both, along with specific applications that will do better with one option over the other. These can easily be broken down into five topics: ease of setup/install, suppor...
IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...
With innovation continuing in HD CCTV, analogue video surveillancemay be around for some time What’s your stance on the analogue-to-IP video migration? When will it happen? Will analogue go away entirely? Talk to any security company and they’ll admit they love the simplicity of the installation and setup of analogue cameras. They know how to deploy it quickly, saving labour costs and also, can use the familiar and ever-present coaxial cabling network. That’s...
From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilisation The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...
As technology advances and more surveillance features become available, it can be difficult for security integrators to know which system will fit their customer’s needs It’s no secret that Internet Protocol (IP) cameras are on a steady march to replace analogue video. Network-centric surveillance cameras bring a host of value to the protected premises, above and beyond traditional physical security. Now, cameras are increasingly used for safety, such as in liabili...
Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things securi...
Since 2006, the LUSAX research program at Lund University in Sweden has investigated the effects of digitisation on the physical security industry. This article will look into the forces driving digitisation, and how those forces broadly translate and impacts the physical security industry. Historically, physical security systems have moved from purely mechanical systems into systems holding both mechanical and electronic low-voltage circuit-based components. Development was...
Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by i...
Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we depend on standards such as 802.3af for devices requiring up to 15.4 watts and 802.3at for devices powered up to 30 watts. We depend on the devices generating the power to be able to be read by devices receiving the power. Our dependence is not al...
Local surveillance companies often struggle when deciding between distributing third-party brands or selling their own branded surveillance products, especially when the company has already achieved some level of recognition among their customers and/or other key players. Distributing a famous third-party brand is a way to “play it safe” in an environment where there is little budget to spend on marketing, public relationships and other expenses related to produc...
In-vehicle technology allows security officials to view live footage from the bus’ cameras during an emergency One of the biggest security opportunities in transportation is onboard surveillance for buses and trains. While most transit organisations have invested heavily in video security for facilities such as terminals and stations, far fewer have taken the next step and installed IP cameras on board vehicles, says John Recesso, strategic business development manager,...
The growing market for legal marijuana (now available in some form in 24 states) has also generated a demand for security products and service to protect the industry from illegal activities. “For the most part, companies are looking for what we call the traditional surveillance systems whereby you have visible deterrence,” says Monty Henry, president of DPL-Surveillance-Equipment.com LLC in Ventura, Calif. Many companies are seeking more sophisticated systems t...
Over the past year Sony has expanded its product lineup to include a range of capabilities Sony 2014/2015 Review and Forecast: Many would agree that one of the most important trend in 2014 has been the emergence of 4K. We’ve already seen the first 4K security cameras hit the market, at a premium price. Sony is already a champion of 4K technology, which offers a resolution that is four times greater than Full HD (1080p), making for a sharp and detailed visual image. 4K w...
Time will tell regarding how fast public cloud applications will be fully adopted in the security space Sureview 2014/2015 Review and Forecast: The continued movement to “cloud” or “distributed” applications will further impact how security manufacturers and integrators market and position their solutions and offerings. To the traditional security organisation, this brings an entirely new go-to-market and pricing strategy as well as a completely diffe...
With the entry of more manufacturers and mergers and acquisitions in the security industry, the competition is undoubtedly getting fiercer VIVOTEK 2014/2015 Review and Forecast: Total solutions have become more important than individual products in the industry. Security brands are starting to turn themselves into solution providers instead of product manufacturers. Moreover, with technology advancement, the adoption of intelligent video content analysis is on the rise. I...
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download