It is time not only to recognise the value of VNAs, but to consider how automation can make them more effective and efficient at their profession
Successful video infrastructure
management requires visibility into the
network’s behaviour
The importance of video in an organization has been growing over the past several years, almost exponentially. In retail, video images can help detect or deter theft by employees and patrons. Casinos use video partly due to state regulations, to ensure gaming activity is free of deceit or fraud. Branch offices use video to communicate with the head office. Schools use video for distance learning while medical facilities use video for remote consultations. And so on.

VNA – Where Credit Is Due

In these and other examples, recorded video can be priceless. It can save executives from legal action or save a corporation millions of dollars in liability. On the other hand, if the video system fails to record during that critical moment, the loss can be staggering. This is why assuring the video stream is completing its intended path has become one of IT and security’s biggest challenges. Oversight for this has become the role of what is beginning to be termed a Video Network Administrator, or VNA – a position that for the most part does not formally exist, but should. Typically a team comprising security technology, systems integrator technicians and IT, these individuals work diligently to keep video surveillance up and running. Now it is time to recognize this position and the person fulfilling it, as the VNA will play a vital role in your security strategy, a role that will increase in importance with the continuing expansion and integration of video surveillance technologies. 

Role Of VNA In Maintaining Video Uptime

Recorded video can be priceless. It can save executives from legal action or save a corporation millions of dollars in liability. On the other hand, if the video system fails to record during that critical moment, the loss can be staggering

Successful video infrastructure management requires visibility into the network’s behavior. Each video stream is an amalgam of many different systems and processes, the failure of any one of which can result in missing video. Heterogeneous video networks may include cameras at the edge, complex VMS and other software, networking infrastructure, hard discs for recording and more. The more technology you have deployed in your video solution, the more elements there are that could potentially run too slowly, cut out intermittently or fail at any given time. Spot-checking the system will not identify degrading components or other developing problems. 

Once a problem is detected, it can be a tremendous challenge for the VNA to identify the cause. Uncertainty about where the root of the problem lies can lead to guesswork and an inefficient trial and error process to try and solve it. Having a number of providers, contractors and vendors for your system exacerbates the problem as they may be reluctant to take responsibility for the issue, which only prolongs video downtime. Informational truck rolls are expensive and use even more time in trying to solve problems. During this time there is a lack of situational awareness, video is not being archived, investigations are negatively impacted and as a whole the organization is at a higher risk. 

Without question, management of the video stream is a serious and complicated issue for risk management, highlighting the crucial nature of the VNA’s role in the organization. This role will only grow in complexity and importance as video surveillance systems become larger and integrate with more hardware and software solutions. It is time not only to recognize the value of VNAs, but to consider how automation can make them more effective and efficient at their profession.  

SaaS – The Problem Identifier

Greater recognition of these challenges is driving a new segment of growth in the IT industry that has strong applicability within the security industry as well. Now there are software-as-a-service solutions that can monitor each unique video stream, detect when any interruption or decay is causing a gap in the stream, and alert the VNA with actionable information on how to quickly solve the problem. This software provides almost immediate ROI – but very quietly, as there is no way to measure the problems and liabilities that an organization has avoided by ensuring a robust video stream at all times.  

The role of VNA will only grow in complexity and importance as video surveillance systems become larger and integrate with more hardware and software solutions

What can be measured, and therefore managed, is diagnostic data. SaaS solutions provide this in the form of key performance indicators (KPIs) that give visibility and insight into the behavior of the IP video network and video operations. Furthermore, a well-designed user interface delivers the information directly to mobile phones and tablets in addition to desktop PCs, utilizing data visualization and diagnostic graphing to help the user better understand system statistics. Useful KPIs include:

  • Video path uptime
  • Video stream delivery index
  • Video retention compliance
  • Average ticket response time
  • Mean failure recovery time 

Finally, in the current environment where customer service and support truly defines a brand’s value to its community, it is essential for expert live assistance to be a quick call or click away at all times. This helps to get any questions or issues resolved even more quickly, further raising the ROI. 

Video has been established as a vital tool in an organization, and the individual who is fulfilling the role of VNA in any organization will, with absolute certainty, welcome the adoption of this type of automated software to maintain the health of the video network. For executive management, who are ultimately responsible for any risk that exists in the organization, this is a winning solution.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.