IP video surveillance - Expert commentary

Next Generation Video Analytics: Separating Fact From Fiction

Real-time search analytics addresses one of the most important control room tasks - locating a person of interest If you have been to any of the many security industry tradeshows this year you will undoubtedly have seen and heard the phrase ‘next generation video analytics’. Is it just a catchy marketing phrase or is there more substance behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mys...

Will Security Industry Consolidation Stifle Innovation?

The security industry will continue to see consolidation through acquisition in 2017. At the advent of IP camera adoption, we saw a great decline in large vertically integrated companies, which spurred a new era of innovation within smaller IP camera manufacturers, VMS providers and other hardware companies for storage and managed switches.   We are now living in a new era of consolidation that is taking us full-circle back to vertical integration. Ultimately, the industr...

Edge Analytics And Cybersecurity Key Trends In 2016

The past year has seen growth in the deployment and use of edge analytics, plus a significant emphasis placed on robust cybersecurity. The expectation for 2017 is that these two trends will continue to be a driving factor for value-based decision making of large, influential customers. IP camera product lines from reliable and well-regarded brands that include edge analytics and offer a trusted, secure platform will be at an advantage over those that don’t. Looking back at the expectation...

Building Integrator/Provider Partnerships For Enhanced VMS Solutions

Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...

How To Test For Network Security Vulnerability

Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognizing this reality, most organizations test their own networks for security weaknesses, whether to meet compli...

Extenders Convert Media For Longer Video Distance Runs

IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analog systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analog systems required separate pow...

Beyond PoE Standards – Factors That Can Cause Component Failure

When a manufacturer states a specific PoE power for a camera, always count on the maximum class power source Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and Electronics Engineers (IEEE) standards are the last word. However, when it comes to PoE, there is a wide range of both voltages and wattages that can qualify as being within an individual IEEE power class. This applies to both...

How To Disrupt Your Organization And Your Industry

If you want to cultivate new ideas among your employees, it is important to let them know that they are allowed to challenge the status quo The Americans asked for horses – Henry Ford gave them cars. In the beginning of the 20th century, he disrupted the transportation industry. He created a new market outmatching established leading companies, products and alliances. And he got the idea himself. Many of us want to disrupt our industries with new innovations that...

Considerations When Designing An IP Video Security Infrastructure

Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...

Future Of Mobile Security Hardware For Enhanced Situational Decision Making

In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...

Has The Closed Circuit Video Industry Become Overly Technical?

We will examine the question of the increasing technicality of the closed circuit video industry from three perspectives; The Manufacturer, the Specifier, and the Integrator.   History Of Closed Circuit Video Industry  Before we begin examining this subject, let's take a look briefly at the history of the Closed Circuit Video Industry. 1920s: Tubes were invented (Cathode, Image Dissector, Iconoscope) 1940s: CCTV first introduced to monitor rocket launches 1970s: The...

IT & Access Control Collaboration Leads To Functional, Personnel And Financial Benefits

IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...

Healthcare Facilities’ Diverse Security Requirements Provide Opportunities For Systems Integrators

Part 7 of our healthcare series Integrators can sell a breadth of possible equipment into the healthcare market One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound mask...

13 Tips For Security And IT Professionals To Keep IP Video Surveillance Networks Secure

Strong passwords are the most basic security measure, but unfortunately ignored by many users Keeping surveillance networks secure can be a daunting task but there are several methods that can greatly reduce risk, especially when used in conjunction with each other. Below are 13 tips security and IT professionals can follow in order to keep an IP video surveillance network secure. 1. The Stronger The Password The Better Strong passwords are the most basic security measure...

Video Surveillance Advancements Increase Hospital & Healthcare Security

Part 3 of our Security in Healthcare series Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas. Variety Of Video...

Challenges And Opportunities In Analog-To-IP Video System Transition In Healthcare Facilities

 Part 2 of our Security in Healthcare series Users need to be able to upgrade in a way that fits with both their securityneeds and their budgetary limitations The future is digital, and analog systems are a thing of the past – or are they? The fact is, in the healthcare vertical at least, we may still have a way to go before the full potential of IP-based systems is realized. Obstacles include a lack of funding and the challenge of sharing IP bandwidth wi...

Hospital And Healthcare Markets Offer Healthy Opportunities To Security Systems Integrators

 Part 1 of our Security in Healthcare series Hospitals have a continuous need for security, to update their systems,and to make repairs The healthcare vertical provides plenty of opportunities for security integrator companies. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says David Alessandrini, Vice President, Pasek Corp., an integrator. Hospitals have a continuous need for security, to update their...

Hikvision USA Addresses Preconceptions About Chinese Video Surveillance Companies

The days when Chinese video surveillance products were associated with lower quality are mostly gone now. Certainly, it’s easy enough to test the quality and functionality of any Chinese-made product in a shootout against products made anywhere in the world. In that sense, the quality of Chinese goods is no longer an obstacle for security customers: Their ability to judge quality for themselves eliminates any dependence on previously held opinions. But what about other preconceived ideas...

Does Enhanced H.264 Compression Remain The Best Encoding For Video Surveillance?

The integration of H.265 technology may be hindered by the availability of optimized H.264 best encoding for surveillance systems Video compression technology has been a crucial element in surveillance system design since the advent of Internet Protocol (IP) in the 1990s. Since that time, standards for video encoding have been explored in various capacities. Currently, the industry is all abuzz around H.265 High Efficiency Video Coding – the next iteration beyond H.264,...

HD CCTV: A New Perspective On The Future Of Analog Surveillance

With innovation continuing in HD CCTV, analog video surveillancemay be around for some time What’s your stance on the analog-to-IP video migration? When will it happen? Will analog go away entirely? Talk to any security company and they’ll admit they love the simplicity of the installation and setup of analog cameras. They know how to deploy it quickly, saving labor costs and also, can use the familiar and ever-present coaxial cabling network. That’s the here...

SourceSecurity.com Technology Report - Meeting The Cybersecurity Challenge Of IP Video Systems

What's the Technology Report about? This SourceSecurity.com Technology Report will look at how cybersecurity risks of video surveillance systems can be minimized, and highlight the role manufacturers, installers/integrators and end users should play to make IP video systems as safe from cyber-attack as humanly possible. Manufacturers, in particular, are stepping up to drive the industry’s efforts, and Hikvision USA is a leader in educating the market to address...

Surveillance Industry’s Higher-Megapixel Migration Impacts Processing Power, Bandwidth Consumption And Storage

From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilization The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...

ISONAS Global VP Of Sales Robert Lydic Highlights Importance Of IP Open Platforms For Access Control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends In Access Control Technology SourceSec...

5 Things To Consider Before Moving Your Surveillance To Cloud-Based Video Storage

Determining how the cloud can best support your business depends on five factors: Bandwidth, storage, cost, security and accessibility Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the fact. Today, many are taking advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance...

Security And IT Convergence Accelerates Technology Advancement And Innovation

We in the industry have talked about IT’s growing influence in security technology decision-making for a number of years. This year, we have seen the trend accelerate rapidly. Significant changes are occurring in data center infrastructure technology, creating major disruption to the large enterprise server and storage providers. This is fundamentally changing the way the security industry thinks about IT. 2015 Trend – Emergence Of Hyper-converged Infrastructure (HCI) One of the bi...

SourceSecurity.com’s 10 Most Click-Worthy Articles Of 2015

Many of the most well-trafficked articles posted at SourceSecurity.com in 2015 were those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2015 that generated the most page views. They are listed in order here with the author’s...

Security Industry’s Top 10 Mergers & Acquisitions Of 2015

For the second year in a row, Canon made the biggest M&A move in the security marketplace in 2015. How could Canon top the industry shockwaves it created in 2014 when the Japanese giant acquired VMS company Milestone Systems? That’s easy: They bought Axis Communications for $2.8 billion in 2015.   Although the Canon-Axis deal grabbed the most headlines and was easily the most shocking M&A announcement of 2015, it was certainly not the only big news on the mergers...

Ethernet Switches – Powering IP Surveillance Systems The Smarter And More Economical Way

Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...

IP Video Surveillance Market – Revealing The ‘industry Standards’ Myth

The IP surveillance market is taking anunusually long time to reach maturity, partiallydue to lack of industry standards  Video surveillance has been a growth industry ever since the release of the first IP security camera in the mid-1990s. Generally, high-growth industries are immature, meaning they have not yet reached a state of equilibrium. This is particularly true in the IP video surveillance market where many new companies enter the market takin...

Power Over Ethernet - First Choice Of Security Installers For Powering Access Control And Security Devices

The security industry’s continued migration to networked IP-based systems ensures that PoE will be integral in their design and installation Power over Ethernet (PoE) has without question become the de facto choice of security installers for delivering power to security and access control devices. This should come as no surprise given PoE’s ability to reduce labor and installation costs by delivering power and data over a single cable, thereby increasing overall to...