Network cameras - Expert commentary

Enhance Traditional Security Systems Within Your Smart Home

Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have at...

How Artificial Intelligence (AI) Is Changing Video Surveillance Today

There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The Need For AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of...

Steps To Develop An Integrated Retail Security Strategy

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that ca...

HD Over Coax Provides Cost-effective Video Surveillance Upgrade

According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analog, many end users looking for high definition (HD) video qualit...

Security Systems Integrators Will Need Increased IT Expertise In 2018

The security market is very active right now. Business is strong, according to most of the people that I talk to in the industry. In 2017, we at The Protection Bureau had one of our best years ever revenue-wise. Because of a strong economy, businesses are spending money on security. 2017 Growing Trends The trends that happened in 2017 vary. One trend that is growing is the national account concept. This is because clients are deploying more and more enterprise-level systems and taking advanta...

Factors To Consider When Choosing A Video Storage System

What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department. In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system...

Avoid Damaging Network Breaches With Reevaluated Cybersecurity

In today’s connected world, network intrusions and breaches have become a way of life, as hackers and cybercriminals work constantly to discover and exploit vulnerabilities. Because businesses of all sizes rely on their IT infrastructure to a growing degree, technology providers are working just as hard to stay ahead of would-be attackers. However, it’s difficult if not impossible to eliminate every potential threat. Therefore, it is highly likely that most organizations will suffer...

Minimizing Video Frame Drops In Video Surveillance Systems

Gaps in video from dropped video frames are a common problem. A web search on the phrase “dropped video frames” turns up links oriented towards gamers, YouTube videographers and even the world of video surveillance, discussing why frame drops happen and providing advice for coping with them. On Windows computers, video frame drops are a fact of life. Much of the advice can help reduce the number of frame drops, though never completely eliminate them. If you are an amateur filmmaker,...

Video Surveillance Storage: What Decision Makers And Integrators Need To Know

High definition has become the camera technology of choice for new installations Video storage is the foundation for new video surveillance infrastructures. Depending on your platform, storage can enhance your surveillance system’s capabilities, or it can limit them. But one thing is certain: your storage decision can no longer be an afterthought. Tremendous Growth In Data Storage Digital technology is transforming the surveillance industry. In fact, it’s estimat...

Cybersecurity Increasingly Demanded Our Attention In 2016

Drastic increase in cybersecurity discussions is one thing that many of us in the security industry didn’t predict for 2016. Cybersecurity has obviously always been an important issue in general, but the discussion has gained a lot of momentum in the past year.   As I said, this wasn’t predicted by most of us in the industry. The intensity of the focus on and discussion around cybersecurity in 2016 was a response to some of the high-profile denial of service (DoS)...

Building Integrator/Provider Partnerships For Enhanced VMS Solutions

Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...

How To Test For Network Security Vulnerability

Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognizing this reality, most organizations test their own networks for security weaknesses, whether to meet compli...

Designing An IP/PoE Network Infrastructure: Factors To Consider

If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...

Extenders Convert Media For Longer Video Distance Runs

IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analog systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analog systems required separate pow...

Beyond PoE Standards – Factors That Can Cause Component Failure

When a manufacturer states a specific PoE power for a camera, always count on the maximum class power source Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and Electronics Engineers (IEEE) standards are the last word. However, when it comes to PoE, there is a wide range of both voltages and wattages that can qualify as being within an individual IEEE power class. This applies to both...

Choosing The Right Cable For Networking Infrastructure

The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types Of Cables In general, there are four major types of cable. First is coaxial cab...

Clarifying Evidentiary Procedures For Digital Video Admissibility

48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...

Security Companies Embrace Corporate Social Responsibility To Improve Environmental & Social Impact

CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...

Considerations When Designing An IP Video Security Infrastructure

Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...

NVR Vs. VMS: Support, Scalability And Usability Of Video Storage Systems

One obvious benefit of an NVR appliance compared to software VMS system is ease of configuration and installation A quality networked video recorder (NVR) and software-based video management system (VMS) both do an excellent job of safeguarding valuable video data. But there are a number of pros and cons for both, along with specific applications that will do better with one option over the other. These can easily be broken down into five topics: ease of setup/install, suppor...

IT & Access Control Collaboration Leads To Functional, Personnel And Financial Benefits

IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...

HD CCTV: A New Perspective On The Future Of Analog Surveillance

With innovation continuing in HD CCTV, analog video surveillancemay be around for some time What’s your stance on the analog-to-IP video migration? When will it happen? Will analog go away entirely? Talk to any security company and they’ll admit they love the simplicity of the installation and setup of analog cameras. They know how to deploy it quickly, saving labor costs and also, can use the familiar and ever-present coaxial cabling network. That’s the here...

Surveillance Industry’s Higher-Megapixel Migration Impacts Processing Power, Bandwidth Consumption And Storage

From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilization The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...

IP Network-Centric Surveillance – What Systems Integrators Should Consider When Selecting Cameras For Users

As technology advances and more surveillance features become available, it can be difficult for security integrators to know which system will fit their customer’s needs It’s no secret that Internet Protocol (IP) cameras are on a steady march to replace analog video. Network-centric surveillance cameras bring a host of value to the protected premises, above and beyond traditional physical security. Now, cameras are increasingly used for safety, such as in liability...

Wireless Devices Vulnerable To Security Network Hacking – Are Closed Network Security Systems The Solution?

Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things Securi...

Networking Basics For Security Professionals: Do You Believe In Specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Networking Basics For Security Professionals: What Network Switches Don’t Do

Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favorites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by in...

Networking Basics For Security Professionals: PoE Standards Are Not So Standard

PoE power is a complex issue in itself made even more complex by the lack of standardisation Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we depend on standards such as 802.3af for devices requiring up to 15.4 watts and 802.3at for devices powered up to 30 watts. We depend on the devices...

Onboard Surveillance Offers High-quality Video For Transportation Vertical

In-vehicle technology allows security officials to view live footage from the bus’ cameras during an emergency One of the biggest security opportunities in transportation is onboard surveillance for buses and trains. While most transit organizations have invested heavily in video security for facilities such as terminals and stations, far fewer have taken the next step and installed IP cameras on board vehicles, says John Recesso, strategic business development manager,...

Cannabis And Security: Technology Solutions Provide Protection For Emerging Legalized Marijuana Industry

The growing market for legal marijuana (now available in some form in 24 states) has also generated a demand for security products and service to protect the industry from illegal activities. “For the most part, companies are looking for what we call the traditional surveillance systems whereby you have visible deterrence,” says Monty Henry, president of DPL-Surveillance-Equipment.com LLC in Ventura, Calif. Many companies are seeking more sophisticated systems t...