SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Salient Systems Highlights The Importance Of Upgrading Outdated Security Systems To Counter Cyber Attacks

19 May 2020

Salient Systems Highlights The Importance Of Upgrading Outdated Security Systems To Counter Cyber Attacks
Contact company
Contact Salient Systems
icon Add as a preferred source Download PDF version
Related Links
  • Managing Security During Unprecedented Times of Home Working
  • Salient Systems Highlights The Security Trends To Watch Out For In Video Surveillance

Many organizations maintain regular technology refresh schedules where old equipment is replaced on a set schedule, usually every three to five years. Alternatively, organizations may choose to keep technology through its full, usable life.

In such cases, the full, usable life may extend past the warranty period for hardware products or past the end of support period for software. Having a complete understanding of the complications of using older equipment can help organizations proceed with the correct equipment refresh policy for their needs.

Cyber threats and liability risks

One of the biggest risks to larger organizations is the brand impact and liability cost of a cyber-attack or theft of customer data. If software and equipment is kept past its end of support or end of life date, there generally will be no further firmware or software updates to the product.

If there is a security flaw later discovered, and the equipment is in service, the options to protect against an exploit of the security flaw will be limited and inadvisable.

Optimal utilization of equipment, software

Utilising equipment and software that is actively supported and maintained by the product vendor is a much safer policy

Utilizing equipment and software that is actively supported and maintained by the product vendor is a much safer policy. Reputable vendors with a strong vulnerability response policy who are actively supporting in-life products make it a priority to release a fix to any significant security flaw that is discovered.

This means firmware or software patches should be provided shortly thereafter, keeping the equipment safe from being exploited, using a known security vulnerability.

Replacing out of warranty hardware

A purpose-built computer, such as a Network Video Recorder, may appear to continue to function well, even beyond its warranty period. With a personal or business-use computer, the purpose of the system is constantly changing to fit the user’s evolving needs.

New software is installed, generally with higher system requirements than old software, more data is saved, and less free space is available. These effects, over time, lead to the appearance that the system is slow or out of date, prompting an upgrade naturally.

However, if the NVR is performing the same tasks as when it was installed (recording the same cameras, streaming to the same displays etc.), it will continue to function with the same performance and efficiency as when it was first deployed, begging the question, “Why should we upgrade when the existing system still works fine?” One answer is the hardware may no longer be under warranty.

High equipment failure rates

If a vendor will not sell a warranty for longer than the customer’s plan to use the equipment, that’s a good indication there are problems with keeping equipment beyond that time period. Issues may include higher equipment failure rates or the lack of compatible replacement parts that may be available for equipment that old.

If equipment is out of warranty and a hardware component has a failure, finding a replacement part may be expensive, time consuming, or impossible. In some cases, this could necessitate the purchase of a whole new system, which may be incompatible with other existing systems in use in the organization.

Technical Support

Sometimes technology deployments run into problems that require troubleshooting

What was once a homogenous technology deployment may no longer consist of equipment that integrates, or requires separate client applications to control, or consists of products from different vendors leading to support complications.

Sometimes technology deployments run into problems that require troubleshooting. It helps to have access to an expert who can assist. Commonly, vendors will not provide support on products that are end of life.

Troubleshooting

The support team’s training may not cover old and end of life products. The company may not even have an active deployment of a very old and end of life product in place to use for troubleshooting.

If customers do have a support need on an end of life product, a very support-minded vendor may still try to help. For the reasons cited above, the troubleshooting process may be unsuccessful and will certainly take much longer than if a current and actively supported product were being used.

Access to the latest technologies

The consequence of using out of date equipment may include not having access to support, or at least longer troubleshooting times. In the most severe cases, if equipment can’t be brought back to a usable state, it could force the organization to replace failed equipment that was not planned or budgeted for.

Using older equipment also means losing out on the latest technologies. For years, gas station surveillance was notorious for supplying grainy, low-resolution images, making it both difficult to discern what was happening and impossible to identify the parties involved. If the security system provides a similar level of quality, is it fulfilling the organization’s needs?

Megapixel cameras and VMS technologies

Megapixel cameras using progressive scan imagers provide crisp, high-resolution video

Megapixel cameras using progressive scan imagers provide crisp, high-resolution video. Wide Dynamic Range cameras provide more clear images even with a very bright background.

New VMS technologies provide better investigation tools, allowing users to quickly hone in on the evidence needed. Furthermore, video analytics can derive additional value for the business from the security cameras.

Making the case to upgrade

Although there are greater capital cost outlays required for an organization regularly upgrading security equipment, the benefits of keeping supported technology that is in warranty generally outweigh the costs.

Benefiting from the latest technologies, having technical support and warranty coverage, as well as reducing cyber-attack risks make a strong case to plan for regular upgrades.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Security cameras
  • Network monitoring
  • Video analytics
  • Network cameras
  • IP Surveillance
  • IP security solutions
  • Cyber security
  • Video Management System
  • Data Security
  • Network Video Recorders
  • Cloud security
  • Video surveillance
  • Related links
  • Salient Systems Video Surveillance software
  • Salient Systems Network Video Recorders (NVRs)
  • Megapixel IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Network IP cameras
  • Real Time / Timelapse / Event Network Video Recorders (NVRs)
  • IP Surveillance Software Video Surveillance software
  • Management Software Video Surveillance software
  • Related categories
  • Video Surveillance software
  • IP cameras
  • IP Dome cameras
  • Network Video Recorders (NVRs)
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec