SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access And Monitoring For Data Centers

    KentixONE – IoT Access And Monitoring For Data Centers

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Voyant Helium: Revolutionizing Solid-State LiDAR
    • Zimperium Report On Mobile PDF Phishing Threats
    • Matrix Comsec Earns CII Award For STEM Excellence 2025
    • VITEC & Actelis Advance IPTV For RF Networks
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which Vertical Markets Have The Greatest Growth Potential For Security?
    • What’s Behind (Perimeter) Door #1?
    • Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft
    • Why Open Matters In The Age Of AI
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    eCLIQ Enhances Security At Marin Hospital Of Hendaye

    eCLIQ Enhances Security At Marin Hospital Of Hendaye

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Salient Systems Highlights The Importance Of Upgrading Outdated Security Systems To Counter Cyber Attacks

19 May 2020

Salient Systems Highlights The Importance Of Upgrading Outdated Security Systems To Counter Cyber Attacks
Contact company
Contact Salient Systems
icon Add as a preferred source Download PDF version
Related Links
  • The Increased Role Of Video Surveillance Technology In Our Changing Environment
  • Salient Systems Highlights The Security Trends To Watch Out For In Video Surveillance

Many organizations maintain regular technology refresh schedules where old equipment is replaced on a set schedule, usually every three to five years. Alternatively, organizations may choose to keep technology through its full, usable life.

In such cases, the full, usable life may extend past the warranty period for hardware products or past the end of support period for software. Having a complete understanding of the complications of using older equipment can help organizations proceed with the correct equipment refresh policy for their needs.

Cyber threats and liability risks

One of the biggest risks to larger organizations is the brand impact and liability cost of a cyber-attack or theft of customer data. If software and equipment is kept past its end of support or end of life date, there generally will be no further firmware or software updates to the product.

If there is a security flaw later discovered, and the equipment is in service, the options to protect against an exploit of the security flaw will be limited and inadvisable.

Optimal utilization of equipment, software

Utilising equipment and software that is actively supported and maintained by the product vendor is a much safer policy

Utilizing equipment and software that is actively supported and maintained by the product vendor is a much safer policy. Reputable vendors with a strong vulnerability response policy who are actively supporting in-life products make it a priority to release a fix to any significant security flaw that is discovered.

This means firmware or software patches should be provided shortly thereafter, keeping the equipment safe from being exploited, using a known security vulnerability.

Replacing out of warranty hardware

A purpose-built computer, such as a Network Video Recorder, may appear to continue to function well, even beyond its warranty period. With a personal or business-use computer, the purpose of the system is constantly changing to fit the user’s evolving needs.

New software is installed, generally with higher system requirements than old software, more data is saved, and less free space is available. These effects, over time, lead to the appearance that the system is slow or out of date, prompting an upgrade naturally.

However, if the NVR is performing the same tasks as when it was installed (recording the same cameras, streaming to the same displays etc.), it will continue to function with the same performance and efficiency as when it was first deployed, begging the question, “Why should we upgrade when the existing system still works fine?” One answer is the hardware may no longer be under warranty.

High equipment failure rates

If a vendor will not sell a warranty for longer than the customer’s plan to use the equipment, that’s a good indication there are problems with keeping equipment beyond that time period. Issues may include higher equipment failure rates or the lack of compatible replacement parts that may be available for equipment that old.

If equipment is out of warranty and a hardware component has a failure, finding a replacement part may be expensive, time consuming, or impossible. In some cases, this could necessitate the purchase of a whole new system, which may be incompatible with other existing systems in use in the organization.

Technical Support

Sometimes technology deployments run into problems that require troubleshooting

What was once a homogenous technology deployment may no longer consist of equipment that integrates, or requires separate client applications to control, or consists of products from different vendors leading to support complications.

Sometimes technology deployments run into problems that require troubleshooting. It helps to have access to an expert who can assist. Commonly, vendors will not provide support on products that are end of life.

Troubleshooting

The support team’s training may not cover old and end of life products. The company may not even have an active deployment of a very old and end of life product in place to use for troubleshooting.

If customers do have a support need on an end of life product, a very support-minded vendor may still try to help. For the reasons cited above, the troubleshooting process may be unsuccessful and will certainly take much longer than if a current and actively supported product were being used.

Access to the latest technologies

The consequence of using out of date equipment may include not having access to support, or at least longer troubleshooting times. In the most severe cases, if equipment can’t be brought back to a usable state, it could force the organization to replace failed equipment that was not planned or budgeted for.

Using older equipment also means losing out on the latest technologies. For years, gas station surveillance was notorious for supplying grainy, low-resolution images, making it both difficult to discern what was happening and impossible to identify the parties involved. If the security system provides a similar level of quality, is it fulfilling the organization’s needs?

Megapixel cameras and VMS technologies

Megapixel cameras using progressive scan imagers provide crisp, high-resolution video

Megapixel cameras using progressive scan imagers provide crisp, high-resolution video. Wide Dynamic Range cameras provide more clear images even with a very bright background.

New VMS technologies provide better investigation tools, allowing users to quickly hone in on the evidence needed. Furthermore, video analytics can derive additional value for the business from the security cameras.

Making the case to upgrade

Although there are greater capital cost outlays required for an organization regularly upgrading security equipment, the benefits of keeping supported technology that is in warranty generally outweigh the costs.

Benefiting from the latest technologies, having technical support and warranty coverage, as well as reducing cyber-attack risks make a strong case to plan for regular upgrades.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Security cameras
  • Network monitoring
  • Video analytics
  • Network cameras
  • IP Surveillance
  • IP security solutions
  • Cyber security
  • Video Management System
  • Data Security
  • Network Video Recorders
  • Cloud security
  • Video surveillance
  • Related links
  • Salient Systems Video Surveillance software
  • Salient Systems Network Video Recorders (NVRs)
  • Megapixel IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Network IP cameras
  • Real Time / Timelapse / Event Network Video Recorders (NVRs)
  • IP Surveillance Software Video Surveillance software
  • Management Software Video Surveillance software
  • Related categories
  • Video Surveillance software
  • IP cameras
  • Network Video Recorders (NVRs)
  • IP Dome cameras
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Related articles
AI Transformation In Video Surveillance By Hanwha Vision

AI Transformation In Video Surveillance By Hanwha Vision

Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft

Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft

HikCentral Lite V1.1.2: Streamlined SMB Security

HikCentral Lite V1.1.2: Streamlined SMB Security

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec