Ask the Expert

Another year is drawing to a close, and 2007 has remained just as consistent as the past few years in the security industry, with new players, new products and burgeoning technologies arriving at an incredible speed. This industry—as is the case with many others—has and will continue to be radically altered by computerbased technology.

ISSUE: What will be the hottest topic in security in the next year?

SOLUTION: The word for 2008 will be video. Video surveillance is hardly new to our industry, but the desire of large and small businesses to have live, recorded images of their operations is really intensifying. The demand for camera systems extends to schools, government facilities and even upscale homes.

Part of the demand is fueled by highly publicized events in the United Kingdom, where camera systems have helped prevent terrorist attacks and led to the quick arrest of suspects following successful bombings. Local newspapers and news shows also routinely report on surveillance systems, leading to the arrest of shoplifters, vandals, burglars and a host of other criminals.

The systems installed today are often very different than what was installed as recently as five to 10 years ago. That can be contributed to the computer. IP cameras that run over a network are moving closer to becoming the norm, rather than the high-end exception. And that means network servers, capable of storing massive amounts of video, will become a leading choice for recording images.

The methods of getting the images from the camera to the recorder also are changing. Wireless cameras allow systems to be set up where terrain, distance or other issues make standard cabling impossible. Point-to-point and point-to-multipoint networks are relatively inexpensive to set up and work well.

ISSUE: What other innovations do you foresee being popular in 2008?

SOLUTION:Video transmission can be a challenge with cities looking to monitor entire neighborhoods, seaports managing their perimeter security or universities looking to keep watch over a campus of 1,000 acres or more. That is where mesh networks can come into play.

Mesh networking is a relatively new way to transmit video data between nodes, which may number in the hundreds for a large network. The video reaches its destination by moving from node to node. If one node goes bad, the video takes a new path, keeping the network operating.

The use of video analytics also is growing, and that should continue next year. It seems as though every month there is a new provider entering the market with a new way of making the technology work better. I expect we will see some of the best make their way to the top and some others drop by the wayside. And as the demand for the technology grows, the price—which has been high—is beginning to fall.

READER QUESTION: We just installed a small access and video system (four doors and eight cameras) in our office and adjacent warehouse. Our integrator installed the equipment as promised—on time and within budget. But now we are having some problems operating our system. The integrator said he will send a trainer to our site for $200 an hour. We assumed training would be part of the job. Were we wrong to think that?

SOLUTION: One of the areas where integrators and customers sometime fail to plan for is training. You can install a state-of-the-art system, but if you don’t know how to use it, the value of the system drops precipitously.

When it comes to training, some integrators will have the technician who did the installation “go over the system” with the end user for little to no cost. However, often the “tech instructions” don’t take into account the day-to-day operation of the system and/or speak the language of the end user.

A certified trainer that provides formal system training is needed. The rate of $200 an hour is reasonable for quality training. Attorneys are paid $300 an hour or more because of their training and knowledge. The integrator has invested significant time and money in his trainers and therefore should be entitled to a reasonable billing rate.

Prior to formalizing a final agreement, it is important to make sure all aspects of the system are included. Training is a vital part of any new system, so make sure it is included in the final price right at the beginning. Get the training. The investment is needed to ensure you get the most out of your systems.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3