Keeping costs down when installing IP videoe

At What Cost?

Keeping overall costs down and driving value up when installing video analytics

It is widely accepted that video analytics provide value to the end user, especially in security applications such as perimeter protection and the identification of vehicles versus humans in unauthorized areas. But at what cost? The real answer lies beyond dollars and cents and is found in the realm of costs in terms of manpower, engineering, training, deployment design and implementation method.

Today, many analytics vendors market and sell proprietary solutions that consist of software that must be hosted on a server or on servers the customer must supply; edge devices of the provider's own manufacturer, like IP cameras and encoders; or on a combination of the two.

The commonality is the closed-end approach to providing intelligent functionality— basically it's an additional system on top of systems you already have. And an additional system means more engineering, another GUI to learn, additional time to implementation and, consequently, higher costs.

This perceived value of analytics causes potential buyers to remove them from their purchases because they would rather not expend all that effort.

Real Savings

We can easily conclude that any customer solution will ultimately cost less if it does not require as much manpower, engineering or training in order for users to become productive. But let's talk about implementation method for a moment, because the only true path to real savings in the analytics world is to not buy an analytics system but rather a system with analytics inside.

What does this mean?

Today, intelligent functionality doesn't have to come from a proprietary stand-alone system. Rather, it can be a small but effectively applied ingredient to the overall solution. All within the same video surveillance system, analytics can reside at the edge where network bandwidth may be a concern. They can exist in back-end servers or storage devices so the analytics can effectively be cross-assigned to different video channels based on alert level. And intelligence can even exist in the middle of the network, in a router. To increase quality of service on the network, intelligent routing of alerts and analytics functionality could be needed based on time of day or a requirement to push alerts to additional responders.

From an increasing number of software providers, the analytics and/or alerts are accessed using the GUI of the video management platform or physical security information management tool. With this significantly shorter learning curve, implementation is completed far sooner and users move quickly to the business of solving problems instead of worrying about how long it will take to learn a new system. Already having chosen a management platform, video analytics functions possess equal standing with many of the other management tasks your platform provides.

Back to Basics

What are the building blocks of these kinds of open, analytics-enabled solutions?

The analytics must be flexible. That is, they must be available to the integrator to spec into the solution in a wide variety of form factors. To get the most efficiency from the ingredient approach, the solution provider should be able to acquire analytics not only in cameras, encoders and DVRs/NVRs, but also in servers, enterprise storage devices, routers, other network devices, PCs, snap-in daughter cards, USB dongles and discrete intelligent appliances.

With these device choices, along with a requirement that the analytics be available in capability packages designed specifically for the customer's vertical market needs, the user achieves high value while the integrator can price accordingly, since he or she can sell the customer only the functionality and performance they initially need. Additional analytics capabilities can be upgraded in the field via new license keys, further enhancing the value of the solution.

Practicality is key, or the customer won't see any return on investment. There are still too many analytics vendors out there who tout features and functions that would be truly innovative if they actually worked reliably outside of a controlled lab environment. But practicality and cost dictate we face the facts of realistic, not lowered, expectations of analytics. What would be preferable: features that only work in PowerPoint with an unfamiliar GUI, or the reliable and straightforward capabilities we're already accustomed to working with, presented within the management platform you're already using?

Bring these building blocks together. The interoperability of disparate parts, through the execution of an industry standard for analytics configuration, rule definition and alerting, will allow users to gain real value from their solution sooner and at a lower cost. The Physical Security Interoperability Alliance has already taken the first step toward realizing a world of pre-integrated solution components by forming a specific committee to work on a video analytics standard. The net result would be much greater adoption of analytics, which would, in turn, drive down costs.

Users must keep demanding practical, easy-to-implement analytics-enabled solutions from a trusted installer or integrator. Ask them to take a look at what's available today—the building blocks are beginning to show up in good numbers from manufacturers and software providers. These manufacturers are trusted names in the industry, and they understand full well the importance of delivering open-architected solutions. Integrators should push OEM suppliers and distributors to offer a greater selection of intelligent devices, with the feature packages and licensing flexibility they know they can sell.

Video analytics as a high-value ingredient in the video solution renders the popular edge versus central debate completely moot. To achieve the lowest cost of ownership over time, analytics should reside wherever they represent the greatest value to the end user.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3