Your Best Project: Ten Security Design Tools You Must Try

SPONSORED

Your Best Project: Ten Security Design Tools You Must Try

Designing for the Customer; Creating with the Customer

“You can design and create, and build the most wonderful place in the world. But it takes people to make the dream a reality.”
-Walt Disney

Ask a single security designer for advice, and it's difficult to know whether we should solicit another opinion. Ask ten, though, and you'll see a clearer picture begin to coalesce.

Some may call that polling, learning diversity, or even the modern term crowdsourcing, but in any case it's one of the best ways to gather insight. No single perspective or process applied to a security use case can result in a flawless design.

Continuous Improvement in Design

The Japanese noun and verb “Kaizen,” includes some significant approaches to how design tools are used.

改 + 善 = “to change, alter or transform” + “good” = Kaizen:
An action taken to improve (n); a spontaneous change for the better (n); for something to improve on its own (v)

Place video surveillance cameras, intrusion sensors and a communications network around a physical or virtual protection path around the circumference of your soft target, and you have taken a first, important step towards perimeter defense. To verify the design integrity, the process should include improvement, formerly known as “value engineering,” today as value redesign (see figure).

Using Tools to Improve Your Design

Figure 1 Using Tools to Improve your Design

Get ready for Video Surveillance: AXIS Design Tool

One useful tool, the AXIS Design Tool estimates bandwidth and storage needs for a single or all the cameras in the surveillance project. For each camera, you can pick a scenario, and select viewing, recording and compression options to get bandwidth and storage estimates that match the surveillance situation. For example, our outdoor entry camera near the reception area, when viewing and recording at 18 frames per second (FPS), with event recording 20% of the time actually yields the same bandwidth and storage by lowering the frame rate to 10 FPS and increasing the event recoding estimation percentage to 50% (see figures).

Design Tool Figures

Figure 2 Design Tool Figures

Network design is challenging, requiring designers to balance user performance expectations with network-resource costs, capacities, capabilities, and use scenarios. IT Managers want to keep resource utilization high and costs low. The resulting design might produce unacceptable service levels to the Security Manager when congested links and undersized routers cause too much delay or dropped packets. The best design may be a compromise that will efficiently use your network resources and effectively serve your users. Solution, accessory, device and network design tools can closely simulate the actual field practice.

With network-based security systems using a mix of applications, protocols, device technologies, traffic flows, and routing algorithms, there may hundreds of feasible configurations, each with different performance attributes and costs.

Challenge: do you have to sacrifice throughput and performance for high image quality?

In a word, no! Significantly more efficient implementation of AVC/h.264 video encoding, and purpose-built for surveillance applications, Zipstream analyzes and optimizes the video stream in real time to save bandwidth and storage while maintaining image quality.

A video clip contains 25 or more frames per second. Instead of sending the entire frame every time, a video codec can save a lot of data by only sending the differences between frames. The digital multimedia content (video, audio, metadata) carrying capacity of a network connection is commonly known as bitrate or bandwidth and is measured in megabits per second. A 4G mobile connection might be capable of carrying multiple megabits per second; a home broadband connection may support ten times that amount. To encode and stream video efficiently, the bitrate or bandwidth capacity of the network connection must be greater than the bitrate of the streaming media file.

Using networked video with Variable Bit Rate (VBR) allows the quality to adapt to scene content in real-time. Using Constant Bit Rate (CBR) as a storage reduction strategy is not recommended, since cameras delivering CBR video may have to discard important forensic details in critical situations due to the bit rate limit. Zipstream rendering preserves moving scene elements while static areas are rendered at a higher compression. Should movement enter the static areas, the scene rendering is adapted quickly to preserve details.

Will proposed changes in the network such as additional network cameras handle the anticipated traffic demand? Does the design require wireless links? These tools are not only suitable for presentations to customers, they can provide fast answers to “what if” questions?

Tools analyze (visually, mathematically, or by simulation) what is happening in the security network and simulate future behavior.

Some of these tools, like AXIS Site Designer and AXIS Camera Families can display results graphically, use during the course of the security solution simulation to highlight vulnerabilities, potential errors, missed surveillance coverage, imaging issues, network bottlenecks and traffic flows. In addition, the data from these tools may be used to provide comprehensive reports to Security and IT Management and summarize network congestion, load potential failure scenarios and network response times.

Who uses security network design tools?

The ideal network design tool can mean different things to different people. But whether you’re a security or network designer, security or IT manager or engineer, sales or marketing manager, there is a useful tool complete with intuitive graphical interfaces that resemble computer aided design tools.

As a designer, you not only specify and build new solutions and networks, but upgrade existing systems. Designs need to meet performance requirements without overbuilding. The ability to identify vulnerabilities, potential network bottlenecks and overloads are critical considerations. Designers need an extensive library of security technologies, devices, architectures, and protocols to build or upgrade the security solution and network and tools to accurately
predict performance.

Match the tool to you

Axis Tool Selection

Figure 3 Axis Tool Selection

Consider which features best support you, based on the type of user you are.

TOOL

Systems Integrator

Security/IT Manager

Security/IT Designer

AXIS Product Selector

X

X

X

AXIS Guide

X

X

X

AXIS Accessories Selector

X



AXIS Lens Calculator

X

X

X

AXIS Site Designer

X

X

X

AXIS Design Tool

X

X

X

AXIS Camera Extension for SketchUp®



X

AXIS Camera Families for Autodesk® Revit®



X

AXIS Coverage Shapes for Microsoft® Visio®

X

X


AXIS Camera Applications Platform

X



AXIS Site Designer

With AXIS Site Designer, you’ll be able to pick just the right cameras for any surveillance scenario. Adding accessories and picking a recording solution is quick and easy. When done designing your project, AXIS Site Designer prints a comprehensive bill of materials that includes​ everything you need to complete your installation. Learn more about the features of AXIS Site Designer below.

AXIS Site Designer is a web application that is easily accessible on axis.com form your tablet or PC with no additional software to download or install. Once you have started the application, it can be used even when off-line.

With AXIS Site Designer, you can keep track of multiple projects. Project templates provide a quick way to get new projects started. If you log in to axis.com using your MyAxis or partner login, your work will be saved on Axis’ servers, and you can access your projects from any browser.

The all new camera selector finds the right camera for your scenario. Set up your scenario and get a shortlist of cameras that fulfill your needs.​

AXIS Site Designer

Figure 4.1 AXIS Site Designer

​AXIS Site Designer knows which accessories work with your selected camera. This takes the effort out of finding the right mounts and other accessories for your needs.

AXIS Site Designer recommends the storage solutions that fit your project and video recording requirements. For maximum convenience, pick one of the AXIS Camera Station S10 Recorder Series models.

AXIS Site Designer

Figure 4.2 AXIS Site Designer

You can add any Axis product to you project, and enter your own selection of networking and other components to create a complete bill of materials that includes everything needed to complete the project.

Bill of Materials

Figure 5 Bill of Materials

Tools for Collaborative Security Design

Whether you're designing a new product, improving your site, or just seeing if more people like low light cameras than 360∞ cameras , your best bet is to collaborate. To do so, you'll need a framework to generate a unique and innovative design (see figure). As we have seen, many of these tools come from AXIS, are used by third parties, allow accurate technology matching and generation of bills of materials.

The Design Tools Framework

Figure 6 The Design Tools Framework

For Designers and First Responders in Law Enforcement, Fire, EMS, HAZMAT, Search and Rescue, Explosives and Communications disciplines, there are also tools within agencies to support these specialties. One such tool is the Digital Video Handbook by the US Dept Homeland Security Science and Technology Directorate.

A list of topics covered by the Digital Video Handbook are below:

Digital Video Quality Handbook

Figure 7 Digital Video Quality Handbook (Place to the right of the bullet points)

- Digital multimedia content analysis
- Entry screening queue line video analytic system
- Trends
- Technology expansion in public safety: IoT, sensors and analytics
- Case study: HD and network video: moving public safety and schools forward in security
- Navigating the security and public safety industry: from associations to standards
- UltraHD and the video surveillance industry
- UltraHD resolutions
- Next generation video codecs in action
- Tactical video and situation awareness advantages
- First responders and tactical video
- Crime fighting tactical video intelligence
- Encoding for the surveillance industry
- Bit rate reduction
- Comparison of HEVC bit rate savings over AVC
- Next gen codec design considerations
- IoT, sensors and analytics
- Cyber security of IoT sensors
- IoT and cyber security FAQ
- ASIS international security applied sciences facility model
- Forensic video program readiness
- Digital multimedia content — more than just video data
- Forensic review
- Video content analysis
- Digital multimedia evidence
- Checklist: preparing for digital forensics
- Checklist: implementing a forensic video readiness program
- Top technology considerations in forensic video
- Criminal pattern identification and security/video data
- Linking DMC to policy

It is a great challenge to tell a customer what they want. However, you may be able to approximate and even predict what they want before they realize they want it. When you think about it, IT and Physical Security Managers often have to predict their users’ needs even before they know what they need - they are in a reactive mode. Tools like the AXIS Design Tool and the Digital Video Handbook help our first responders get ahead of the threat.

 

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3