Great Systems Start with Great Planning

Great Systems Start with Great Planning

To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages

The sophistication of today’s video surveillance and security systems technology has delivered significant gains to end users tasked with ensuring the safety and security of people, property and assets. A prime example of this evolution is with management and control platforms with open architecture enabling numerous integrations that result in improved situational awareness and operational ease.

Simultaneously, the complexity and ongoing evolution of integrated systems has also created new challenges for system designers. To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages. Clearly identifying surveillance and security objectives, priorities, budget parameters, potential installation/construction issues and future expansion plans are critical considerations. By taking the time at the start of the project to address these questions clearly – and gain agreement – users and/or integrators will be better ensured of developing and implementing a more innovative and comprehensive solution.

The Fundamentals

What are the operational goals of the system?

While this question may appear to have a simple, straightforward answer the reality is often different. Cameras can be used for reactive (i.e. audited, prosecution, etc.) recording purposes or for proactive (intelligent analysis capability) real-time surveillance. Determining the camera’s purpose and the problem to be solved leads to asking additional questions that will help clarify the situational needs. Some of these may include: How much resolution is needed? How long will records need to be retained? What areas need to be covered and when?

How will the system be staffed?

This is an important question because the answer will have a bearing on camera and video management system selection. For example, casinos require 24/7 live monitoring of the system while perimeter or parking lot surveillance may be unattended. Automation and analytics may also play a role in the solution. Analytics are now available that can support a wide range of recognizable events, including License Plate Recognition (LPR), heat mapping, simple motion vectors, as well as some very advanced demographic recognition functions such as gender, ethnicity, approximate age, and clothing colors. In unstaffed situations, analytics can even alert staff that events may need to be reviewed.

What are the environmental conditions?

Conditions such as extreme heat, cold, humidity, corrosion, and high dust levels will play a part in determining what equipment can be considered for the installation. Other environmental factors also can play an important role, such as ambient light levels, the availability and reliability of existing power and network infrastructure.

The Specifics

Based on answers to the above questions, the conversation can move on to determining more specific details of the system. These might include the number and type of cameras needed; data storage requirements; existing infrastructure capability and training needs. With these answers in hand, more advanced considerations can be addressed, including:

Integration Needs. The most common example is access control. Most current systems have an IP-based interface that can easily be integrated into VMS systems but it is important to know any limitations and to work with an integrator and a manufacturer that support a wide range of 3rd party integrations.

Redundancy. For the vast majority of systems, simple RAID5 or RAID6 redundancy in storage is sufficient. Planners should also consider budgeting for “Failover” recorders and other server hardware on the VMS back-end, as well as spare cameras.

System Security. Cybersecurity is a critical issue in a network environment and smart planning now can help eliminate some of the risk. Any network-connected software or device in the security system could potentially serve as an open door for an attacker to access networks and sensitive information. By ensuring at this stage that system contains hardened architecture, software and devices, the vulnerability can be reduced.

Licensing. Today, most VMS systems have licensing requirements as well as Software Upgrade Plans (SUP) or Service Level Agreements (SLA) to cover everything from higher tiers of support to future upgrades. It’s an important aspect of the design stage because if allowed to expire, out-of-date software can become a significant expense to bring the system back into compliance or to obtain the required support.

Support. Beyond the capabilities of the end-user to support its installations, how is support escalated? Does the installer have personnel that are trained and able to support the planned installation? If support issues exceed the installer’s capabilities, what are the manufacturer’s responsibilities for resolution?

The Pitfalls

It’s easy to get caught up in the lure of the technology. Specification creep and glossy brochures can distract from core planning discussions. Integrators and manufacturers who take the time to understand the application, its assets and limitations, and who have a history of providing a solution that meets the end-user’s needs, don’t need to indulge in these embellishments. Rather, by probing what is needed, what the challenges are and what problems the customer is trying to solve, many pitfalls can be avoided.

Having these discussions at the start of the project, and considering the full range of factors, will help to ensure the final result is a successful project.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.