Great Systems Start with Great Planning

Great Systems Start with Great Planning

To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages

The sophistication of today’s video surveillance and security systems technology has delivered significant gains to end users tasked with ensuring the safety and security of people, property and assets. A prime example of this evolution is with management and control platforms with open architecture enabling numerous integrations that result in improved situational awareness and operational ease.

Simultaneously, the complexity and ongoing evolution of integrated systems has also created new challenges for system designers. To ensure that new and enhanced systems best meet expectations, one of the most critical steps in the design process is in the initial planning stages. Clearly identifying surveillance and security objectives, priorities, budget parameters, potential installation/construction issues and future expansion plans are critical considerations. By taking the time at the start of the project to address these questions clearly – and gain agreement – users and/or integrators will be better ensured of developing and implementing a more innovative and comprehensive solution.

The Fundamentals

What are the operational goals of the system?

While this question may appear to have a simple, straightforward answer the reality is often different. Cameras can be used for reactive (i.e. audited, prosecution, etc.) recording purposes or for proactive (intelligent analysis capability) real-time surveillance. Determining the camera’s purpose and the problem to be solved leads to asking additional questions that will help clarify the situational needs. Some of these may include: How much resolution is needed? How long will records need to be retained? What areas need to be covered and when?

How will the system be staffed?

This is an important question because the answer will have a bearing on camera and video management system selection. For example, casinos require 24/7 live monitoring of the system while perimeter or parking lot surveillance may be unattended. Automation and analytics may also play a role in the solution. Analytics are now available that can support a wide range of recognizable events, including License Plate Recognition (LPR), heat mapping, simple motion vectors, as well as some very advanced demographic recognition functions such as gender, ethnicity, approximate age, and clothing colors. In unstaffed situations, analytics can even alert staff that events may need to be reviewed.

What are the environmental conditions?

Conditions such as extreme heat, cold, humidity, corrosion, and high dust levels will play a part in determining what equipment can be considered for the installation. Other environmental factors also can play an important role, such as ambient light levels, the availability and reliability of existing power and network infrastructure.

The Specifics

Based on answers to the above questions, the conversation can move on to determining more specific details of the system. These might include the number and type of cameras needed; data storage requirements; existing infrastructure capability and training needs. With these answers in hand, more advanced considerations can be addressed, including:

Integration Needs. The most common example is access control. Most current systems have an IP-based interface that can easily be integrated into VMS systems but it is important to know any limitations and to work with an integrator and a manufacturer that support a wide range of 3rd party integrations.

Redundancy. For the vast majority of systems, simple RAID5 or RAID6 redundancy in storage is sufficient. Planners should also consider budgeting for “Failover” recorders and other server hardware on the VMS back-end, as well as spare cameras.

System Security. Cybersecurity is a critical issue in a network environment and smart planning now can help eliminate some of the risk. Any network-connected software or device in the security system could potentially serve as an open door for an attacker to access networks and sensitive information. By ensuring at this stage that system contains hardened architecture, software and devices, the vulnerability can be reduced.

Licensing. Today, most VMS systems have licensing requirements as well as Software Upgrade Plans (SUP) or Service Level Agreements (SLA) to cover everything from higher tiers of support to future upgrades. It’s an important aspect of the design stage because if allowed to expire, out-of-date software can become a significant expense to bring the system back into compliance or to obtain the required support.

Support. Beyond the capabilities of the end-user to support its installations, how is support escalated? Does the installer have personnel that are trained and able to support the planned installation? If support issues exceed the installer’s capabilities, what are the manufacturer’s responsibilities for resolution?

The Pitfalls

It’s easy to get caught up in the lure of the technology. Specification creep and glossy brochures can distract from core planning discussions. Integrators and manufacturers who take the time to understand the application, its assets and limitations, and who have a history of providing a solution that meets the end-user’s needs, don’t need to indulge in these embellishments. Rather, by probing what is needed, what the challenges are and what problems the customer is trying to solve, many pitfalls can be avoided.

Having these discussions at the start of the project, and considering the full range of factors, will help to ensure the final result is a successful project.

Featured

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3