The Direction of VMS Technology

VMS technologies have come a long way over the past five years

Some of the industry trends which have affected technology and deployment design include a dramatic cost reduction in entry level NVRs and cameras. Merger and acquisition activity is reducing the number of independent technology vendors and driving popularity of single source technology providers and server hardware lines by VMS providers are now commonplace, allowing consumers to obtain the complete recording platform from a single vendor.

What might the next few years look like for VMS technology? Herein, we’ll explore trends and the direction technology may take for VMS platforms.

Information Security

Security is the current hot topic for video surveillance and other physical security systems, and for good reason. Several headline- making network attacks over the past few years have been made possible by security flaws in internet-connected cameras and DVRs. One notable, recent example is from late 2016. Dyn, a major provider of DNS services on the internet, suffered a sustained Distributed Denial of Service attack, mainly from compromised IP cameras and DVR/ NVR devices.

Emerging from these events, VMS vendors and security consumers see information security features as strategic and differentiating advantages. Some information security technologies which will become more commonplace VMS features.

  • Encryption for system configuration files, communications, and authentication. System passwords and other sensitive configuration information is at risk when stored and transported. If authentication or configuration information is either intercepted during transport over the network or copied from a VMS client or server system, encryption will protect the contents, making them unusable to those without the encryption key.
  • Encrypted video storage prevents video on a stolen hard drive from being readable. If a malicious actor has removed video storage drives after gaining physical access to a system, the recorded video will not be usable.
  • Two factor authentication provides an additional verification step to validate that the user name and password entered matches the person attempting to authenticate. In the event a password is used by an unauthorized individual, the second authentication factor should prevent the individual from logging into the VMS.
  • Encrypted export: Exported video is most at risk of being stolen. The exported video is often physically removed from the organization’s building, and there is no log of the access to the exported clips. If the media is lost, any individual can view the video, upload it to YouTube, provide it to the evening news, etc. As such, encrypting exported video ensures only authorized individuals with the encryption key will be able to view and use the export.
  • Automatic system patching or in-application update reminders.

Co-processor Integration

Video surveillance is becoming a much more processor-intensive application. Many factors contribute to the increased demand for computing power, including increased deployments using H.265 compression, 4k camera resolution, and increased interest in deploying real-time and search based analytics.

VMS Client workstations require substantial computational power to decompress video, scale the video to the screen size, and display it. VMS recording servers may require substantial computational power to process video for motion detection, analytics, transcoding, or other operations.

To drive down the cost of server hardware and increase VMS performance, more VMS platforms will work toward integrating various co-processing technologies. Most common among these co-processing technologies are Graphics Processing Units, or GPUs, which are the processors located on a video card. When a VMS is integrated with such technology, some of the computing work will be processed by the CPU and some by the GPU. Adding in a graphics card with a compatible GPU will increase the computing power of the client workstation or server for much less expense than deploying a second computer or a more powerful computing platform that supports multiple CPUs.

Other co-processing technologies include Intel’s QuickSync technology as well as FPGA processors. Both of these technologies will likely be less common than GPU integration.

Leveraging Cloud

Interest in Cloud video surveillance deployments is growing. However, such deployments are frequently limited by bandwidth constraints. The upstream bandwidth available at a deployment site still largely dictates both how many cameras can be deployed, as well as the quality of the video available.

Despite scalability challenges, Cloud may still be leveraged by traditional VMS platforms in unique ways, creating hybrid Cloud or on premise deployments.

Traditional video surveillance deployments include hardware installed and owned by the consumer. The hardware will have a fixed amount of storage capacity, and consumers generally don’t specify more storage than is required due to the costs involved.

This traditional model is not very flexible. Often, a consumer’s video retention requirements may change or scene conditions may evolve, affecting how much storage is required to retain video. Consider the example of a school; storage requirements may be low during summer, but when school is in session, the additional scene activity drives camera bitrates higher, necessitating more storage space.

As such, VMS vendors may offer video archiving services. In-application options could allow consumers to pay for additional storage in the Cloud. When local storage is full, video would be uploaded to the Cloud for long term retention. Users can scale their video retention at any time without hardware changes under such a model.

In addition to leveraging Cloud for on-demand storage, cloud could be used for other “hybrid” applications, such as processing video analytics or simplified remote access.

In the case of processing for video analytics, recorded video could be uploaded to the cloud for processing and analysis, instead of having a server onsite to perform processing. This model could be useful in several ways. Take the example of a chain of retail stores: It may be desirable to process a camera’s recordings to generate a heat map, showing customer traffic patterns throughout the day. Uploading video to the Cloud for processing eliminates the capital investment in extra hardware needed to process the video. Additionally, if the retailer wants to process either a different set of, or more, cameras, on-premise hardware may not scale to the new demands. Using the Cloud, additional computing power can be obtained on-demand.

Finally, VMS providers could offer simplified remote access setup using a Cloud service. Remote access to a traditionally deployed video security system involves either using a VPN or setting up Port Forwarding and Dynamic DNS, both of which involve setup complexity and additional time for installation and configuration. Instead, a VMS provider could offer a Cloud service the VMS is preconfigured to connect to. The Cloud service would have a pre-established connection to the local VMS server which would allow the Cloud service to notify the VMS of requests for video from remote clients. This configuration would eliminate the need for port forwarding and DDNS or VPN setup because clients would not be making inbound connection requests to the on-premise VMS servers.

The End Result

Competitive differentiation and market demand constantly drive innovation in VMS products. More intelligent, secure, and flexible systems seem to be the current direction for enterprise VMS technology. These advancements will be enabled by co-processing technology integration, creative leveraging of the Cloud, and market demand for highly secure systems. The outcome will be systems that can do more and be easily expanded at lower cost for consumers.

This article originally appeared in the December 2017 issue of Security Today.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3